Frame Corner

Frame Top

GSW Study Notes Home

GSW MCSE Notes Home Networking Essentials Notes NT Server 4.0 Notes NT Administration Notes

Module 1: The Windows NT 4.0 Environment

Differences between Windows 95 and Windows NT workstation

 

Technical area

Windows 95

Windows NT workstation 

Minimum hardware 486 with 8-16 MB RAM Pentium with 12-32 MB RAM 12 MB on a RISC-based computer
Hard disk space 40 MB 110 MB
Software compatibility Very high High: does not allow apps. to access hardware directly.
Hardware & device compatibility Very high High: supports most devices 
Installation and deployment Comprehensive detection code and can configure most Less comprehensive detection code, and static driver support
APM & Plug and Play Built-in (also for laptops) Non built-in (some by OEM)
Performance Preemptive multitasking for 32-bit Apps. Preemptive multitasking for all Apps.
Reliability/stability High, improved over WFW Very high: all Apps run in protected memory space.
Security Support for server-based logon validation Complete protection down to file-level (when using NTFS)

 

Features of NT Server:
Note:
Hardware requirements for NTS are:
  • 486DX/33, 
  • 16MB RAM, 
  • and 125MB disk space.

 

Comparing NTS & NTWS

Common features:

 Differences:

Windows NT Architecture Overview
User mode
Kernel mode

There are three types of Kernel mode components in the Windows NT Executive:

The Windows NT Memory Model
Virtual Memory Architecture


     

    1. Most are empty (or unused by the application).
    2. Pages used are redirected to physical RAM by a pointer (invisible for the application).
    3. Some pages that have not been used recently contain another pointer to a 4KB section of the paging file on the hard disk.
Virtual Memory Process

Using the Virtual Memory Process, some of the applications code is kept into RAM while some of it is on the physical disk. The process of managing this is called: "Demand Paging", and follows these 4 steps:

    1. Application attempts to store data in memory.
    2. Virtual Memory Manager intercepts the request, determines the number of pages to use, and then maps unused physical memory to any empty address space in the applications Virtual Memory Space as needed.
    3. If there is not enough physical memory available, the Virtual Memory Manager uses demand paging to find 4KB pages of RAM that hasn't been used recently, and copies the data to the paging file (pagefile.sys). Newly freed RAM is remapped to fulfill the applications request. (i.e. it gets rid of the old stuff not being used and swaps it to the pagefile for the stuff the application wants.)
    4. When the data in the pagefile is needed, pages are copied back into RAM. The new RAM location is mapped back to the same virtual address required by the application. ( i.e. just the reverse of #3)
Virtual Memory Advantages

This way of memory addressing makes Windows NT portable, because it is compatible with the addressing of other microprocessors like:

Workgroups and Domains

 Computers in a Domain:

Advantages

Disadvantages

Centralized account and security administration. Requires at least one Windows NT Server domain controller.
Single user logon provides network-wide resource access. Requires additional planning prior to deployment.

 In a domain Windows NT computers perform the following tasks:

The Workgroup model (uses 1 browserlist):

Advantages

Disadvantages

Does not require a Windows NT domain controller. No centralized account management.
Simple design and implementation. Inefficient for networks that have many computers.
Easy when using only a few computers in at close range. Limited centralized administrative control.

Loggin on Locally

There are five steps to a successful logon process:

  1. WinLogon requests a user name and password. The user name and password are sent to the Local Security Authority (LSA) in the security subsystem.
  2. The LSA queries the Security Accounts Manager (SAM) to see if the user name and password are authorized
  3. The SAM checks the user name and password against information in the directory database.
  4. If access is approved, the LSA creates an access token with the granted access rights and passes it back to the WinLogon process.
  5. The logon process calls for a new process for the user, usually Explorer.exe, to which the user's token is attached.

Logging on to a Domain ( see pic at end of module)

There are ten steps to a successful domain logon process:

  1. WinLogon requests a user name and password. These are sent to the Local Security Authority (LSA) in the security subsystem.
  2. The security subsystem passes the request to the client's Net Logon service.
  3. The client's Net Logon service send the request to the Net Logon service on the first available domain controller.
  4. The domain controller's Net Logon service passes the request to the domain controller's Security Accounts Manager (SAM)
  5. The SAM queries the domain directory database for username and password approval.
  6. The domain controller's SAM passes the result of the logon attempt to the domain controller's Net Logon service.
  7. The domain controller's Net Logon service passes the result to the client's Net Logon service.
  8. The Net Logon service passes the result to the client's Local Security Authority.
  9. If access is approved, the client's LSA creates an access token with the granted access rights and passes it back to the client's WinLogon process.
  10. WinLogon calls the Win32 subsystem to create a new process for the user, passing the access token to the subsystem. Win32 attaches the token to the new process.
Creating a Computer Account

 

Logging on to a Domain
 

Top of Page Top of page

E-mail Me! Comments and suggestions? E-mail me at grantwilson21@yahoo.com
I'm sorry, but I can't answer specific network-related, or exam-related questions.
Last Updated: August 6, 2001 Grant Wilson, Edmonton, AB Canada