SlideShare a Scribd company logo
Windows NT/2000

 Microsoft acquired most of its networking
technology from 3Com Corporation.

 Microsoft incorporated the 3Com
technology in its main product lines, starting
with LAN Manager, a dedicated file and print
server
Windows NT/2000


 Microsoft then went on to extend its
networking technology into workgroup
environments with the release of
Windows for Workgroups and Windows
95.
Windows NT/2000


 None of these Microsoft products
offered the stability or performance of a
dedicated Novell NetWare server--but this
changed with the advent of Windows NT
Server.
Windows NT/2000


 Windows NT 4 could be considered
Microsoft’s first commercially
successful venture into the world of
networking.
Windows NT/2000


 Sure, they had LAN Manager and they had
Windows NT 3.51, but it really wasn’t until
NT 4 was released that the marketplace really
started to jump on the Microsoft networking
bandwagon.
Windows NT/2000


 Windows NT 4 Server is an
enterprise-oriented product that can
compete head-to-head with Novell
NetWare.
Windows NT/2000


 Windows NT 4 Server (and Windows NT
4 Workstation) is a genuine commercial-
class operating system--Microsoft's first
entry into the marketplace of enterprise-
oriented data processing.
Windows NT/2000


 One final key point that separates
Windows NT 4 Server from NetWare is that
Windows NT 4 Server is clearly more than
just a file and print server--Windows NT 4
Server is an application server.
Windows NT/2000


 Unlike NetWare, which requires
vendors to write NLMs, Windows
NT 4 Server can host conventional,
Windows-based applications.
Windows NT/2000

 Windows NT Server can be hosted by
systems using Intel or DEC (Digital Equipment Corp.)
Alpha processors. Earlier in its history,
Windows NT Server also supported MIPS
(Millions of Instructions Per Second) processor systems;
however, MIPS will no longer be supported as
of the release of Windows 2000.
Windows NT/2000


 Support for NT on the PowerPC has also been
phased out by both Motorola and IBM, and it is
unlikely that Microsoft will continue to support
the PowerPC architecture in subsequent releases.
Windows NT/2000

 The basic functions of Windows NT Server
are consistent across all these types of systems,
but additional application programs might not be
available for all processor types. For this reason,
Intel-based machines are deployed in the
majority of Windows NT Server installations.
Windows NT/2000

 In addition to supporting different
types of systems, Windows NT supports
Symmetrical Multi-Processing (SMP);
therefore, Windows NT can immediately
take advantage of systems with multiple
CPUs.
Windows NT/2000


 Windows NT Server runs as a non-
dedicated operating system--you can use the
same system for desktop applications if you so
desire. In fact, Windows NT Server is very
similar to its desktop counterpart, Windows
NT Workstation.
Windows NT/2000

 Detailed analysis has shown that the
operating system core is the same for both
products. Windows NT Server has, however,
been fine tuned for server performance and
includes additional software not available for
Windows NT Workstation.
Windows NT/2000


 You can manage a Windows NT Server
from the local keyboard and monitor and, as
in the case of NetWare, you can manage it
from other workstations in the network.
Windows NT/2000

 In terms of security, Windows NT
 offers two types of security models:

         1) Workgroups (Peer to Peer)

         1) Domains (Client/Server)
Windows NT/2000

 In a workgroup model, the user authentication
process occurs on each system in the workgroup.
Other workgroup systems "trust" that each
system has performed the authentication.

 From a broader perspective, workgroups are
informal groupings of systems that elect to share
resources with one another.
Windows NT/2000


 In a domain model, however, all users
are authenticated by a central server
(termed the domain controller). Using a
centralized server provides greater control
and security.
Windows NT/2000

 Unlike workgroups, domains can be
interconnected. When you interconnect
domains, you can establish trust
relationships between them so a user
logged on to one domain can access
resources in another domain without
being forced to log on to the second
domain.
Windows NT/2000



 Although this approach works well in
simple organizations, trust relationships can
grow very complex in large organizations.
Windows NT/2000


 For that reason, Microsoft has moved
toward global, NDS-like directory services
called Active Directory Services (ADS) with
Windows 2000.
Windows NT/2000


 A directory service is just a way to
keep track of all that stuff on your
network. It is a way to manage it,
secure it, and make it available to
your users.
Windows NT/2000


 Directory Services is the major difference
between NT 4 and Windows 2000. As a matter
of fact, many of the other differences spring
from the fact that Windows can now use a
directory service.
Windows NT/2000


 In Windows NT 4, object management
was done at the domain level, and Microsoft
suggested that you have a maximum of
40,000 objects per domain.With Windows
2000, you can support millions of objects per
domain or partition.
Windows NT/2000


 Windows 2000 uses a system called
the Global Catalog to provide a single
view of the directory objects that may be
stored in multiple domains.
Windows NT/2000


 Windows NT has been evolving for
many, many years. Starting with the
first version in 1993, this modular
approach to an operating system has
proven itself to be secure and stable.
Windows NT/2000

 The Windows NT platform now
has a commanding hold of the
majority share of the business
market and looks to continue its
winning ways with Windows 2000
and beyond.
Features of Windows 2000/NT
Setup Manager
Setup Manager provides a graphic interface to the users to make
    installation scripts.
Faster Multitasking
It allows user to run multiple programs and perform different
    tasks such as browsing, listening music, downloading and
    working on the files at the same time. In Multitasking 32-bit
    architecture. 

Troubleshooters
It assists users to troubleshoot, optimize and configure a lot of
    functionalities of Windows 2000 Professional, which results in
    greater performance and greater productivity.
Personalized Menu
It adapts the start menu to show the applications that you most work
    on.
Cont….
• Encrypting File System
  With EFS each file can be encrypted with the
  randomly generated key. The encryption and
  decryption features provide a security layer to the
  files and folders.
• IP Security Support
  IPSEC is a security protocol that protects the data
  over the network. In Virtual Private Networks,
  IPSEC plays an important role in securely
  transmitting the data to the remote location
  through internet.
Cont….
• Microsoft Management Console
  MMC provides centralized environment for the
  management tools and you can access MMC by typing
  “MMC” at the run. You can configure a lot of programs
  and objects through MMC
  Intellimirror
• Intellimirror provides enhanced access to the information
  and software. Intellimirror technology is useful for the
  mobile computer users. Intellimirror requires Windows
  2000 server to run and the offline feature enables users to
  work on their important files when the network
  connections are unavailable
Cont…..
• Group Policy
  Group policy feature of the Windows 2000 Professional
  operating system enables the System/Network Administrators
  to define rules about security, desktop settings, application
  settings and user rights. Group policy works with the active
  directory and it requires Windows 2000 Server.
• Hibernation
  Hibernation is a very useful utility in Windows 2000
  Professional and when you re-activate/turn on your computer
  hibernation restores your programs without losing your data.
• Synchronization
  Synchronization makes your files and folders updated by
  comparing the files and folders on the network server.
• Net Meeting
  With Net Meeting Conferencing software you can have real
  time online chat, teleconferencing with the people throughout
  the world.
Cont…..
• Offline Viewing
  Offline Viewing feature in Windows 2000 Professional makes
  entire web pages including graphics for offline view when
  internet is not available.
• Plug and Play
  More than 65,000 devices support this functionality and it is
  used for installing the new hardware without the minimum
  configurations and work at the user end.
• Auto Correct
  Auto Correct feature automatically corrects the URL
  conventions such as http, com, and .org errors.
• Automated Proxy
  Automated proxy feature in Windows 2000 Professional
  automatically locate the proxy server on the network and
  connect to the internet through that proxy server.
• Internet Connection Sharing
  ICS or Internet Connection Sharing connects your home of
  office computer to the internet through the Dial-Up or
  broadband internet connection such as DSL, Cable Net etc.

More Related Content

What's hot

Linux: LVM
Linux: LVMLinux: LVM
Linux: LVM
Michal Sedlak
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
Hariharan Ganesan
 
windows vs Linux
windows vs Linuxwindows vs Linux
Windows 11 updates
Windows 11 updatesWindows 11 updates
Windows 11 updates
Jatin_Singh
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
Rakesh Kadu
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
kalyanineve
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
vwchu
 
History of Operating system
History of Operating systemHistory of Operating system
History of Operating system
tarun thakkar
 
Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
Adrian Mikeliunas
 
Windows operating system
Windows operating systemWindows operating system
Windows operating system
Leah Gonzales
 
History of Linux
History of LinuxHistory of Linux
History of Linux
Gray-chan Desu
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
Achyut Sinha
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
202066
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
Varnnit Jain
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
Tushar B Kute
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
rahmanitayulia
 
Types of server
Types of serverTypes of server
Types of server
IGZ Software house
 
What is Ubuntu - presentation
What is Ubuntu - presentationWhat is Ubuntu - presentation
What is Ubuntu - presentation
Ahmed Mamdouh
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
IGZ Software house
 

What's hot (20)

Linux: LVM
Linux: LVMLinux: LVM
Linux: LVM
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
windows vs Linux
windows vs Linuxwindows vs Linux
windows vs Linux
 
Windows 11 updates
Windows 11 updatesWindows 11 updates
Windows 11 updates
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
History of Operating system
History of Operating systemHistory of Operating system
History of Operating system
 
Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
 
Windows operating system
Windows operating systemWindows operating system
Windows operating system
 
History of Linux
History of LinuxHistory of Linux
History of Linux
 
Linux operating system ppt
Linux operating system pptLinux operating system ppt
Linux operating system ppt
 
active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
 
Types of server
Types of serverTypes of server
Types of server
 
What is Ubuntu - presentation
What is Ubuntu - presentationWhat is Ubuntu - presentation
What is Ubuntu - presentation
 
Windows 2000 Presentation
Windows 2000 PresentationWindows 2000 Presentation
Windows 2000 Presentation
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 

Viewers also liked

Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Windows Nt 4.0
Windows Nt 4.0Windows Nt 4.0
Windows Nt 4.0school!
 
Diapositivas sistema operativo windows nt
Diapositivas sistema operativo windows ntDiapositivas sistema operativo windows nt
Diapositivas sistema operativo windows ntomaira25
 
Diapositivas windows nt
Diapositivas windows ntDiapositivas windows nt
Diapositivas windows ntomaira25
 
Windows 95
Windows 95Windows 95
Windows 95
jglmary
 
Top 10 Tips for Beginning Linux Users
Top 10 Tips for Beginning Linux UsersTop 10 Tips for Beginning Linux Users
Top 10 Tips for Beginning Linux Users
St. Petersburg College
 
slideshow about windows xp and features
slideshow about windows xp and featuresslideshow about windows xp and features
slideshow about windows xp and featuresJerick Merueñas
 
Windows xp
Windows xpWindows xp
Windows xp
aditi sehgal
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating Systemisma ishak
 
Network operating system
Network operating systemNetwork operating system
Network operating system
Muhammad Shahid
 
Introduction to Windows XP
Introduction to Windows XPIntroduction to Windows XP
Introduction to Windows XP
Roselyn Villanueva
 
Windows Xp Presentation Downing
Windows Xp Presentation  DowningWindows Xp Presentation  Downing
Windows Xp Presentation DowningIWCS
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architectureWiliam Ferraciolli
 
Microsoft Windows Nt
Microsoft Windows NtMicrosoft Windows Nt
Microsoft Windows Ntisma ishak
 
Learn HTML
Learn HTMLLearn HTML
Learn HTML
Jimmy Mander
 
Microsoft Windows 95
Microsoft Windows  95Microsoft Windows  95
Microsoft Windows 95
joeyzombieman
 

Viewers also liked (20)

Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Windows Nt 4.0
Windows Nt 4.0Windows Nt 4.0
Windows Nt 4.0
 
Diapositivas sistema operativo windows nt
Diapositivas sistema operativo windows ntDiapositivas sistema operativo windows nt
Diapositivas sistema operativo windows nt
 
WindowsNT
WindowsNTWindowsNT
WindowsNT
 
Diapositivas windows nt
Diapositivas windows ntDiapositivas windows nt
Diapositivas windows nt
 
Windows nt
Windows ntWindows nt
Windows nt
 
Windows 95
Windows 95Windows 95
Windows 95
 
Top 10 Tips for Beginning Linux Users
Top 10 Tips for Beginning Linux UsersTop 10 Tips for Beginning Linux Users
Top 10 Tips for Beginning Linux Users
 
slideshow about windows xp and features
slideshow about windows xp and featuresslideshow about windows xp and features
slideshow about windows xp and features
 
Windows xp
Windows xpWindows xp
Windows xp
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating System
 
Windows XP
Windows XPWindows XP
Windows XP
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Introduction to Windows XP
Introduction to Windows XPIntroduction to Windows XP
Introduction to Windows XP
 
Windows Xp Presentation Downing
Windows Xp Presentation  DowningWindows Xp Presentation  Downing
Windows Xp Presentation Downing
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Windows Nt 3
Windows Nt 3Windows Nt 3
Windows Nt 3
 
Microsoft Windows Nt
Microsoft Windows NtMicrosoft Windows Nt
Microsoft Windows Nt
 
Learn HTML
Learn HTMLLearn HTML
Learn HTML
 
Microsoft Windows 95
Microsoft Windows  95Microsoft Windows  95
Microsoft Windows 95
 

Similar to Windows nt

T.Jhansi
T.JhansiT.Jhansi
1e operating sysytem4 bicar
1e operating sysytem4 bicar1e operating sysytem4 bicar
1e operating sysytem4 bicarguestd8b1148b
 
Microsoft Windows Server.pdf
Microsoft Windows Server.pdfMicrosoft Windows Server.pdf
Microsoft Windows Server.pdf
James Brown
 
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxLinux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
SHIVA101531
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OS
kinish kumar
 
comparing windows and linux ppt
comparing windows and linux pptcomparing windows and linux ppt
comparing windows and linux ppt
Shivalik college of engineering
 
Jetking questions and answers 8.5x11
Jetking   questions and answers 8.5x11Jetking   questions and answers 8.5x11
Jetking questions and answers 8.5x11sunil kumar
 
Lesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systemsLesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systemsJo Ko
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
Tammy Moncrief
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network Design
Jenny Mancini
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Gene Carboni
 
Windows virsions
Windows virsionsWindows virsions
Windows virsions
Niteesh Chaturvedi
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
PoornimaGhodke3
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentationwebhostingguy
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
rajusandeep12
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
sundas Shabbir
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptx
AyeCS11
 
Welcome
WelcomeWelcome
Welcome
Gaurav Shukla
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
gyanikashukla
 
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
Christoph Adler
 

Similar to Windows nt (20)

T.Jhansi
T.JhansiT.Jhansi
T.Jhansi
 
1e operating sysytem4 bicar
1e operating sysytem4 bicar1e operating sysytem4 bicar
1e operating sysytem4 bicar
 
Microsoft Windows Server.pdf
Microsoft Windows Server.pdfMicrosoft Windows Server.pdf
Microsoft Windows Server.pdf
 
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docxLinux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
Linux and Windows Server CritiqueTeam CPOS 420June 25, 2012.docx
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OS
 
comparing windows and linux ppt
comparing windows and linux pptcomparing windows and linux ppt
comparing windows and linux ppt
 
Jetking questions and answers 8.5x11
Jetking   questions and answers 8.5x11Jetking   questions and answers 8.5x11
Jetking questions and answers 8.5x11
 
Lesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systemsLesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systems
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
Thin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network DesignThin Client Vs. Fat Client Network Design
Thin Client Vs. Fat Client Network Design
 
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
Lesson 3 - Understanding Native Applications, Tools, Mobility, and Remote Man...
 
Windows virsions
Windows virsionsWindows virsions
Windows virsions
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
 
Topic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptxTopic #3 of outline Server Environment.pptx
Topic #3 of outline Server Environment.pptx
 
Welcome
WelcomeWelcome
Welcome
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
DNUG - Workshop: Alles was Du schon immer über den IBM Notes-Client wissen wo...
 

More from Mohd Arif

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Presentation
PresentationPresentation
PresentationMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Networing basics
Networing basicsNetworing basics
Networing basicsMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardwareMohd Arif
 

More from Mohd Arif (20)

Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Presentation
PresentationPresentation
Presentation
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network management
Network managementNetwork management
Network management
 
Networing basics
Networing basicsNetworing basics
Networing basics
 
Loaders
LoadersLoaders
Loaders
 
Lists
ListsLists
Lists
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
Heap sort
Heap sortHeap sort
Heap sort
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Windows nt

  • 1. Windows NT/2000  Microsoft acquired most of its networking technology from 3Com Corporation.  Microsoft incorporated the 3Com technology in its main product lines, starting with LAN Manager, a dedicated file and print server
  • 2. Windows NT/2000  Microsoft then went on to extend its networking technology into workgroup environments with the release of Windows for Workgroups and Windows 95.
  • 3. Windows NT/2000  None of these Microsoft products offered the stability or performance of a dedicated Novell NetWare server--but this changed with the advent of Windows NT Server.
  • 4. Windows NT/2000  Windows NT 4 could be considered Microsoft’s first commercially successful venture into the world of networking.
  • 5. Windows NT/2000  Sure, they had LAN Manager and they had Windows NT 3.51, but it really wasn’t until NT 4 was released that the marketplace really started to jump on the Microsoft networking bandwagon.
  • 6. Windows NT/2000  Windows NT 4 Server is an enterprise-oriented product that can compete head-to-head with Novell NetWare.
  • 7. Windows NT/2000  Windows NT 4 Server (and Windows NT 4 Workstation) is a genuine commercial- class operating system--Microsoft's first entry into the marketplace of enterprise- oriented data processing.
  • 8. Windows NT/2000  One final key point that separates Windows NT 4 Server from NetWare is that Windows NT 4 Server is clearly more than just a file and print server--Windows NT 4 Server is an application server.
  • 9. Windows NT/2000  Unlike NetWare, which requires vendors to write NLMs, Windows NT 4 Server can host conventional, Windows-based applications.
  • 10. Windows NT/2000  Windows NT Server can be hosted by systems using Intel or DEC (Digital Equipment Corp.) Alpha processors. Earlier in its history, Windows NT Server also supported MIPS (Millions of Instructions Per Second) processor systems; however, MIPS will no longer be supported as of the release of Windows 2000.
  • 11. Windows NT/2000  Support for NT on the PowerPC has also been phased out by both Motorola and IBM, and it is unlikely that Microsoft will continue to support the PowerPC architecture in subsequent releases.
  • 12. Windows NT/2000  The basic functions of Windows NT Server are consistent across all these types of systems, but additional application programs might not be available for all processor types. For this reason, Intel-based machines are deployed in the majority of Windows NT Server installations.
  • 13. Windows NT/2000  In addition to supporting different types of systems, Windows NT supports Symmetrical Multi-Processing (SMP); therefore, Windows NT can immediately take advantage of systems with multiple CPUs.
  • 14. Windows NT/2000  Windows NT Server runs as a non- dedicated operating system--you can use the same system for desktop applications if you so desire. In fact, Windows NT Server is very similar to its desktop counterpart, Windows NT Workstation.
  • 15. Windows NT/2000  Detailed analysis has shown that the operating system core is the same for both products. Windows NT Server has, however, been fine tuned for server performance and includes additional software not available for Windows NT Workstation.
  • 16. Windows NT/2000  You can manage a Windows NT Server from the local keyboard and monitor and, as in the case of NetWare, you can manage it from other workstations in the network.
  • 17. Windows NT/2000  In terms of security, Windows NT offers two types of security models: 1) Workgroups (Peer to Peer) 1) Domains (Client/Server)
  • 18. Windows NT/2000  In a workgroup model, the user authentication process occurs on each system in the workgroup. Other workgroup systems "trust" that each system has performed the authentication.  From a broader perspective, workgroups are informal groupings of systems that elect to share resources with one another.
  • 19. Windows NT/2000  In a domain model, however, all users are authenticated by a central server (termed the domain controller). Using a centralized server provides greater control and security.
  • 20. Windows NT/2000  Unlike workgroups, domains can be interconnected. When you interconnect domains, you can establish trust relationships between them so a user logged on to one domain can access resources in another domain without being forced to log on to the second domain.
  • 21. Windows NT/2000  Although this approach works well in simple organizations, trust relationships can grow very complex in large organizations.
  • 22. Windows NT/2000  For that reason, Microsoft has moved toward global, NDS-like directory services called Active Directory Services (ADS) with Windows 2000.
  • 23. Windows NT/2000  A directory service is just a way to keep track of all that stuff on your network. It is a way to manage it, secure it, and make it available to your users.
  • 24. Windows NT/2000  Directory Services is the major difference between NT 4 and Windows 2000. As a matter of fact, many of the other differences spring from the fact that Windows can now use a directory service.
  • 25. Windows NT/2000  In Windows NT 4, object management was done at the domain level, and Microsoft suggested that you have a maximum of 40,000 objects per domain.With Windows 2000, you can support millions of objects per domain or partition.
  • 26. Windows NT/2000  Windows 2000 uses a system called the Global Catalog to provide a single view of the directory objects that may be stored in multiple domains.
  • 27. Windows NT/2000  Windows NT has been evolving for many, many years. Starting with the first version in 1993, this modular approach to an operating system has proven itself to be secure and stable.
  • 28. Windows NT/2000  The Windows NT platform now has a commanding hold of the majority share of the business market and looks to continue its winning ways with Windows 2000 and beyond.
  • 29. Features of Windows 2000/NT Setup Manager Setup Manager provides a graphic interface to the users to make installation scripts. Faster Multitasking It allows user to run multiple programs and perform different tasks such as browsing, listening music, downloading and working on the files at the same time. In Multitasking 32-bit architecture.  Troubleshooters It assists users to troubleshoot, optimize and configure a lot of functionalities of Windows 2000 Professional, which results in greater performance and greater productivity. Personalized Menu It adapts the start menu to show the applications that you most work on.
  • 30. Cont…. • Encrypting File System With EFS each file can be encrypted with the randomly generated key. The encryption and decryption features provide a security layer to the files and folders. • IP Security Support IPSEC is a security protocol that protects the data over the network. In Virtual Private Networks, IPSEC plays an important role in securely transmitting the data to the remote location through internet.
  • 31. Cont…. • Microsoft Management Console MMC provides centralized environment for the management tools and you can access MMC by typing “MMC” at the run. You can configure a lot of programs and objects through MMC Intellimirror • Intellimirror provides enhanced access to the information and software. Intellimirror technology is useful for the mobile computer users. Intellimirror requires Windows 2000 server to run and the offline feature enables users to work on their important files when the network connections are unavailable
  • 32. Cont….. • Group Policy Group policy feature of the Windows 2000 Professional operating system enables the System/Network Administrators to define rules about security, desktop settings, application settings and user rights. Group policy works with the active directory and it requires Windows 2000 Server. • Hibernation Hibernation is a very useful utility in Windows 2000 Professional and when you re-activate/turn on your computer hibernation restores your programs without losing your data. • Synchronization Synchronization makes your files and folders updated by comparing the files and folders on the network server. • Net Meeting With Net Meeting Conferencing software you can have real time online chat, teleconferencing with the people throughout the world.
  • 33. Cont….. • Offline Viewing Offline Viewing feature in Windows 2000 Professional makes entire web pages including graphics for offline view when internet is not available. • Plug and Play More than 65,000 devices support this functionality and it is used for installing the new hardware without the minimum configurations and work at the user end. • Auto Correct Auto Correct feature automatically corrects the URL conventions such as http, com, and .org errors. • Automated Proxy Automated proxy feature in Windows 2000 Professional automatically locate the proxy server on the network and connect to the internet through that proxy server. • Internet Connection Sharing ICS or Internet Connection Sharing connects your home of office computer to the internet through the Dial-Up or broadband internet connection such as DSL, Cable Net etc.