Flylib.com
Microsoft Corporation Staff, IT Professional Staff - Microsoft Windows 2000 Server Operations Guide
Microsoft Corporation Staff, IT Professional Staff - Microsoft Windows 2000 Server Operations Guide
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 404
BUY ON AMAZON
Introduction
Storage, File Systems, and Printing
Disk Concepts and Troubleshooting
Basic and Dynamic Disks
Terms
Features of Basic Disk
Features of Dynamic Disk
Features Common to Both Basic and Dynamic Disks
Disk Sectors Critical to Startup
Master Boot Record
Boot Sector
Troubleshooting Disk Problems
Viruses
Damaged MBRs and Boot Sectors
Other Disk Problems
Additional Resources
Data Storage and Management
Overview of Data Management
Current Trends
Storage Features
Removable Storage
Removable Storage Service
Removable Storage Database
Removable Storage Snap-in
Basic Concepts
Media Identification and Naming
Media Handling and Usage
Administering Removable Storage
Remote Storage
Basic Concepts
Benefits
Local Storage Management
Disk Management Attribute
Local Storage
Remote Storage Engine
Remote Storage Device Support
User Interfaces
Remote Storage and Windows 2000
Multiple Remote Storage Interactions
Remote Storage-Aware Products
Remote Storage Protection and Recovery
Disk Management
Fault-Tolerant Disk Management
Dynamic Disks
Disk Quotas
Disk Quotas and Free Space
Administering Disk Quotas
Additional Resources
File Systems
About Windows 2000 File Systems
FAT File System
The NTFS File System
Using Long File Names
Compact Disc File System
Universal Disk Format
Comparing FAT16, FAT32, and NTFS
Comparing FAT File Systems
FAT16 vs. FAT32
Advantages of NTFS
Which Is Faster - FAT16, FAT32, or NTFS?
Maximum Volume Sizes
Controlling Access to Files and Folders
POSIX Compliance
File and Folder Compression
Compressing and Decompressing Folders and Files
Effects of Compression on Moving and Copying Files
NTFS Compression Algorithm
Compression Performance
Other Compression Methods
NTFS Recoverability
Recovering Data with NTFS
Caching and Data Recovery
Cluster Remapping
Features Built on Reparse Points
Remote Storage
Volume Mount Points
File System Tools
Cacls: Displays and Modifies NTFS Access Control Lists
Compact: Compresses and Decompresses NTFS Files and Folders
Compress: Compresses Files or Folders
Convert: Converts a Volume from FAT to NTFS
DirUse: Scans a Directory and Reports On Disk Space Usage
Expand: Expands Compressed Files
Mountvol: Displays, Creates, and Deletes Volume Mount Points
Additional Resources
Network Printing
Introduction to Network Printing
Print Devices, Print Clients, Printers, and Print Servers
Local and Remote Printing
Web Printing
Architecture
Graphical Device Interface
Printer Driver
Client Spooler
Remote Print Provider
Print Router
Print Server Service
Server Spooler
Local Print Provider
Print Processor
Print Monitors
Sharing Printers
Local Printing
Remote Printing
Internet Printing
Earlier Network-Interface Printing
Working with Other Operating Systems
Printing from Windows 95 and Windows 98 Clients
Printing from Other Microsoft Print Clients
Printing with UNIX Clients and Servers Using LPRLPD
Printing with NetWare Clients and Servers
Printing with Macintosh Clients and AppleTalk Printers
Printing and Active Directory
Printing and Directory Service Overview
Publishing Windows 2000 Printers
Supporting Non-Windows 2000 Printers
Group Policy Settings
Printer Location Tracking
Printing and Clusters
Creating the Spooler
Installing Printing Components
Adding a Printer to a Cluster
What Happens at Failover
Monitoring Printer Performance
Using System Monitor
Auditing Printing Events
Logging Spooler Events
Utilities
Performance Monitoring
Overview of Performance Monitoring
Performance Monitoring Concepts
Scope of Performance Data
Data Collection Architecture
Monitoring Tools
System Monitor
Performance Logs and Alerts
Task Manager
Resource Kit Performance Tools
Starting Your Monitoring Routine
Your Minimum Monitoring Configuration
Establishing the Baseline
Analyzing Monitoring Results
Identifying Potential Bottlenecks
Investigating Bottlenecks
Troubleshooting Problems with Performance Tools
Investigating Zero Values
Investigating Other Issues with Performance Tools
Controlling Performance Monitoring Overhead
Specific Monitoring Scenarios
Monitoring Remote Computers
Monitoring Servers and Services
Monitoring Legacy Applications
Monitoring 16-bit Windows Applications
Running 16-bit Windows Applications in a Separate Process
Monitoring MS-DOS Applications
Integrating the System Monitor Control into Office and Other Applications
Placing the Control in an Office Document or on a Web Page
Formatting the Control in a Document
Evaluating Memory and Cache Usage
Overview of Memory Monitoring
Determining the Amount of Installed Memory
Understanding Memory and the File System Cache
Optimizing Your Memory Configuration
Adjusting Paging File Size
Establishing a Baseline for Memory
Virtual Memory Usage
Default Services Memory Consumption
Investigating Memory Problems
Investigating Memory Shortages
Investigating Disk Paging
Investigating User-Mode Memory Leaks
Investigating Kernel-Mode Memory Leaks
Monitoring the Cache
Resolving Memory and Cache Bottlenecks
Additional Resources
Analyzing Processor Activity
Overview of Processor Monitoring and Analysis
Processor Counters
Resource Kit Tools for Processor Monitoring
Establishing a Baseline for Processor Performance
Selecting Counters for Baseline Monitoring
Selecting Times for Baseline Monitoring
Recognizing a Processor Bottleneck
Examining the Processor Time Counter
Observing Processor Queue Length
Monitoring Interrupts
Monitoring Context Switches
Processes in a Bottleneck
Identifying Active Processes
Isolating Processor-Intensive Workloads
Reducing Single-Process Bottlenecks
Observing Processor Consumption by Multiple Processes
Threads in a Bottleneck
Single vs. Multiple Threads in a Bottleneck
Charting Processor Usage Per Thread
Context Switches
User Mode and Privileged Mode
Advanced Topic: Changing Thread Priority to Improve Performance
Examining and Adjusting Thread Priority
Determining and Tuning Priority
Windows 2000 Configuration and Process Priority
Testing Priority Changes
Eliminating a Processor Bottleneck
Additional Resources
Examining and Tuning Disk Performance
Disk Monitoring Concepts
Configuring the Disk and File System for Performance
Configuring Your File System
Configuring Disk Alignment
Working with Disk Counters
Monitoring Disk Space
Monitoring Disk Efficiency
Establishing a Baseline for Disk Usage
Data Collection
Data Analysis
Investigating Disk Performance Problems
Monitoring Paging
Monitoring Usage
Monitoring Queue Length
Resolving Disk Bottlenecks
Evaluating Cache and Disk Usage by Applications
Random and Sequential Data Access
IO Request Size
Investigating Disk Usage by Applications
Monitoring Network Performance
Introduction to Network Performance Analysis
Tools for Monitoring Network Performance
System Monitor
Trace Logs
Network Monitor
Resolving Network Bottlenecks
Measuring Multiprocessor System Activity
Overview of SMP Performance and Monitoring
Benefits of Scaling
Analyzing Performance on SMP Systems
SMP Impact on System Resources
Monitoring Activity on Multiprocessor Systems
Examining Processor Time Data
Observing Processor Queue Length
Analyzing Interrupt and DPC Activity
Monitoring Context Switches and Threads
Optimizing and Tuning Multiprocessor Installations
Thread Partitioning
DPC (Software Interrupt) Partitioning
Hardware Interrupt Partitioning
Upgrading or Adding Processors
Application Design and Multiprocessor Performance
Network Load Balancing and Scaling
System Recovery
Planning a Reliable Configuration
Planning Considerations
Approaches to Planning
System Maintenance
Planning for Security
Hardware and Software Upgrades
Contingency Planning
Planning Tasks
Maintaining Configuration and System Information
Developing a Recovery Plan
Training Personnel for Recovery
Creating a Set of Windows 2000 Setup Floppy Disks
Creating a Windows 2000 Startup Floppy Disk
Planning a Fault-Tolerant Disk Configuration
Dynamic Disks and Disk Groups
Striped Volumes
Mirrored Volumes
RAID-5 Volumes
Configuring and Using Mirrored Volumes and RAID-5 Volumes
Guidelines for Configuring Mass Storage
Fault-Tolerant Hardware Versus Software
Testing a Fault-Tolerant System
Avoiding Single Points of Failure
Avoiding Computer Component Failure
Using an Uninterruptible Power Supply
Avoiding Disruptions to Network Connections
Additional Resources
Backup
Overview of Backups
Backup Types
Storage Devices and Media
Backup Strategies
Security Considerations
Establishing a Backup Plan
Backup Scenarios
Establishing a Backup Schedule
Developing Backup and Restore Procedures
Backing Up System State Data
Boot and System Files
Active Directory
Certificate Services Information
Cluster Database
Registry
Performance Counter Configuration
Component Services Class Registration Database
Using Backup
Selecting Backup Type
Selecting Backup Media
Files Skipped During Backup
Encrypted Files
Backing Up Files on Your Local Computer
Backing Up Files on Remote Computers
Backing Up Windows 2000 Services and NTFS Features
Remote Storage Considerations
Backing Up Remote Storage Databases
Protecting Remote Storage Media
Remote Storage Self-Backup
Exchange Database
SQL Database Backup
Logical Volume Information
Repair, Recovery, and Restore
Repairing a Windows 2000 Installation
Using the Recovery Console
Using the Emergency Repair Disk
Restoring System State Data
Restoring the Registry
Restoring Data
Restoring Files from Third-Party Backup Programs
Restoring File Security Settings
Recovering Your Disk Configuration
Recovering a Mirrored or RAID-5 Volume
Recovering a Mirrored Volume
Recovering a RAID-5 Volume
Recovering Data in Remote Storage
Using Rstore.exe
Restoring the Remote Storage and Removable Storage Databases
Recovering Managed Files
Recovering from Bad Media
Additional Resources
Troubleshooting
Troubleshooting Strategies
Technical Support and Services
Project Ascent
Other Resources
Troubleshooting Tools for Windows 2000
System Information
Device Manager
AVBoot
System File Checker
Windows Update
NetDiag
IPConfig
NBTStat
PathPing
IPSecMon
Troubleshooting Options
Stop Messages
Event Viewer
Error and Event Messages Help
System Monitor
Troubleshooters
Knowledge Base
Windows 2000 Registry
Troubleshooting Suggestions
Keep Records
Keep Notes
Refer to Documentation
Finding Information About the Problem
Setting up the System for Further Troubleshooting
Troubleshooting Techniques
Follow the System Checklist
Analyzing Symptoms and Factors
Checking for Common Issues
Isolating the Source of the Problem
Developing an Action Plan
Contacting Technical Support Services
Troubleshooting Hardware Problems
Hardware Compatibility List
Other Approaches to Troubleshooting Hardware Problems
Troubleshooting Specific Problems
Troubleshooting Setup
Troubleshooting Stop Messages
Troubleshooting the Startup Process
Troubleshooting Networking Problems
Troubleshooting Video Problems
Troubleshooting Services and Drivers
Troubleshooting Problems with Portable Computers
Additional Resources
Startup Process
Windows 2000 Startup Requirements
Starting Windows 2000
Power-On Self Test Process
Initial Startup Process
Bootstrap Loader Process
Selecting the Operating System
Detecting Hardware
Loading and Initializing the Kernel
Logging On to Windows 2000
Troubleshooting Startup Problems
Options to Use When a System Does Not Start
Safe Mode
Recovery Console
Emergency Repair Disk
Additional Resources
Windows 2000 Stop Messages
System Messages
Stop Messages
Stop Message Screen Sections
Types of Stop Messages
Troubleshooting Stop Messages
Generic Troubleshooting Procedures
Troubleshooting Common Stop Messages
Hardware Malfunction Messages
Additional Resources
Microsoft Corporation Staff, IT Professional Staff - Microsoft Windows 2000 Server Operations Guide
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 404
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Phase: Envision
Practice: Product Feature List
Speculate Summary
Adapt and Close Summary
Implementing the Vision
C++ How to Program (5th Edition)
Passing Arrays to Functions
When Constructors and Destructors Are Called
const (Constant) Objects and const Member Functions
protected Members
Introduction
Extending and Embedding PHP
Summary
Declaring and Accessing INI Settings
Summary
Summary
Extension Generators
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Establishing Connections: Networking Modes and Switching Modes
Data Flow
IP Services
2G: Digital Cellular Radio
Mobile TV
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Making Quantitative Decisions
Expense Accounting and Earned Value
Quantitative Time Management
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the Authentication Process
Oracle and PL/SQL
Running Operating System Commands
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies