Windows NT Architecture Overview
Windows NT Architecture Overview
Concepts Reínforced
OSi Model Client/Server Technology Model
LAN Software Protocols and Standards
Network Architecture Network Operating Systems
Network Operating Systems Functionality
Architectures
Concepts Introduced
Hardware Adaptation Layer NT Communication Protocols
NT Architecture NT Functionality
NT Servers NT Clients
NT Interoperability NetWare /NT Interoperability
Nx INTRODUCTION
*i \ITNDOWS NT 4.0
0verall Architecture
windows NT 4.0 is an integrated network operating system designed to sup-
port single server environments through enterprise-wide deployments. win-
dows NT 4.0 is available in three versions:
Windows NT 4.0 305
. Windows NT Workstation
o Windows NT Server
ücrrt,
¡tem
¡ Windows NT Server Enterprise Edition
;NT
ty is windows NT workstation is architecturally identical to NT server. The dif-
rent two platforms are available iervices and performance tuning.
lgrenc_e_s_i1lhe
ym- since NT workstation is designed to serve as a user wórkstation, some NÍ
'o of
server network services are not included. Examples of NT server service
will that are not available in NT workstation includé web, FTp, and DNS ser-
eby vices. similarly, in NT workstation, processor priority is focused on fore-
base ground applications at the expense of backgrorr.d ,".rri."r.
windows NT workstation is just one of the possible client platforms that
the can interact with windows NT server. In addiiion, several cómputers run-
hile ning windows NT workstation can be linked to each other in a peer-to-peer
nde network architecture. windows NT workstation computer supports or,ty to
the incoming connections.
windows NT Server Enterprise Edition expands NT servers, scalability.
ring sMP extensibility is increased to support up to zzprocessors on systems on
000. special hardware. Clustering and load balancing support allow multiple Nt
to be tightly integrated. using windows NT Load Balancing sórvices
Ple- ?-::y:l:
(WLBS), up to 32 NT servers can be clustered into a single networf address,
fas g-reatly- increasing processing capacity. From the persplctive of a network
the client this cluster of servers appears to be a single
-[Link]".
Windows NT Server Terminal Server edition includes special extensions
ftrcr
nill that support ultra-thin clients. ultra-thin clients, also known as network
computers (NC), act as a graphical terminal to applications that are actually
ru¡ning on the server.-Compared to traditional ilient/server applications á
network computer solution required significantly *or" ,"r,r^"i resources
because the server runs the applications fór each cíient. A complete descrip-
tion of network computers is provided in Chapter 10. Figure z-i lists the kéy
w) characteristics of the NT 4.0 platform.
ger
e[e
EP
nrt-
0perating System Architecture and Characteristics
NYS
In addition to scalability and portability, stability is a very important func-
51,
tional characteristic of windows NT. Compared to windóws ^3.x and win-
ilce
dows 9x, windows NT is relatively crash pioof. This system stabilify can be
f\iT
largely attributed to rigid enforcement óf structur"á u.."r, to hárdware
resources. Application programs and ApIs are prohibited from interacting
directly with hardware resources in windows ñT. Instead, applicatiorrs urrá
APIs must access hardware resources by requesting services itrrougn system
services collectively referred to as the NT Executive.
TP
ln- As illustrated in Figure 7-2, communication between the various NT
Executive sub-systems and the I/O manager is controlled by the NT Kernel,
306 ChapterSeven Windows NT (2000)
Supported Processors Intel x86 (386 or better) Intel x86 (386 or better) Intel x86 (386 or better)
Digital Alpha PowerPC Digital Alpha PowerPC Digital Aipha PowerPC
(\Mhile originally supported, (While originally supported, (While originally supported,
support was dropped suppo¡t was dropped with support was dropped with
with Service Pack 3) Service Pack 3) Service Pack 3)
Network Object Domain Name Services Domain Name Services Domain Name Services
Management System
(continued)
Windows NT 4.0 307
,'tttitf"
308 Chapter Seven Windows NT (2000)
Applicat¡ons
-Dos-
Protected
subsystems
(servers)
NT executive
[N/[Link] __+,
pass ng
Svstem
tráp
Hardware
man pulat¡on
be thought of as a hardware ApI. It takes standard calls from the kernel and
converts them into specific instructions for the underlying hardware. From
the perspective of the kernel, every HAL looks identicai To execute win-
dows NT on any given CPU chip, the follor,r'ing major steps are required:
Routines or system cal1s embedded within the HAL can be called from
either the NT kernel or from device drivers included in the IrJT I/o manager.
I/O Manager
Local Procedure CalI Manager
Object Manager
Process Manager
NT Kernel The NT kernel runs over the hardware abstraction layer and
controls the overall traffic flow of messages throughout the operating sys-
tem. The NT kernel is more specifically concerned with handling inter-
rupts and exceptions for communication between sub-systems and
between hardware resources and the operating system. As part of the man-
agement of all inter-sub-system communication, the kernel is responsible
for constantly checking the NT executive's security sub-system to ensure
that requests for services have been properly authorized. More specifically,
thé NT kernel is responsible for:
iT is I/0 Manager The I/O Manager is in charge of managing all input and out-
put for the Windows NT operating system. As illustrated in Figure 7-2, tlne
I/O manager is particularly concerned with managing the communication
between:
exe-
¡ Device drivers
. Network drivers
hom
ager.
r Cache Manager
. File Systems Drivers
rietr-
stem Device drivers, otherwise known as hardware device drivers, are specif-
ically written to support a particular hardware device such as a printer, key-
310 Chapter Seven Windows NT (2000)
' NDIS provides the ability for a network interface card to support
multiple protocols as well as the ability for a network operatingiys-
tem to communicate with more than one NIC in a single computer.
The cache manager works closely with the file systems supported by NT
to optimize file services offered to applications. By effectively manáging
cache memory, the cache manager can minimize the number of physical
readlwrites to disks, thereby optimizing the performance of applióation
programs. cache management becomes especially critical when Nj is oper-
ating in an SMP environment due to the increased processing speed.
windows NT supports multiple different file systems-incruaing ran
(Dos) and NTFS. In order for NT to communicate with these multipie dif-
ferent file systems, an intermediate layer of software interacts with bbth NT
and the particular file system that is required. These specially written inter-
mediate layers of software are known as file system drivers. when file sys-
tems services are required by applications, the file system is accessed by the
I/O manager via the proper file system driver.
The modular design of the I/o manager allows these categories of dri-
vers to be changed and allows simultaneous support of multiplé file systems
and drivers. often, requests for r/o services come from application pro-
grams indirectly via the win32 subsystem. The I/o managei overseeJ the
interaction among the various categories of drivers to ensure that applica-
tion programs are delivered requested services in a timely fashion. Cómmu-
nication among these various drivers is standardizedby the I/o manager
through the use of I/O request packets.
ffi
Windows NT 4.0 311
0biect illanager objects in the context of \\'indor,r,s NT are anything that the
NT operating system or anv of its sub-sr-stems can manipulati access, or use
in any way. Files, directoriós, ancl applicarion program threads are all exam-
-t
ples- of objects. object categories diirer in tl-," pJ of operations that
can be
performed on them and in the auihorization iei el required to perform the
given operation. The object manager is responsible foi or-e¡all Áanagement
of all l{T objects including enforcement ofnaming conr entjons and autho-
rization. In a very real sense, the object mutlug"i is responsible for object
security.
q U
o o
o o
E o J= o
tr z U z
g
.t)
.E zcc É
u
Y
Multi-Threaded Kernel
ro
lm lr;|t;t lJ
*Jlvooe lllvooe lJlr¡oo"
l
U
o
o o
o (5o
tr
U
a =
f ffiffiffi
lFins3i lninosl lRins3l
=
J
U
z¡c
U
Y
z
É,
Figure 7-3
EIEE4
Single Threaded vs. Multithreaded Kernel
' FAT (Fi1e Allocation Table)-Compatible with Dos (only file system
supported on diskettes)
. NTFS (NT File System)-Windows NT
. CDFS (CD File System)
4
3'1,4 Chapter Seven Windows NT (2000)
FAT The FAT filesystem provides support for the legacy DOS file system.
Using FAI, filenames are limited to eight characters plus a three-character
extension, whereas filenames in Windows NT can be up to 256 characters in
length. To resolve this difference in available length, a FAT-compatible eight-
plus-three conventional name is automatically created for files with long
filenames. For example, although this chapter was created as "Chapter
[Link]" on an NT computer with NTFS, when it is edited on a laptop running
Windows 98 with FAI, the file is loaded as "[Link]". Both FAT and
NTFS partitions can be created on the same disk and files can be easilr-
copied between the two file systems by NT. NT's FAT file system allows file-
names of up to 256 characters on floppy diskettes.
ffi NTFS
NTFS took the positive attributes of the FAT file system and added features
required to support very large files and disk drives and features to increase
security, reliability, and recoverability. Figure 7-4 summarizes the key fea-
tures of NTFS.
¡ Transactions that were being held in disk cache for lazy-write posting
and were therefore not physically written to disk when the system
crashed.
o Transactions that were is the midst of posting when the system
crashed.
{p
NTFS 315
L
NTFS Feature Explanation /Importance
r
L
Access Control Ar,cess control permissions b" [Link] to indirril,rul
¡ rlres as well as to directories."un
), Master File Thble Contains records for each file and
r dir""t.t; NTF9
/t 5.*.".0r_:.o"je¡ning the organization of NTFS una tf,"
ryrasrer t,lte láble (MFT) are redundant
I in case the
primary record becomes corrupted.
r Small files (less than 1500 bytes) are
stored entirely
within the MFT for faster access.
NTFS File Attributes File attributes are contained *itn u filJ,
list of file attributes can be customized
Wf ."_r¿ft
"
for particular envi_
ronments_(Mac, LINIX) and can be added
to in order to
extend NTFS funcüonality.
Filenames NTFS allows filenames up to 255 characters
erates 8-plus-3 names foipef
b"t,jro g;
n /OOS compatibility.
F POSIX Compliance
I9SIX compliance allows UNIX [Link].,, to u**-
files stored in NTFS on Windows
NTFS needs to support some unique
ñi. h;;;;" do rhis,
POSIX file attributes
such as:
. case-sensitivefilenames
. hard-Iinks that allow a given file to be accessed
by
more than one filename
additional time stamp attributes to show
when a
gtven file was last accessed or modified
Macintosh Support Windows NT Services for Macintosh
to b"
a-ccessed by both Macintosh
users and"no*Jl",
Windows NT
clients. To the Mac users, the NI server
lool, fit un
AppleShare server. NTFS supports .[Link] "
l,tuc iile attrib_
utes such as resource an¿ Aati forks
as well as the Finder
utility. Macintosh access confrol permissions u.e ulso ,.rp_
ported.
Hot Fixing If NTFS finds a bad sector on a SCSI airt,
it _itt *to.*ti
cally move the affected files and mark thát
segment as
bad without the need for any user intervention.
File System Recovery NTFS uses the cache manager to buffer
¿irt *¡t"J*
Process 99*" as lazy-write, and also runs a transaction
log on all disk writes to allow NTFS To,".o"",
[Link]
from system crashes.
The log file service records two types of information: Re-do information
allows transactions that were still sitting in disk cache to be re-posted. Peri-
odically, NTFS checks the cache to note the status of transactions that had
been physically written to disk. In the event of a system crash, these check-
points make the recovery process more expedient. Undo information allows
transaction entries that were in the midst of posting to be rolled-back or
undone.
The NTFS file system is self-recovering. No file clean-up utility needs to
be run by the users. Upon initialization, NTFS checks to see if it went down
dirty. If the filesystem is determined to be dirty, it performs an analysis pass
with the help of the log file service to determine where it left off when the
system crashed. NTFS then re-posts filesystem transactions based on the log
file service's re-do and checkpoint information and removes partial or cor-
rupted transactions based on the log file service's undo information. This
entire process of file system recovery takes only a matter of seconds. In con-
trast, a file recovery on a 1..2 GB NWFS partition under NetWare 4 takes
approximately 35 minutes.
":r:
i iiti.. ..,..., N{,{STER FIIE TABTE DESIGN INSURES FASTACCESS I\D RELL{BILITY
..,,,,',1']]:::ll']]::,,:,,lll :]l',,1,:' The design of the Master File Table attempts to accomplish two key, often
contradictory, objectives :
',:tll':EháiPer
Focus
.r*1ffiilil1ri
,-¡¡4$f¡d!l
NTFS 317
xr
d-
d
k-
trS
of Location of Master Also holds location
File Table and of Master File Table
Master File Table and l4aster File
t0 Mitror File data
segments
Table l\¡iror File
data segments.
tTr recorded here.
ÉS
he
bg
Dr- Describes key
lvlaster F¡'e
his Table
characterislics
rr-
k€s
. Disk Mirroring, in which all data written to one disk are also written
to a second redundant disk. In the event that the primary disk fails,
rese the redundant disk takes over immediately.
,[ T
o
ffi=Í Disk Duplexing, which improves upon disk mirroring by ensuring
that the two mirrored disks are also supported by separate disk con-
üisk
ruc- trollers, thereby eliminating another potential point of failure.
ries ¡ Disk Striping with Parity, otherwise known as RAID 5, allows data to
be reconstructed from among the redundant array of disks in the
Iun- event of a disk failure. Software-based RAID offers a less expensive
alternative to hardware RAID sub-systems available from a variety
of vendors.
. UPS support is especially important because of the function of the
cache manager within Windows NT. In order to optimize system
performance, physical writes to disk are not always performed
immediately upon the execution of a "save" command. This infor-
mation is often stored in cache memory until a convenient time to
J
318 Chapter Seven Windows NT (2000)
access the disk. If the system should shut down unexpectedly, all
information stored in cache memory is lost. By having the ability to
support uninterruptable power supplies, NT can execute an orderlt-
system shutdown when necessary, thereby saving all cached infor-
mation.
Domain
Primary
Domain
Controller
Workgroup
:::i#iJ:TÍ:?:""r:::fi ii[,:"rmaintaininstheirownuser
two-way trust relationship with domain C, this does not mean that users o::
domain Ahave access to domain C'
Interdomain trust accounts that allow NT server domain controllers t.-
one t':
perform passthrough authentication to other domains ate, in fact, only
itrree typls of trustáccounts supported by Windows NT. The other
two are:
DOIIIAIN ARCHITICTURES
ffi
I l-w
I \*#ffi
=---'-"
,ffi,
ffi
NT Seryer NT Workstaüon
+
+
-
NT Workstation '?"wishes to access Workstation "8"
Workstation "8" passes login infomation io the domain múo{hr iff aültÉ¡tbatbf,.'
Pr¡mary
f-_t
le=s1 authenü€tion i:l
t= Backup
fl
Domain I= Doñain
Controller I F=-*ffi Conlrcl¡er
t-d¡iffi
Fffi
ffi
ffiffi copv of Domain Securitv Database
,ffi
M
NT Seryer
r> The Backup Domain Controller is able to receive a copy oi the Domain Security
Database due to Seruer [Link] Account.
Trust Account
authentication requesl
pass{hrou gh authentication
NT Seruer
-
LOCAL
DOMAIN '"n"2
NT Workstation
i_---_'l
uomarn f-''_l
uomaln
I e l-l o I
llrl I
. read
r delete
. write
' change permission level
¡ execute
. take ownership
. no access
o print
By monitoring permission levels, the NT security system can monitor
and control who accesses which objects as well as how those objects are
accessed. In addition to monitoring and control, NT security can also audit
and report on these same object accesses by users according to permission
level. The components of the Windows NT security model are illustrated in
FigureT-9.
Win32
Subsystem
USER MODE
KERNEL MODE
Security
Reference
Monitor
Sub-System
reference whether or not this user and their spawned pfocesses have sufti-
cient permissions to perform requested SeIViceS or access requeste-i
resources. The local security authoritV also controls the security model's
audit policy and generates audit messages that are stored in the audit log.
All of the user and user gfoup ID and permission level information i.
stored in and maintained by the seculity account manager which interact:
with the local security authority to verify user IDs and permission levels.
The user accounts database is physically stored on the primary domain con-
troller except in cases where an individual workstation may have a need to
verify specific User IDs for remote access to that workstation. The link:
between components of the NIT security model involved in the logon plocess
are designed as secure communication channels in order to ensure ihat traf-
fic which is supposedly received from a given workstation or computer is
aciuaily from that computer. This authentication is accomplished in win-
dows NT by a process similar to ihe Challenge Handshake Authentication
frrmm,',.
Components of the Windows NT Security Model g2S
Communiealion Prolocols
. TCP/IP
o NWLink (IpXlSpX)
. NeIBEUI (NBF)
FIAI\5T'(JH I
:sFoiLPIgló€i Options
NBF I DLC NWLINK TCP/IP I
I
APPLETALK
NETWORK
(NETBEUt) f (rP)tsPX)
. DLC
' APPleTalk
IP)(/SPX
Windows NT
Client
Netware Windows NT
Server
Server
AppleTalk
Windows NT Windows NT
Client Server
AppleTalk & TCP/lP or
NBF or IPVSPX
Maclntosh
CIient
NBF
Windows NT
Client
LAN
Manager Windows NT
Server Server
DLC
Windows NT HP LaserJet
Client with JetDirect card
"lk
IBM
mainframe
T(P/lP and Related Protocols Although the intricacies of TCP/IP and the
related protocols of the Internet Suite were covered in Chapter 4, a btiei
description of supported protocols and services wili be given here. In addi-
tion, significant issues reiated to Windows NT's implementation of TCP/IP-
related protocols such as the Dynamic Host Configuration Protocol
(DHCP) and the related Windows Internet Naming Service (WINS) will
also be discussed. Figure 7-72 summarizes some of the TCP/IP protocols
and services supported by Windows NT.
The solution was the Dynamic Host Control Protocol, or DHCP. DHCP allows
NT servers using TCP/IP to dyrramically assign TCP/IP addresses to NT
workstations, Windows for Workgroups clients, Windows 9x clients, or DOS
clients running the TCP/IP-32 protocol stack. The DHCP server is included as
'lii part of the TCP/IP protocol stack for NT server and references a DHCP data-
I base for lists of available IP addresses. IP addresses issued by DHCP are
leased, rather than being permanently assigned, and the length of time that IP
addresses can be kept by DHCP clients is known as the lease duration. Dial-in
users are typically assigned an IP address only for the duration of their call. If
necessary, specific IP addresses can be reserved for specific clients. DHCP
must be enabled on Windows clients supporting the TCPIIP protocol stack in
.d
330 Chapter Seven Windows NT (2000)
order to be able to request IP addresses from the DHCP server. For more infor-
mation on BOOTP and DHCP, please refer to Chapter 4.
Because users and their workstations are easier to remember and access
by name rather than address, NT keeps track of user names and associatei.
IP addresses with a service known as wINS (windows Internet Name ser-
vice). wINS is a Microsoft proprietary client/server name resolution system.
I
Each client is configured with the address of at least one wINS server. At
boot time the client registers its name and IP address with the WINS server.
In this manner the wINS server builds a comprehensive database of names
and IP addresses of the machines on the network regardless of the manner i¡.
which they received their IP address.
When a WINS enabled client wants to connect to another station, i:
sends a name query to the wINS server which responds with the current IF
address of the destination computer. The client is then able to conneci
directly to the destination via IP.
The Internet uses a different naming service knon'n as DNS or Domain
Name System. While DNS normaily only works r,r'ith machines whose IF
addresses never change (static addresses), use of the Microsoft DNS server
for NT allows DNS to query the wINüs database to present accurate DNS
information on dynamically assigned hosts. As a result, users assigneo
DHCP addresses who are logged into the WINS database will still be acces-
sible from the Internet via the DNS database. The DHCP serve4 WINS
server, and DNIS server can all be physically located on different server com-
puters. Figure 7-13 illustrates the interaction of DHCP, WINS, and DNS
clients and servers.
F
DHCP and WINS 331
::
.: DHCP - no WINS - load
load leveling leveling
:- of available lD across
addresses multiple
across servers with
multiple bi-directional
seryers replication
WINDOWS SERVER
Windows Client
WindowsClient
using DHCP
Earlier versions of the WinSock protocol were able to allow programs writ-
ten to support this protocol to operate transparently over a variety of differ-
ent vendors' TCP/IP protocoi stacks. WinSock2 added to this functionalitr-
by allowing WinSock-compliant applications to operate transparently over
IPX/SPX, AppleTalk, DECnet, and OSI transport protocols as well. The
importance of this multiprotocol support from an application developer's
standpoint is that only one version of an application needs to be developed
and maintained rather than several network protocol specific versions.
A WinSock-compliant application uses the WinSock interprocess com-
munication mechanism by loading the [Link] fite. A DLL or dynamic
link library (DLL) file is loaded into memory as needed at run time by Win-
dows NT rather than having to be compiled into, and permanently added to
the application programs themselves. As illustrated in Figure 7-\5, the
[Link] file includes two distinct interfaces:
' The WinSock SPI (Service Provider Interface) translates the API calls
to enable WinSock compliant applications to access multiple differ-
ent network transport protocols through the transport driver inter-
face.
wtNsocK 2
COMPLIANT
APPLICATION
ÁPi-
j
X
J. :,
.J::i,.r..
.6:r,1.'t.
. ,rr,:,,
.r
,
()..,,:,
,O.' .:rr
qr,.,' .,.:
-l Z,:":.',,':
*,*.o"^, 3..,:,"'..,
I spl
TRANSPORT
DRIVER
INTERFACE
File and Print Sen'ices File and print services represent an entry into the
server NOS market. Windows NT provides basic file services to clients. Stan-
dard file service capabilities such as security and concurrent access are pro-
vided. File services are accessed by clients through redirectors using the
SMB protocol as discussed in the preceding section.
Recailing that printer sharing is a key NOS application, it should come
as no surprise that Windows NT does an especially good job of offering man-
aged print services to client workstations. In keeping with the overail modu-
lar design of Windows Nl printer services are organized around the
Windows NT printing model as illustrated in Figure 7-16.
The importance of the modular design of the Windows NT Printing
Model should be clearly evident from Figure 7-6. At many layers of the
model, a variety of options are available, depending on the particular envi-
ronment of the user. For example, choices can be made for:
If not for the modular design of the Windows NT Printing Model, mono-
lithic printing spoolers would have to be developed for every possible
unique combination of spooler, monitor, and printer-a mammoth under-
taking. The basic building blocks of the Windows NT Printing model are:
Numerous brands
of supPorted
printing devices
, ,, .,."4mrrrrrrrili
i
338 Chapter Seven Windows NT (2000)
0verall Architecture
*as and doubles SMP support as compared to the Windows 2000 Server plat-
rrod- form.
eiop- Windows 2000 Datacenter Server is designed for large enterprise
Hice deployments. with support for increased numbers of processors and mem-
ory along with clustering and load balancing, Windows 2000 Datacenter
Server is optimized for large data warehouses, transaction processing, and
scientific calculations. The key features of each server version of Windort's
2000 are listed in FigureT-17.
Flol -
Hardware/Platf orm
= and Supported Processors Intel x86 (386 or better) Intel x86 (386 or better) Intel x86 (386 or better)
Digital Alpha DigitalAlpha DigitaiAlpha
Lciior
Min Memorv 64 MB 128 MB 128 MB
usedinWind.owsNT4.0,Windows2000increasesaddressablememon-. on Intel
Windows 2000 provides support for up to 4 GB of [Link]\4
on 64-bit processor
Pentium II Xeon pro."r,o" and up to 32 GB of RAM
Alpha family and future Intel proces-
svstems such as the Digital/Compaq
pñ[Link] memory supported, more data
,á;;;;;u|iü t-hÉamount or
increased data processing
can be cached in memory, proviáing greatly
performance.
Multi-processingOneofthemaindifferencesbetweenthevariousversions
Windows 2000 Server prod-
of Windows 2000 lies in Sltn st'ppo't' The base
(two-p;;cessor) sMR whereas the mid-range win-
uct is limited to two-way's"irr".
dows 2000 Advanced offers four-way sMP. For large enterprise
up to 16-way SMP.
[Link], Windows 2000 Datacenter Servei supports
Windows 2000 is tuned
Regardless of the number of processors supporteá'
for newer hardware
for better efficiency u,-,a pto"ia"s enhattcbá support
configurations.
InadditiontoSMPimprovements,betterprocessorutilizationismade
ln an l2o-compliant
possible through ,uppo* fár the Intel I2O architecture.
memory' handles all I/o
svstem a separate pt;;;;;;-t"mplete with its own
services'
;il;;;;;í;;g' tt-'" ,,.,ui'-' protessor(s).to focus on application
use of "scat-
i"i"i7ó",put peifoÁance ii further enhanced through the
in noncontiguous
7-.íijutnnr l/ó tnat increases access speed. to data held
memory locations.
ClusteringV\[Link]-
ical enterprise level ,iuig"sMp servers"present a single [Link] of
"p¡ii.;;r",
failure. If client/servár'computing is to succeed,
,"irr"tt must provide both
availability'
i-righ and be faillsafe."To provide such fail-safe high
"""il"Uility illuitrated in Figure 7-L8, a sefver cluster
two servers can be clustered. As
[Link]-
server'
iir," of a network client, the cluster appears to be a single is sent to the
When a client ."q"";i; áuiu fto- the ciuster' the request
primary server fails' the
prirrrutf ,"rrrer for fuiflllment' In the event that the
active iluster connections' Ide-
backup server will automaticaliy pigk fP the
don't realize that a failure
ally, this process h"p;; ;; qú[Link] tÉat users
occurred. Windows'ioOo ptot'iaes support
for such fail-over clustering
Services (MSCS)'
tn-"gf, the Microsoft Clu;tering If a single SMP server
A second use for clusters is to increase scalability.
carurot provide adequate proce_ssing [Link]
for a lárge-enterprise applica-
tion, multiple s"rrrer's .urr'b" cluste"red together to collectively meet these
7-19' when a client makes a
processing requirements' As shown in Fig"ure
request to the cluster, u ttt"t"' controller
ieroutes the request to one of the
Selvelsthatmakes"p.n"[Link]/henachangeismadeon
oneserverinthecluster,thechangeisautomaticallypropagatedthroughthe
cluster to ensure data integritY'
Before failure
After failure
ffiffi
" ":l:'-.- '..1 I r. : -*¡ ., r i':.'1":i
,.b'ry¡uro
L -csr$tda$enl
t
I iL t*,"'ry-
E-naHcúJ I
-J
l-:,*d*-***&_¡l t.¡peqqelq l
o
óa
ó-
.^
a\
Qo\
oa
7\
DOIVIAIN
'ooo Jl
/ 6a Dor\,lArN
) DoMAIN
I--a
ó
'DoMA¡l-! TREE
I,DAP CIIENTS
' tla,-.,'.,,.;,,,.'....,,,',
Both Netscape Communicator and Microsoft Internet Explorer contain
l $liáiper address book utilities that are LDAP compliant. By opening the address
Focus book and pointing it at the IP address of a Netware server running LDAP
services, directory information can be accessed. Depending on need the
server can be configured either to allow anonymous access to the directorr-
or to require an SSL connection to authenticate the user before allorl-ins
access.
Sohing r'\-r,..dorr-s
windows 2000 takes a two-phase approach to migratinq oller
domain-based networks to Active Directory. The erislLne \T f.t-r Priman-
348 Chapter Seven Windows NT (2000)
Client and User' 'lbols One of the key concerns for distributed computr-r:
users is providing a consistent desktop and network view for users regalr-
less of which node they log into. This problem is exacerbated by the rap-"-
adoption of notebook computers. These portable machines are consisteni,-"
moved around the network and often are not even connected to the netwol\
To provide as consistent an environment as possible, Windows 2000 intr¡-
duces three new technologies: the application installation service, IntelliNfl:-
ror, and client-side caching.
The Application Installation Service is designed to provide a consister
set of applications to be available to a user. Applications are assigned:-
users or groups of users. Whenever a user logs into a network station, th.
application installation service will ensure that the required applications ar=
installed on the station. If not, the service will install the applications as par:
of the login sequence. In addition to providing a more consistent enviro:-
ment to usefs, the application installation service promises to greatly redu¡=
time and expense associated with the distribution and maintenance of ne:-
work applications.
To further enhance the capability of Windows to provide a consiste:':
desktop and operating environment to mobile users, IntelliMirror sen-ic¿-
can be deployed. IntelliMirror can be thought of as a next-generation roan- -
ing profile that ensures a usel's desktop, data, and applications are availal'-.
wherever they log into the network. To ensure that a user's environment l.
always availabie, IntelliMirror caches user data on each workstation ar-*
automatically synchronizes updates to a central server.
Although these technologies can greatly increase the consistency of =
Llser's operating enrrironment, another issue with notebook computers ::
access to data when the notebook is not connected to the network' Th¡
\licrosoft Briefcase service, introduced in Windows 95, provided a means .:
svr-rchronizing manually selected files between a notebook and the networr
\\-indorrs 2000 expands on the capability of Briefcase with the introductic:
of Clier-rt-side caching. Client-side caching transparently synchronizes dar:
betrteerL the notebook and the network. Whenever the user logs into the ne:-
ll'.
nize with the network copy of the data, ensuring that an updaied é'ppy of the;'* ,r *j'i
user's data is aiways available regardless of whether the user is cbnqected, t to .'
s 'r
o'
the network , ...r."' ''. -. -- ",,..,a-'ts
White these features address many of the administrative concerñs'o{-. *'n'.j#F
*-
client systems, Microsoft provides the Systems Management Server produbts--
for iarger systems that require tighter administrative control.
Securit-v In the Internet age, one of the most dynamic network operating
system areas is security. NT Server 4.0 provides excellent security in stand-
alone mode, but network security has been probiematic with new vulnera-
bilities exposed and patched on a consistent basis. As mentioned in a
previous section, NIT 4.0 uses a modular security system. Windows 2000 uti-
lizes this modular system to enhance nefir'ork securitv by integrating stan-
dardized authentication and encryption technologies.
In addition to the standard Microsoft passlvord auihentication and access
control list authorization system, Windows 2000 integrates support for Ker-
beros Version 5 directly into the operating system. A standardized authentica-
tion and authorization system, Kerberos support allows Windows 2000 to
directly integrate with other client/server and mainframe-based security sys-
tems while enhancing the security model of a Windows only network. Please
refer to Chapter 16 for additional information on Kerberos.
In addition to Kerberos support, the Windows 2000 authentication
model provides a public key server and integrates smart card support
directly into the security infrastructure. By providing a public key certifi-
cate server, Windows 2000 al1ows an organization to implement public key
encryption technoiogies in their organization without the hassle and
expense of relying on external commercial certificate servers. Smart card
support integrates into the certificate sen ices to a1low the use of smart cards
to enhance the standard software-only solutions for client authentication,
logon, secure storage, and system administration.
In addition to these enhancements to the Windows security infrastruc-
ture, support for the NTFS file encryption and the IP Security Protocol (cov-
ered in other parts of this section) further enhances the security of
Windows-based networks.
Communication Protocols
INTRANET INTERNET
iPr ,.,aie lP Addresses) (Assigned lP
ie. 192..168.x.x Addresses)
ffi& NTWAN/RBMOTEACCESS
-+-
Windows '9x Client with
integral modem and
running Remote
Access Software
Software
ú._l
ll n¡e#ll
lLffil ISDN Digital Network Seruice
I-:rr----:--
t: -il ... out to other network
Windows for Windows NT/2000 attached resources -
Workgroups Client with Server running Remote including Netware servers
integral ISDN adapter Access Software
and running Remote
Access Software
-lqFr
WindowsSen'erlnteroperability 353
l-r In keeping with the overall objective of RAS to allo$. the remote client all
of the functionality of local clients, RAS allows temote clients to run NBF,
te TCP /IP, or IPX/SPX communication protocols in any combination. As illus-
w trated in Chapter 4, the only layer that must change for the trip across the
WAN is the data-link layer. In this case, the wide area data-link lar-er proto-
td cols that encapsulate the upper layer protocols are PPP (Point-to-Point Pro-
tocol) and SLIP (Serial Line Internet Protocol).
Because RAS supports TCP/IR NBF(NeIBEUI), and IPX/SPX, \et\\are
applications, NT applications, and NeIBIOS applications can all be accessed
and executed by the remote client. NetWare servers available to local clients
are equally available to remote clients. Any additional gateway senices
efs offered by the local NT selver such as Internet gateways or SNA gater,r'al-s to
ús. IBM mainframes are equally accessible by remote clients. Figure 7-26 tllus-
ñ trates the communication protocol architecture of RAS clients and servefs.
Baf
Er-
# ffi WNDOWS SBR\TR INTEROPERABITITY
üÉ
orF Because of increased demands to be able to share information more quickly
the and easily within a company, as well as the increased number of corporate
ng- mergers and acquisitions, interoperability between different types of net-
llfe- work operating systems has become an increasingly important functional
d characteristic. Windows natively provides tools design to promote interop-
erability with NetWare and UNIX systems.
NT RAS NT RAS
IHASI
API T--': NETBIOS IP IPX
'\-,2 i
I
gateway router router
rrüt 1
Network
lnterface Card
fi
: POTS
Ffs ISDN
to local
WAN Service nehvork
x.25
-^
Figure 7-26 NT Client/Server Communication Protocols
3s4 Chapter Seven Windows NT (2000)
Windows Clients
SYS:PUBLIC
Netware clients can gain access to windows resources through File and
Print services for Netware. File and print services for Netwalre allow a
windows server to appear as a Netware 3 server. Netware clients authenti-
cate and attach to the windows server just as they would a Netware server.
Windows/UN[X Interoperability
sullilt{R}
Windows NT is a powerful network operat- with native NetWare file systems as well. In
ing system gaining significant market share terms of communications protocols, NT is
thánics to its ability to serr¡e as a powerful able to support TCP/IP, iPX/SPX, or NBF
applications server as well as offering file and (NeIBEUI Frame) as its native communication
print services. The reliability, scaiability,,and protocol providing all transport services
portability that characterize Windows NT are between NT clients and servers. In addition,
directly attributable to its architecture, includ- NT also supports DLC and AppleTalk com-
ing a CPU-specific hardware abstraction layer munications protocols f or interoperability
and strict enforcement of program access to with IBM mainframes, networked printers,
hardware resources through the NT kernel. and Macintosh comPuters.
One of NT's big advantages over market Unlike NetWare 4, which organizes an
leader NetWare is its ability to support SMP entire enterprise network's obiects into a sin-
u'ith its multithreaded kernel. gle NDS database, an NT enterprise network
Windows NT is designed for interoper- is divided into numerous independent
ability or extensibility on a number of levels. domains. User accounts and access lists for
For example, NT support numerous file sys- each domain are administered by designated
tems including FAI, NTFS, and AppleShare. computers known as primary domain con-
In addition, it is also able to communicate trollers. Users are able to access network
Key Terms 357
attached resources on numerous domains NT includes remote access services that pro-
thanks to specialized trust relationships estab- vide both outstanding security as well as
lished between domain controllers. sophisticated interop erabilitl' ¡ft ¿n¡s to sup-
An upcoming release of Windows NT port of multiple commrurications protocols. In
now called Windows 2000, will expand on the short, NT RAS offers tull lunctionality to
shortcomings of Windows NT 4.0 by imple- remote clients eqr-rir-alent to that available to
menting a comprehensive directory services locally attached IA-indoiis clients.
solution. Improvements in SMP capability, Market sur\¡e\-s are ¡.rl-:istently showing
clustering, and load balancing are designed to increased interest in \\-,[Link]¡r'' s \T as an enter-
allow Windows 2000 to scale to larger enter- prise network operatln: sr. >:em [Link]
prises. well suited to high-eni e"lii':atrons or data-
In recognition of the increased emphasis base server roles.
on remote and mobile computing, Windows
:ES
;\
-: KEY TERIIS
.f'..:
RE\lEw QUESTÍO\s
28 Explain the difference between domains, JJ. Explain what NAI is and how it is most ofien
trees, and forests in terms of the Active Direc- used.
tory. J+ \Atrhat arethe key features of the Internet
29. How are the Active Directory and DNS Printing Protocol?
related? 35. What is NFS and what alternatives are avail-
30. How would an NT 4.0 domain consisting of able for support of NFS by NT?
six NT Servers be migrated to Windows 2000 36. \Alhat are the business layer issues behind the
and the Active Directory? demand for tightly integrated remote access
31. What improvements in security were intro- services?
duced in Windows 2000? 5/. Describe NT RAS in terms of supported com-
What is different about DDNS compared to munication protocois, WAN services, func-
normal DNS? Why is this difference signifi- tionality, and architecture.
cant?
1. Interview several organizations that have 5. Interview several organizations that have
implemented NT. Determine the domain implemented NT. Focus especially on those
architecture employed in each case. organizations that have implemented DHCP.
Describe the organization structure and What was their motivation? What has been
relate the organization size and structure to iheir experience with DHCP to date? What
the chosen domain architecture. In your unique requirements come into play when
opinion, was the domain architecture impie- DHCP must be supported across networks
mented the best alternative? Why or why using interneiworking devices such as
not? routers?
2. lnterview several organizaüons that have 6. Inten'iew several organizations that support
implemented NT. Document the chosen com- both Nf and NetWare LANs. \ /hich interop-
munications protocol in each case. Draw net- erability products are employed and what
work diagrams indicating the functionality is deLir-ered by each product? Is
communications protocols that must be sup- each product employed more for interoper-
ported at clients and servers. Determine why ability or transition? Be su¡e to note u'hether
each communication protocol was chosen in NetWare LANs are 3.x or 4.x.
I
each case. Were there alternatives that could Investigate several organizations that have
tt- have been implemented in any cases? implemented NT RAS. Draw detailed dia-
t- J. Interview several organizations that have grams of their architecture including any
implemented NT. Determine the functional additional hardware or software required. Be
use of NT. Is it being used as an application sure to also include business motivation and
server? database server? file server? print delivered functionality. Were alternatives to
server? more than one? What other network NT RAS considered?
operating systems are being employed for 8. I¡rterview several organizations that are con-
which function? sidering, or have recently upgraded to Win-
4. Investigate DLC as implemented on network dows 2000. What were the business reasons
attached printers such as the HP 4Si. What for the upgrade?
m functionality does DLC offer? What is 9. Interview several organizations that are con-
required on both the printer and NT in order sidering or have recently upgraded to Win-
to implement it? Are alternatives to DLC dows 2000. What were the business reasons
available? for the upgrade?
10 Interview several organizations that are con- sis grid describing the key features of these
sidering or have recently upgraded to Win- products.
dows 2000. What islwas their migration L4 Gather information concerning comparative
plan? market share of NetWare and NT from profes-
11. Interview several organizations that installed sional periodicals. Present your findings in
Windows 2000. How did they implement the graphical format. Explain your results. What
Active Directory? How is their directory trends are developing? Is NetWare or NT
structure designed? being adopted more in some market segments
12. Interview several organizations that have than in others? As a network manager, what
upgraded to Windows 2000. Did they find would be r-our strategic plan for a network
any unexpected problems in the upgrade operatir-rg s\-stem given the results of your
process? research?
13 Research products designed to integrate Win-
dows and UNIX. Prepare a technology analy-
Crss Srunv
Georgia Public Broadcasting Cets with the ATNI Prograrn
Georgia Public Broadcasting cost of $250,000. While the certai¡ IPX and other applica-
(GPB) believes the arrival of fiber network chewed up half tions are likely to be around
IP convergence is no longer a the project budget, the organi- for a rr-hile.
question, but rather, simply a zation figured fiber cabie The network is anchored
matter of time. would provide a solid infra- br' 16 Madge Networks Col-
This conclusion has driven structure for at least 15 years. lage 750 ATM switches, which
the public radio and television The fiber infrastructure is support a batch of servers and
station to build a high-speed the foundation for the nert' 180 rvorkstations. The ATM
ATM network designed to ATM network that GPB netn'ork lets GPB deliver
handle data, voice and video. started rolling out about a 155M bitlsec to the desk-
As a public broadcasting year ago. The organization top-plenty of bandwidth
company, GPB isn't used to previously ran an FDDI and even for emerging multime-
having a lot of money for its Ethernet network. dia applications, says Bill
projects. But when the com- The station chose AT\l Burson, the organization's
pany moved into new facili- becauseit deemed the tech- assistant director of IT.
ties a couple of years ago, nology best suited to han- GPB is awaiting tools from
GPB gave its IT department dling multiple protocols and Madge that will let the com-
$500,000 to build a corporate highspeed multimedia appli- pany monitor the ATM net-
network that would last well cations. \¡\hile CPB is in the work's performance via
into the next century. midst of migrating to an ail-IP Hewlett Packard OpenView,
The station began by network based on NetWare says Burson, who is part of a
wiring the building with mul- 5.0, the need for multiproto- three member team responsi-
timode fiber-optic cable at a col support is key because ble for GPB's entire network.
Business Case Studv Quesr.-:--' 361
GPB chose Madge because Ethernet are fast, theY've Yet Madge that will let GPB ¡-:::-
:he vendor offered its Prod- to be tested like ATM, Burson antee bandwidth to desktoP
icts at one-third of the list says. users, an important consicler-
:rice. Also, at the time of the Today the network is suP- ation for time-sensitive aPPLi-
ransaction, Madge was the porting typical aPPlications, cations such as video.
.',nly major player supporting such as Microsoft Office, and Next year, GPB exPects to
\ovell's IPX protocol, Burson Oracle database aPPlications add voice to its AIM network
with the used to store GPB member traffic mix. The organization
=ays. The one catch
\ladge deal was ihat GPB had information. plans to attach its Mitel
.o agree to be a showroom for But the station Plans to SX2000 PBX, which comes
rhe vendor. begin running video over its equipped with an ATM inter-
"It hasn't been a Problem network by year-end. GPB is face, to the ATM net. The sta-
at all," Burson saYs. "Madge considering hooking uP a tion figures it will connect its
representatives were in here Real Networks RealVideo voice system to its member-
half a dozen times when we server to its ATM network. ship database server, Burson
iirst moved in, and that's Video applications on taP says. This plan will enable
about it." include online video ediiing callers to be identified bY
While AIM to the deskioP and the exchange of videos their phone numbers and will
is taÍe/ Burson's grouP with other educational orga- tet GPB put members' latest
decided ATM was the onlY nizations. information in the hands of
technology that would let "We should be streaming call center agents more
GPB send voice and video on video internally instead of quickly.
the network over which all of handling VHS tapes," Burson It remains to be seen how
-!:_
iis data is running. AIM has says. "But until recentlY, ATM handles voice and
proven standards, such as video servers were cost-Pro- video. But to date, ATM has
Multi-Protocol over ATM, hibitive and the quality was- proven to be more stable and
--I that let usets suPPort mixed n't good enough." far less complicated to deal
l-'- protocol environments. While Burson is awaiting avail- with than people might think,
'i.h technologies such as Gigabit able bit rate software from Burson says.
.-.1
-F\ f with the ATM Program," Netuork world' r'o1 16' no 14
source: DenisePappalardo, "Georgia Public Broadcasting-Gets
(April 5, 1999), p.'i4. Copyright (Ápril 5, 1999), Network World'
l>\-
;:r1
:E-
BUSINESS CASE STUDY QUESTI0NS " " "
Eili
-t:
Activities 2. Detail any questions about the case that may
occur to you for which answers are not clearly
1. Complete a top-down model for this case by
:-am stated in the article.
gleaning facts from the case and placing them in
-
ih. ptop"t layer of the top-down model' After
!r 1-4.
Business
completing the top-down modei, analyze and
rC !-
..::.- detail those instances where requirements were 1. What r,r'as the key business driver for Georgia
clearly passed down from upper layers to lower Public Broadcasting?
--: a layers of the model and r.t'here solutions to those 2. What are Georgia Public Broadcasting's plans
._
! ,\l--: requirements were passed up from iower layers for telephonY integration?
::k. to upper layers of the model'
362 Chapter Seven Windows NT (2000)