In a lot of
ways, Windows Server 2003, Standard Edition (which I’ll call “Server 2003” or “2003”
in this chapter) should be named “NT 2.1.” Anyone coming into the Microsoft networking story
without any previous experience with some version of NT, Windows 2000, or Server 2003
probably feels just as lost as someone who gets dragged into a movie theater to see
The Empire Strikes
Back
while knowing nothing of the original
Star Wars
. They end up asking things like, “Who
is
the
tall guy with the black shiny mask and the bad attitude; and speaking of attitude, what is
with
that
woman whose hairdo looks like she strapped a couple of Danishes on her head?”
In this chapter, I’ll give you a bit of history on Server 2003 and then take a very high-altitude
look at why we’re using Microsoft’s networking software in the first place. This is
not
intended
to prepare you for a test on networking essentials, nor is it a complete book on NTs past and
present. (When I say “NT,” remember that Windows Server 2003, Standard Edition is really just
NT Server 5.2.) What I’m trying to accomplish in this chapter is to answer the questions:
Ÿ
Why should I care about all of this networking stuff, anyway?
Ÿ
Why does Microsoft’s networking software approach networking the way that it does? Here,
I’m referring to the fact that much of why Server 2003 works the way that it does is simply
because NT always did it that way—
so knowing more about NT’s history makes 2003 make
more sense.
What’s the Point of Networks and Networking?
In a way, this chapter is penance for my youthful misdeeds.
When I was in the seventh grade, I had a math teacher named Mr. Schtazle. Seventh-grade math
was a kind of potpourri of mathematical topics—I recall one chapter that took pains to drill into our
heads the difference between precision and accuracy—and I’d plague the poor man at the beginning
of every chapter by asking him, “How will we use this?”—a slightly more-polite version of “why do
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
22 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
we care?” Well, nowadays I find that when I’m teaching a room full of people about Windows 2000,
I’ve
got to be careful to answer that question, “Why do you care?” even if it isn’t asked. Because if I
don’t answer that, then many people in the room will leave the class with a pretty good notion of
how
to accomplish a bunch of tasks but not a really good feel for
why
they’d do the tasks in the first
place. And you know what? Answering the “Why do I care?” question can be pretty rough some times.
So, Mr. Schtazle, if you’re out there…my apologies.
Let’s consider the two questions that I asked a paragraph or two back:
Ÿ
Why network in the first place, and
Ÿ
If we agree that networking is a good thing, why do we do it this way?
The answer to the first question will turn out to be pretty straightforward: Networking solves a
set of problems for us. The answer to the question, “Why do we do it this way?” is a bit longer.
First and foremost, you’re doing this to try to solve some problem that networking can help you
with. Your company might want, for example, a great Web site, or to be able to send and receive
e-mail, or a simple file and print server for a small office. These are the goals; a network is the means
or tool to reach them. In short:
The ultimate goal of any networking project is to provide some kind of service
.
Everything else is just a necessary evil—but there are a
lot
of those necessary evils!
Second, there are many kinds of services that networks can provide, and every kind of service needs
different software to make it work. For example, suppose you wanted to set up a Web site on the
Internet. Network services, including Web sites, need two main pieces: a
server
piece and a
client
piece.
To put up that great Web site, you’ll create the site itself with HTML and drop that HTML onto a
Web server. One way to get a Web server is by taking one of your computers and putting a piece
of software on that computer to make it function as a Web server. But that’s only half the story—in
order for your customers to enjoy that Web server’s content, they will need a piece of client software
called a
Web browser
. That’s our first networking piece:
Every network service needs server software and client
software
.
Third, you need to ensure that there’s a way for your information to get from your server to your
clients, a physical system that the service can travel over. If the clients and servers are in the same
building, then you only need a local area network (LAN), and setting that up only requires pulling
wires through the building. If, however, you want to offer your service to the world, as in the case
of a Web server, then you’ll need some kind of WAN (wide area network) connection to the Internet.
In other cases, you’ll need a WAN connection, but not to the Internet: many organizations with more
than one location connect those locations via private communications links with names like
leased
line
,
T1
, or
frame relay
. That’s our next networking piece:
Networks need connection hardware (switches, hubs,
routers, modems) and links (phone lines, network cables, frame relay, DSL, cable modem, ISDN, etc.) or the clients can’t
connect to the servers
.
Fourth, to provide a service over a network, your server and your clients must agree on how to
transmit information over that network. That agreement is called a
network protocol
, and the one that
you’ll most probably use in the Windows 2003 world is called the Transmission Control Protocol/
Internet Protocol (TCP/IP). You may have heard of it before, as it’s the network protocol that
the Internet uses, but you needn’t be on the Internet to use it. In short:
Clients and servers must speak the
same network protocols
.
Fifth, once you’ve got the channels open, and before information starts flowing in both directions,
you’ll almost certainly need to worry about security. When you use the tool that is networking, you
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
23
want to be sure it doesn’t increase your risk, and in fact you can shape the tool so it reduces hazards.
Briefly:
Networks need security
.
Sixth and finally, once you’ve set up that terrific network service, you need a way for people to
find
that great service. You do that with a “naming” system. Windows 2003 has two of them—one that
appeared years ago before the first version of NT, and a newer (to NT, anyway) method that the
Internet’s been using for years. The last network piece, then is that:
Networks must provide a way for users
to find their services
.
Let’s examine these pieces in order, take a closer look at why they work the way that they do, and
get some insight into how Windows 2003 in particular handles them.
Network Client and Server Software
The reason that we network computers in the first place is so that computers acting as clients can benefit
from the services of computers acting as servers. For example, suppose you want to visit my Web site,
www.minasi.com
.
Two of the ingredients that you’ll need to make that possible are software:
Ÿ
You’ll need a computer running a program that knows how to request Web information and
then how to receive it—in other words, a
client application
.
Ÿ
I’ll need a computer running a program that knows how to listen for requests for Web
information and then how to deliver that information—in other words, a
server application
.
As sometimes occurs
too
often in the computer business, you’ve got choices about both the client
and the server.
The Client Piece: A Web Browser
I’ve said that first you’ll need a computer, of course, one that’s running a Web browser program like
Netscape Navigator or Internet Explorer. But let me rephrase that in basic network client-server
terms.
There is technically no such thing as “the World Wide Web.” Instead, there is an agreement
about how to transfer text, pictures, and the like, and that agreement is called the HyperText
Transfer Protocol—which is normally shortened to HTTP. The phrase World Wide Web just
refers collectively to all of the HTTP servers on the Internet. When you think you’re surfing a
Web page, what really happens is this:
1.
Your client computer asks the Web server (oops, I meant
the HTTP server
) something like, “Do
you have any documents?”
2.
The Web server responds by saying, “Here’s my default document,” a simple text file that
is the so-called home page for that Web server. The Web server sends that file to your client
using the HTTP protocol.
3.
Once your client receives the text file, it notices that the page is full of references to
other
files.
For example, if the home page that you requested has pictures on it, your Web browser
(HTTP client) didn’t originally know to ask for them, so the Web server (HTTP server)
didn’t send them. Your client notices the lack of the images and requests that the server send
them, which it does—again using the HTTP protocol.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
24 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
Here, “HTTP client” just means a program that knows how to speak a language that transfers
a particular kind of data—Web data. Your computer is deaf to the Web unless it knows how to
request and receive data via HTTP.
Notice what
client
means here. It doesn’t refer to you, or even to your computer. Instead, it just
means a program that your computer runs.
The Server Piece: A Web Server
Next, let’s consider what’s sitting on my side of the conversation.
I’ll need a computer running a special piece of software that is designed to listen for your computer
(or anyone else’s, for that matter) requesting to see my Web pages via the HTTP protocol, and that
can respond to those requests by transferring those pages to the requesting client software. You
might
call such a piece of software an “HTTP server” program, although almost no one calls it by that
name. You’d more
commonly
call it “Web server” software. There is a variety of Web server software
that I might run on my Windows Server 2003 computer, but I’m most likely to run the one that
comes free with Server 2003, a program called Internet Information Services (IIS) 6. Alternatively,
I might find, download (probably using HTTP!), and install a popular piece of free Web server
software called Apache.
Once again, notice carefully what “server” means here. It does not really refer to the particular
computer hardware that I’ve got stashed in my network room connected to the Internet. Instead,
“server” means “the program running on Mark’s computer that listens for HTTP requests and knows
how to fulfill them.”
Now that I’ve gone through all of that, consider again the question that I asked at the beginning of
the chapter—why are you bothering with a network? The answer is probably “because you want
to offer a Web site, either internally or on the public Internet, and you that think that IIS is the best
(highest-performance, cheapest, or some combination of the two) Web server software around”—
which means that you must use Server 2003, as it’s the only operating system that supports IIS 6.
(Or you could use an earlier version of Server and an earlier version of IIS, but why not go with the
latest and greatest?)
Other Types of Servers
I’ll tend to use the Web client-server example for this discussion. But I don’t want to lose sight
of the fact that there are quite a few client-server systems, besides Web servers, that are in common
use and that you may want to use 2003 to create. Returning to the theme of this chapter, then—
“Why do I care or why do I need this stuff?”—networks offer several valuable services, and you
may want to set up a computer to act as a server and offer some of those services. Here are a few
besides the Web server example.
File Servers
File servers act as central places to store data files. Why put them on a server
rather than just keep them on your local computer? Well, in some cases someone else created
the file, and placing a file on a central server is a simple way to make the files available to others.
The other good thing about storing files in a central location is that they’re more easily backed
up that way. 2003 comes with file server software built in.
Print Servers
Print servers let you share printers. Not everyone wants to put a printer on their
desk, and besides, if you share the printers, you can afford more expensive (and presumably better)
models. 2003 comes with print server software built in.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
25
E-Mail Servers
Mail servers are essential if you’re going to do e-mail. Some computer (or
computers) must act as the post office, collecting e-mail from the local users and sending it to
other mail servers across the Internet and acting as a receiving point for other mail servers to
send mail destined for your organization. You
can
outsource this function by letting your ISP
act as your mail server, but running your own mail server gives you more flexibility. (However,
it
does
require a persistent connection to the Internet.) 2003’s new features include a basic e-mail
server. Yes, it’s “basic” because Microsoft
really
wants to sell you Exchange as your mail server.
But it’s not a bad server for many people’s needs.
Group Scheduling Servers
The centralized nature of servers means that they’re a great place
to keep track of scarce resources like meeting rooms or your time. 2003 does not come with a
scheduling server, as Microsoft wants to sell you Exchange to do that sort of thing. But there are
alternatives to Exchange; there are some terrific Web-based scheduling tools that work great on
2003—for one example, take a look at
www.mattkruse.com/scripts/calendar/
or other tools,
like Lotus Notes.
E-Commerce Online Stores
If you’ve got something great to sell, then the Web’s one place
to do it. There are thousands of online stores on the Web, and a good number of them run on
2003. While 2003 includes a Web server, it doesn’t include the other software that you’d need to
create a complete online store. But there are a lot of consulting and programming firms that would
be happy to help you create an online store atop 2003!
Networks Need Connection Hardware and Links
If I want to offer a server service and ensure that you can enjoy that service, then we’ll both need to be
physically attached to the same network—the same series of cables, satellite links, or whatever—or
your computer’s requests will never get to my computer in the first place. That probably means that
we’re both on that huge network-of-networks called the Internet, but we could just be working for the
same company in a single wired building, or a multilocation firm connected by a private intranet.
Now, notice that if I’m going to run a Web server, I’ll need to be connected to our common
network (Internet or otherwise) persistently: I couldn’t decide to run a Web server out of my
house and just dial in to the Internet now and then. Of course, if I’m only serving some private
network that we share, then an Internet connection is unnecessary, as we already have connection
to a common network.
People who worry about the physical connection part of networking concern themselves with
getting cables run through walls, calling the phone company to arrange for persistently connected
data links of various kinds—links with names like DSL, cable modem, frame relay, leased lines, T1
or T3 lines—and then work with a family of hardware that helps get the bits going off in the right
direction—devices with names like switches, hubs, and routers.
Does 2003 help you with this part of the job? In some parts, it can. Switches and hubs are very
basic, simple devices, and 2003 has nothing to do with them—although clearly 2003 depends on
their presence in order to network! Routers are, however, more complex devices. You probably know
that the market leader in the router world is a firm named Cisco Systems, but you may not know that
a router is really just a small, single-purpose computer. If you wanted to, you could use a computer
running Server 2003 to replace a Cisco router. Additionally, if you wanted to allow people outside
your network to dial in to your network, you could use a Windows Server 2003 to make that
possible. (It’s not the best answer, as you’ll see in Chapter 6, but it
is
possible.)
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
26 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
Clients and Servers Must Speak the Same Protocols
But simply being connected to the same wire isn’t enough—we need a common communications language.
If I were to pick up a phone and dial some number in Beijing , I’d have a physical connection
with whatever poor soul picked the phone on the other end—but that would be the extent of our
interaction. In the same way, computer networks need to agree on things like, “What’s the biggest
block of data that I can ever send you?” and, “How shall I acknowledge that I actually
got
that block
of data?” or, “Should I bother acknowledging receipt of data at all?” and hundreds of other questions.
The answers to all of those questions are contained in the “network language” or, in network
techie terms, the
network transport protocol
. It probably won’t surprise you that more than one network
transport protocol exists, and over the years NT has generally supported three of them:
Ÿ
NetBEUI (Network Basic Input/Output System Extended User Interface), an old Microsoft/
IBM/Sytek protocol designed to support small networks
Ÿ
IPX/SPX (Internet Packet Exchange/Sequenced Packet Exchange), the protocol that Novell
NetWare predominantly used for years
Ÿ
TCP/IP (Transmission Control Protocol/Internet Protocol), the protocol of the Internet
and intranets
Although you have three choices, it’s a good bet that your Microsoft software-based network uses
TCP/IP. Why TCP/IP? Well, there have been some really great protocols over the years, but as the
Internet uses TCP/IP and as the Internet is so popular, TCP/IP has sort of trumped the other
protocols. In fact, it’s impossible to do a fair number of things that 2003 and its predecessors
Windows 2000 and, to a lesser extent, Windows NT 4 are capable of
without
TCP/IP. So I’m
going to assume for our discussion and indeed for most of this book that your network will use
TCP/IP.
Oh, and one more thing—once you’ve decided that TCP/IP is your network protocol of choice,
then you’ll need to install several
more
servers to support TCP/IP’s infrastructure. And here again,
when I say “more servers,” I’m not suggesting that you have to buy more PCs, although you might.
What I mean is that you’ll have to install software on some computer or group of computers to
perform three basic pieces of plumbing or infrastructure jobs:
Ÿ
A Domain Naming System (DNS) server keeps track of the names of the computers in your
network (an important task, believe it or not).
Ÿ
A Dynamic Host Configuration Protocol (DHCP) server configures the specifics of TCP/IP
on each computer in your network, both great and small.
Ÿ
A Windows Internet Name Server (WINS) does something like what DNS does—keeps
track of names—but isn’t really necessary on a “pure” Windows 2003 network—its main job
is to support older Microsoft operating systems like Windows 9
x
, Me, and NT 3.
x
and 4.
You’ll learn more about the specifics of DNS, DHCP, and WINS in Chapter 7. I should point
out that if you’re a one-person shop, then you might not need all of that, as your ISP might
be handling it for you—but I’m assuming throughout this book that you are probably a network
administrator/manager for a network of at
least
a few computers, and possibly for a tremendous
number of computers.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
27
Keeping the Bad Guys Away: Security
Once you’ve gotten the first four things done, then your job’s finished, in a sense—people can now
read and write files on that file server, view pages on that Web server, print to that shared printer, set
up meetings with you over your scheduling server, and so on. I mean, hey, networking’s all about
sharing, so just open the doors and let ’em in!
As you’ve probably realized, there’s a missing piece here: security. While there’s a lot to security,
it basically boils down to two things:
authentication
and
permissions
.
Ÿ
First, you want to be able to identify who’s entering your network. That’s authentication.
Ÿ
Second, once you know for sure who you’re talking to—once you’ve authenticated—then you
must be able to look up somewhere what that person is allowed to do, his
permissions
. For
example, a network logon could figuratively go something like, “Okay, now I know you’re
Jack…but I’ve been told to deny Jack access to everything.” Merely being authenticated
doesn’t mean that you get access!
Authentication
The first part of security is called
authentication
, and you usually accomplish it through usernames
and passwords, although as time goes on you’ll eventually use the more science-fiction means of
authentication: One day, the computer may recognize you by your fingerprint, face, voice, retina
blood vessel pattern, or some other item that’s distinctly you. The geek term for those authentication
approaches is
biometric
.
For now, however, it’s user accounts and passwords that identify users. I realize that nearly everyone
who’s reading this book has undergone an authentication at some point—you’ve logged in to a
network some time. It all sounds simple, doesn’t it? And yet user accounts and passwords present
special problems.
Storing Authentication Information
First, you’ll need some kind of program that lets administrators create user accounts and store them
in a file. In their simplest form, user accounts consist of a database of usernames and passwords.
That’s no big deal—it’s a very simply structured database, and there are tons of database programs
out there—but don’t forget that you need to
encrypt
that information. Otherwise, there’s the possibility
that someone could come along and steal the database file, take it home, and perhaps crack it
for your user’s passwords.
Just such a thing happened to NT 4. NT stored user information in a file named SAM. If you leave
me in the same room as your server, then I can copy that SAM onto a floppy and take it off-site to
analyze it. Wasn’t it encrypted? Well, yes, but sometimes encryption isn’t enough—a group of hackers
figured out how to crack SAM’s encryption. With just a bit of work, anyone could extract passwords
from an NT SAM. (Which is a good reason to keep your servers behind lock and key, so that it’s
harder for someone to steal your account files.) Windows 2000- and 2003-based domains (a term
I’ll define soon) use a more sophisticated encryption scheme on its user account/password file
(which is named
NTDS.DIT
, not SAM), but unfortunately even that file can be cracked with some
determination. Again, let me stress that this is only a danger if you let someone physically sit down
at the servers that do logons, a set of servers called domain controllers, so don’t worry that 2003 isn’t
secure. Any security person can tell you that you should
never
give the bad guys physical access to
your important servers—lock ’em up!
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
28 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
The tool that lets administrators create, modify, or delete user accounts is called Active Directory
Users and Computers.
Active Directory
refers to Windows 2000 and 2003’s system for storing usernames
and passwords. It’s called a directory because
directory
is the current network lingo for “database
of user accounts.” Personally, I think it’s kind of confusing—in my mind, directory conjures up
visions of drive letters, like C:\DOS—but it’s the current argot, so it’s worth knowing. And, in case
you’re wondering, the “Active” part is just Microsoft marketing; don’t look for any deep meaning
there. (It’s not like Novell makes a product called Comatose Directory or Lethargic Directory.)
Authenticating without Compromising Security
So you’ve got a server somewhere that contains the list of usernames and passwords. Those are only
good if someone can use her username and password to be authenticated and get access to things
on the network. So you need some way for a user sitting at her workstation computer to be recognized
by that server. You’re already familiar with this recognition process: we call it logging on.
Suppose I’m sitting at my Windows XP workstation and I want to get to some files on a file server
named files-r-us.bigfirm.biz. Before files-r-us will give me access, I’ve got to submit myself for
authentication—I’ve got to log on. One of the many programs that comes with every version of NT
since version 3.1 is called
winlogon.exe
, and it’s the program that pops up when you first turn
your workstation on, asking you to punch in your username, password, and domain. (Again, I’ll
explain what a domain is in a minute.)
So imagine that I’m trying to access some data on files-r-us. Files-r-us responds by asking my
workstation, “What’s his name and password?”
Now
I’ve got a problem.
You see, what I’d
like
to do is to just say over the network line, “This is Mark and his password
is ‘swordfish.’” Then files-r-us can just look in its directory file of usernames and passwords and
see if it has a user named Mark with a password of “swordfish.” If so, then it lets me in. If not, it
doesn’t. Simple, eh?
Well, there’s one flaw here—the part where my workstation passes “swordfish” over the network.
A class of programs called “sniffers” can record and display any data that passes over a network wire.
So passing passwords around on an unencrypted Ethernet cable isn’t a great idea. That means
you’ve got another challenge: how to prove to a server across the network from you that you’ve got
Mark’s password without actually showing that password to the server.
Over time, networks have come up with different answers, but Active Directories, whether based
on Windows 2000 or 2003, use an old authentication method called Kerberos which some folks at
MIT first invented in the mid ’80s. It replaces an older method employed by NT 3.
x
and 4 called
NTLM, which was short for NT LAN Manager, a reference to one of NT’s predecessors. What
follows is an extremely simplified version of how Kerberos works. (It’s actually a wildly simplified
description, but it’ll help you understand the more complete explanation that you’ll see in the next
section.)
Let’s return to files-r-us. I try to access its data, so files-r-us needs to first log me in. It does that
by saying, “I’ll tell you how to access my data,” and sends me some instructions on how to get to its
data. But the data is
encrypted—
with my password! In other words,
anyone
could claim to be me, and
files-r-us would happily send these vital instructions-for-connection. But only I can decrypt those
instructions, so only I can benefit from them. So files-r-us ensured that only someone with my
password could gain access, without sending my password over the wire.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
29
Centralizing and Sharing User Account Information: Domains
But my simple example about trying to access one file server is, well, a bit
too
simple. Most companies
will end up with more than one server, and in fact it’s not unusual to end up with dozens
or hundreds of servers. And that leads to the following problem. Recall that I said a page or so
back that if you’re going to employ user accounts, then you’ll need a file to store them in. But what
if you have more than one server? What if in addition to the server named files-r-us.bigfirm.biz, I’ve
also got a mail server named postoffice.bigfirm.biz and a Web server named www.bigfirm.biz?
I might want to log in to any one of those three, so they
all
have to be able to accomplish logons. But
now let’s examine what that actually means in terms of keeping track of user accounts. Should
each server contain a complete copy of
NTDS.DIT
, the file containing the names and passwords
for users?
That might work, but it’d be a pain, for several reasons. First,
NTDS.DIT
can get pretty big, and I’d end
up burning up a lot of disk space copying it to every server in my enterprise. Second, if servers are
connected by low-speed WAN links, the process of copying the changes to
NTDS.DIT
to all of the
servers on my network (a process called
directory replication) would take up a lot of time and network bandwidth.
Third, do I really want to have to create a network “storm” of file copying amongst the servers
every time someone just changes his password? And finally, what about the issue of securing the
NTDS.DIT file in the first place? If I copy NTDS.DIT to every single server in the enterprise, there are bound
to be a few that are out in the open, not physically secured. It’d be easy for an intruder to copy the
NTDS.DIT from a poorly secured computer and spirit it off-site, to crack it at leisure.
The better idea that we’ve used in networks for years is to put the user directory, the NTDS.DIT, not
on every single server, but instead on a relatively small subset of the servers. Those NTDS.DIT-holding
servers then serve in the role of logon server, doing the job of authenticating for the other servers. In
Microsoft parlance, a logon server is more commonly called a domain controller. So, to return to the
example of accessing data on files-r-us, imagine that files-r-us is not a domain controller and doesn’t
contain a copy of NTDS.DIT, and that another computer, vault.bigfirm.biz, is a domain controller
and contains a copy of NTDS.DIT. In this newer arrangement, I don’t directly log into files-r-us but
instead enlist the aid of vault.bigfirm.biz in order to authenticate with files-r-us.
In a purely Active Directory network (which can only include Windows 2000, XP, and 2003 systems),
vault.bigfirm.biz would help me log in to files-r-us with Kerberos. In order to understand how
Kerberos works, you first need to understand that under Kerberos, not only do the users have passwords,
the server programs do also. Thus, the file server program running on files-r-us has its own
password. So both the user and the server each have passwords—remember that.
When I tell my workstation to try to get some data from files-r-us, my workstation sees that
it’ll need to get me logged in to files-r-us. It does that by asking the domain controller, vault, to
give me something called a “ticket” to the file server service on files-r-us. The domain controller
responds by handing my workstation an encrypted piece of data, which is the Kerberos ticket.
The ticket can be decrypted with my password, making its contents a mystery to anyone but me
(or my workstation, which obviously knows my password). My workstation decrypts the ticket,
which contains two things. First, it contains a message saying “your special one-time-only password
for accessing the file server at files-r-us is ‘opensesame.’” Second, it contains another encrypted
message—but this one’s not encrypted with my password, so I can’t decrypt it! But my workstation knows
to send it to the file server, which decrypts it successfully, as the file server has its own passwords.
Once the file server receives and decrypts the part of the Kerberos ticket that I sent it, the file server
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
30 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
sees that that ticket piece says something like, “The special one-time-only password for communicating
with Mark is ‘opensesame.’ And by the way, you should have gotten this message from Mark
sometime between 10:45 A.M. and 10:50 A.M. from his IP address, which should be 117.39.82.3.”
Once the file server gets its half of the Kerberos ticket, it knows a few things:
Ÿ The user claiming to be Mark who wants access to the file server is indeed Mark.
Ÿ Any messages from that now-authenticated person named Mark should have originated from
IP address 117.39.82.3.
Ÿ If Mark and the file server really want to maintain a secure connection, they could even encrypt
their communications using this shared—but secret—password, opensesame.
Security Roles and Definitions: Domains, Domain Controllers, and Member Servers
Armed with this information, I can define a few Microsoft networking terms.
Domain You just saw an example where one machine (vault) let me log in to another machine
(files-r-us). I haven’t mentioned this yet, but before I could get anywhere I needed to log in to the
computer at my desk, my workstation—and when I first tried to log in to my workstation, it was
once again vault.bigfirm.biz that authenticated me. Clearly, then, my workstation and files-r-us
“trust” vault.bigfirm.biz in some fashion.
The collection of machines that share the same list of user accounts, the same NTDS.DIT, is a
domain. Or, to put it a bit more specifically: several computers hold a copy of NTDS.DIT and are
willing to act as “logon servers” (domain controllers) with that NTDS.DIT. The collection of
machines that are willing to accept logons from those domain controllers (in Microsoft terms, who
“trust” those domain controllers) and the domain controllers themselves are collectively called
a domain. So my workstation, vault, and files-r-us are all part of the same domain.
Domain Controller A server, such as vault.bigfirm.biz, that contains a copy of the user
account/password data, and that therefore can let users log in to servers, is a domain controller. Domain
controllers exist to centralize the user account/password information so that you needn’t put
the NTDS.DIT on every server.
Member Server A machine that is running NT 3.x, 4.0, 2000, or Server 2003 but not acting
as a domain controller will not contain a copy of NTDS.DIT and therefore can’t authenticate domain
members. Such a machine is called a member server.
Permissions and Access Control Lists (ACLs)
Once a server has determined that I am indeed me, does that mean that I’ll get access to the server’s
information? Not necessarily. Authentication just identifies me. The next step in security is access
control, also known as (depending on what network operating system you are using) rights, permissions,
or privileges.
Ever since its earliest versions, NT (which includes Windows Server 2003) has had a very
flexible system of file and directory permissions. As you’ll see later in this book, you can exert
very fine-grained control, such as specifying that Mary can read or write to a given file, that Bill can
only read it, and that June cannot access the file at all. Don’t get the idea, however, that permissions
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 31
refer only to files. There are permissions to do things like create, modify, and destroy user accounts,
and even permissions to create domains in the first place. The flexibility of these permissions is one
of Microsoft networking’s great strengths.
Just about everything in the Microsoft networking world has security on it. Want to read a
file? You need the permissions to read it. Want to shut down the program that provides the Web
server? You need the permissions to shut it down. Want to create a new user account on your network?
You need the permissions to create a new user.
These permissions are stored as a list. In the case of the file, the operating system sets aside a little
space for every file that it creates, and keeps the permissions in that space. A set of permissions for
a file, then, might look like
Ÿ A user named June can do anything that she wants to the file.
Ÿ Another user, Joe, can only read it.
Ÿ Any user in a group named Cube-dwellers can read or modify the file, but not delete it.
Ÿ The operating system can do anything that it wants to the file.
In Microsoft networking-speak, that list is called an access control list or, inevitably, ACL. Each
of the four entries are called access control entries or ACEs. You will learn in this book that lots of
things have ACLs, and adjusting those ACLs is how you configure security in your network.
Access to Earlier Security Systems
The last challenge that Windows 2000 and 2003’s security designers faced was the so-called “legacy”
support—ensuring that they could interact with the security systems built into Windows for
Workgroups, Windows 9x, NT 3.x, and 4. I’ve described in very broad strokes how Kerberos works,
but Windows and NT didn’t use anything like that and in fact couldn’t do Kerberos logons; Kerberos
first appeared in the Microsoft networking world in February 2000, with the introduction of
Windows 2000. Microsoft knew that you wouldn’t be very happy if they required you to throw away
all of your old Windows 9x and NT systems before you could implement Active Directory, so
Windows 2000, XP, and Server 2003 know a variety of logon methods—NTLM 1.2 for Windows 9x
and NTLM 2.0 for NT 3.x and 4—in addition to Kerberos.
It’s hard to overstate the importance of security. For example, in the past, one of Novell’s main
advantages over NT was in the way that it stored user accounts and handled logins—Novell’s security
was faster and more flexible. Sure, one could argue that Novell moved data around file servers more
quickly, but not so much more quickly that anyone would really modify a buying decision. Basically,
people were buying Novell for Novell’s security system, something called NetWare Directory Services
(NDS). NDS was essentially a big-time user database, something with a more enterprise feel to it than
NT’s older SAM-based system. In short, security is important.
Names: Finding Servers and Resources
When PC-based networking first appeared, we didn’t do much Web work—the earliest common
LAN functions were file and print services. So from the very beginning (all of 15 years ago) of
PC-based networking, we’ve done file and print services; they’re the most basic network services. But
now suppose that you’ve got a network with more than one server on it, and you want to find out
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
32 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
which server has a printer available for sharing, or you can’t remember which server holds that share
called hrdocuments; how do you search for network functions?
That’s one of the oldest problems in networking, and not just in Microsoft networking.
Microsoft’s most current answer to the “how can I find resource X on the network?” question is
to store that information in the Active Directory database. But they’re not there by any means yet and,
even if you have an all-Windows 2003 and XP network (which is unlikely), you’ll find that by
default the Active Directory isn’t all that much help in finding file and printer shares. I’m sure
that’s going to change as new versions of NT appear, but for now, we Microsoft operating systems
users are pretty much stuck with an old technology known colloquially as the Network Neighborhood
or, in Windows 2000 and later, My Network Places. Here’s where it came from and how
it works.
How would you set up a system that provided a centralized directory of services on a network,
a kind of “yellow pages” that lets a user quickly find a file share or shared printer? Microsoft networking
uses a name server system called the computer browser or browse services—it has nothing at all
to do with the Web, it’s had that name since before the Web existed—where you, the network
administrator, don’t have to do anything; the name servers set themselves up automatically. Sounds
good? Well, it is for small networks, but it gets troublesome for larger ones—which is why
Microsoft is trying to phase it out.
The servers in a Microsoft network that contain information about network services are called
browse masters or master browsers. What’s different about the concept of Microsoft browse servers is
that no one computer is fixed as the browse master. Instead, when your computer logs in to your network,
it finds a browse master by broadcasting a request for one, saying, “Are there any browse masters out
there?” The first browse master to hear the workstation (there can be multiple browse masters,
as you’ll see) responds to the workstation by saying, “Just direct all your name service requests
to me.”
When a server starts up, it does the same thing. It broadcasts, “Are there any browse masters out
there?” and when it finds one, it says to it, “I am a server with the following shares. Please add me
to your list of servers.” The list of servers that a browse master maintains is called the browse list,
not surprisingly.
Tip This is the really irritating thing about the browse list: it’s broadcast-based. That means that if your network isn’t
100 percent broadcast-friendly, then you’ll sometimes end up with an incomplete list of servers on your network. So if
you have a network built in more than one segment (and who doesn’t?), or you use some kinds of Ethernet switches rather
than hubs, then you may experience missing servers in the browse list. That’s part of why Microsoft is trying to phase out
the browse list. But for now, understand that the browse list is a largely lame and unreliable technology. You’ll see later
on, in Chapter 7, that you can install a service called the Windows Internet Name Service (WINS) to reduce the chance
that the browser breaks, but trust me—you’ll eventually come to a point where you’ve done everything that you can do,
but the browser still doesn’t work. When that happens, don’t feel bad—we’ve all been there. I’ll suggest some ways to make
it work better and reduce your dependence on the browser a bit later in this section.
By now, you may be wondering, “How come I’ve never seen one of these browse lists?” You
have. If you ever worked with earlier versions of NT or with Windows for Workgroups, then
you saw Figure 2.1 when you opened the File Manager and clicked Disk/Connect Network Drive.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 33
FIGURE 2.1
Sample browse list
from Windows for
Workgroups or
Windows NT
version 3.x
From Windows 9x or Windows NT 4, you can see a browse list by opening the Network Neighborhood
folder, as in Figure 2.2.
FIGURE 2.2
Sample browse list
from Windows NT 4
or Windows 9x
From DOS or indeed any command line, you can see a browse list by typing net view or net view
\\ machinename. You see a screen like the one in Figure 2.3.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
34 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
FIGURE 2.3
Sample browse list
from a command line
Note What’s with that \\ thing? Microsoft’s network software has, since 1985, used a way of writing the names
of servers and of shares on servers called a Universal Naming Convention or UNC. It looks like \\servername\
sharename. So, for example, if I had a server named bigserver that contained a file share called mydata, I’d refer to
that share as \\bigserver\mydata—that would be the UNC for that share. You’ll learn more about this in Chapter 11,
on file shares, but I wanted to explain the mystifying \\ briefly here. And by the way, you pronounce “\\” as “whackwhack”
in the Microsoft world. Now, to my way of thinking, that’d mean that a regular forward slash— / —would
be pronounced “backwhack” in Microsoftese, but I’ve never gotten confirmation on that.
Each figure shows you the list of servers available: Aldebaran, Artemis, and Astro, just to list a
few. Other servers—Daffy and MWM66—appear only in some of the browse lists because a few
minutes passed between taking the screen shots, and a few “test” servers went up or down in those
few minutes. In all three cases, the workstations that these screens were taken from got their
browse lists from a local browse master.
You can drill down further into these browse lists, as well. In Windows 9x/Me, Windows NT 4,
2000, XP, or Server 2003 (in 2000, XP, or Server 2003, open My Network Places), you can
double-click any one of those servers and see the list of shares that the servers offer; that too, is
information from the browse list. In Windows for Workgroups or Windows NT 3.x, you’d just
click a server once, and the list of its shares would appear in the bottom pane of the dialog box. From
DOS or any other command line, you’d get the list of servers by typing net view, as you’ve already
seen, and then you get the list of shares for any given server by typing net view \\ servername, where
servername is the name of the server whose shares you want to see.
When Browse Lists Get Too Large: Workgroups to the Rescue
As I’ve described them so far, browse lists seem pretty convenient. But in the little test network
that I used for the previous screen shots, you saw only a few servers. Hell, everything works fine on
small networks.
Now let’s talk about your network. Sit down at a corporate network of any size and you see dozens,
hundreds, or thousands of servers. Scrolling down through a 500-server browse list would be a bit
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 35
time-consuming—to say nothing of how much work the browse master would have to do to keep
it up-to-date! The problem to solve is, then, managing the size of the browse list. There are two
ways to do that:
Ÿ Reduce the number of servers in your enterprise.
Ÿ Divide the enterprise-wide browse list into several smaller browse lists called workgroups.
Disable Peer-to-Peer Sharing on Workstations
The first answer is actually a bit off the main topic, but let me digress for a moment and talk about it
before returning to the main item: workgroups. When I say, “Reduce the number of servers,” I’m
talking about an unfortunate side effect of running Windows for Workgroups, Windows 9x/ME,
Windows NT, 2000, or XP workstations—they all have the capability to become peer-to-peer
servers. The browse masters don’t distinguish between industrial-strength servers running NT Server
and low-octane peer-to-peer servers, so you could end up with a browse list that’s supposed to only
list your servers, but actually lists all of your servers and workstations. In general, I think peer-to-peer
networking is a bad idea. If a piece of data is important enough to be used by two employees, then
it’s a company asset that should be backed up regularly and so should go on a managed file server, not
a desktop machine that’s probably backed up once a decade. My recommendation is this: Disable
the peer-to-peer sharing option on your Windows for Workgroups, Windows 9x/ME, Windows
NT, 2000, and XP workstations. How you do this depends on the operating system of the workstations
in question. In NT 3.x and 4, open the Control Panel and then the Services applet; locate the
service called Server and stop it, as well as disabling it for future reboots. In Windows 9x, go to
Control Panel/Network/File and Print Sharing and make sure both options, to share files and
printers, are unchecked. In Windows for Workgroups, make sure the sharing control in Network
Setup is set not to enable file or printer sharing. In Windows 2000 and later, right-click My Computer
and choose Manage, then find the Services folder and stop the Server service. (You’ll see more
about doing this later in the book.)
Not only will your network have less traffic—workstations will no longer have delusions of serverdom,
so they won’t be chattering at the browse master all of the time—but not loading the server part
of the workstation’s operating system saves RAM on the workstation.
Divide the Browse List into Workgroups
The other approach to keeping a browse list to a manageable size is to subdivide it in some way.
That’s a reasonable thing to suggest if you realize that, no matter how large an organization seems
to be, it’s usually composed of lots of smaller groups, such as Manufacturing, Sales, Marketing,
Accounting, Finance, Personnel, Senior Management, and so on. Each of those groups can be called
workgroups, and you can pretty much chop up your enterprise into workgroups in any way you like
(but a rule of thumb says that a workgroup should be a group of people for whom 95 percent of the
data generated by that group stays within that group).
From a more network-technical point of view, the minimum definition of a workgroup is just
a group of workstations that share a browse list. (That’s my definition, not Microsoft’s.) The idea is that
when someone in Accounting opens up her browse list, you want her to see just the Accounting
servers, not the Manufacturing servers, as she has no use for the Manufacturing servers. (Besides,
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
36 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
there’s a good chance that she doesn’t have permission to access the Manufacturing servers anyway—
but I’ll get to workgroups and security in a little bit.) How do you join a workgroup? See the sidebar
“How Do I Join a Workgroup?”
Note Workgroup names are like Windows 9x and NT 3.x/4.x machine names and can be up to 15 characters long.
So, to review what you’ve seen so far:
Ÿ Network browse lists allow a user at a workstation to see all of the servers on the network, and
from there to see all of the shares on a given server.
How Do I Join a Workgroup?
Generally, all you need to do is to tell the networking software on your workstations and servers that
they’re members of a given workgroup. There isn’t any “security” in being part of a workgroup—you
pretty much just declare yourself a member and you are a member. (As a matter of fact, if you misspell the
name of the workgroup, you end up accidentally founding a whole new workgroup all by yourself, which
I’m sure was not your intention!)
Specifically, you designate which workgroup you’re a member of in one of the following ways:
From a DOS or Windows for Workgroups workstation In the [network] section of the SYSTEM.INI
file you’ll find a WORKGROUP=parameter. (You’ll have a SYSTEM.INI even if you’re just running DOS,
because the network client software creates one.) You can also set the workgroup from the MS-DOS Network
Client Setup program, or in the Windows for Workgroups’ Network applet of the Control Panel.
From Windows 9x Open the Control Panel and double-click the Network icon. In the property sheet
that you see, click the Identification tab. You see the place to fill in the workgroup name.
On Windows NT 3.x Open the Control Panel and double-click the Network applet. You’ll see a button
labeled Domain or Workgroup. (NT has a kind of confusing way of blurring workgroups and domains,
which I’ll make clearer later in this chapter.) Click that button, and you can change the workgroup you’re
a member of. Again, NT complicates choosing a workgroup somewhat, so read the rest of this chapter if
you want to change an NT workgroup.
On Windows NT 4 Open the Control Panel and double-click the Network applet. Like Windows 9x,
Windows NT 4 has a property sheet with an Identification tab. Click Change to change the workgroup.
Again, with NT you may see no references to workgroups at all; instead you see references to
domains. Read on to understand the differences.
On Windows 2000 If you’re a member of a domain, then do not join a workgroup—I’ll explain that
in a minute. Otherwise, right-click My Computer and choose Properties. Click the Network Identification
tab and then the button labeled Properties. Fill in a new workgroup in the field named Workgroup;
then close the dialog box and reboot.
On Windows XP and Server 2003 Right-click My Computer and choose Properties. (You may have
to click the Start button to find My Computer.) Click the tab labeled Computer Name, then the button
labeled Change. In the resulting dialog box, you’ll see the choice to become a “Member of:” either a
domain or a workgroup. Click the radio button next to Workgroup and fill in the workgroup name,
then close the dialog box and reboot.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 37
Ÿ Browse lists can get fairly long, so you can partition your entire network into workgroups, which
are just groups of people that share a browse list.
Ÿ When you request a browse list, you don’t get the entire list of servers in your enterprise
network, you only get the list of servers within your workgroup.
Ÿ Each workgroup has one or more servers that act as gatherers of browse information. They’re
called browse masters or master browsers, and they’re picked automatically.
Ÿ Machines that are only workstations and don’t act as servers even in a peer-to-peer capacity
do not appear on browse lists.
As the question of what machines go on a browse list and what machines don’t is important to the
length of a browse list, let me list the kinds of machines that can act as servers in a Microsoft
enterprise network:
Ÿ Windows 3.x (with the Workgroup Add-On for MS-DOS clients)
Ÿ DOS (with Workgroup Add-On for MS-DOS clients)
Ÿ Windows for Workgroups
Ÿ Windows 9x/Me
Ÿ NT Workstation
Ÿ NT Server
Ÿ Windows 2000 Professional
Ÿ Windows Server 2003
How Do I View a Browse List?
Microsoft has built different browse programs into its various network client software.
From a DOS or NT/2000/XP/2003 Command Line Type net view. That shows you the list of
servers. You can view the shares on a given server by typing net view \\servername. To see the browse
list for a workgroup other than your own, type net view /workgroup:workgroupname.
From NT, 2000, XP or Server 2003, don’t use /workgroup: in the command; instead, use /domain:.
From Windows for Workgroups or Windows NT 3.x Open the File Manager, click Drive, and then
click Connect Network Drive. You’ll see a window with two panes. The browse list for your workgroup
and a list of the other workgroups on the network appears as the list of possible servers in the top pane and,
when you click a server, that server’s shares appear in the bottom pane. To see the browse list for a
workgroup other than your own, double-click the name of the workgroup in the top pane.
From Windows 9x or Windows NT 4 Open the Network Neighborhood folder. You’ll see the servers
in your workgroup represented as PC icons in a folder. Double-click one of the servers, and a folder
will open up showing you the shares. To see the browse list for a workgroup other than your own,
double-click the Entire Network icon and you’ll see a list of workgroups. On Windows NT 4, click
Entire Network and then Microsoft Network, and you’ll get a list of the other workgroups.
Continued on next page
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
38 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
As it’s an unusual product, let me just explain that the Workgroup Add-On for MS-DOS is a
separate Microsoft product that lets you use a DOS machine as a peer-to-peer server. (Also, it’s pretty
old, so I have no idea where you’d get a copy these days.) Again, I recommend that you disable file
and print sharing on all of these machines except, of course, for the machines dedicated to the task
of being servers, all of which are probably running NT Server.
And once you’re in a workgroup, you’ll no doubt want to see your browse list; the sidebar “How
Do I View a Browse List?” tells you the specifics.
Now, if you tried that on a working network, then you might have gotten one of NT and family’s
less helpful responses, like “System error 1230 has occurred.” That gives me the chance to offer another
important bit of advice for anyone using a modern Microsoft operating system: how to convert a
numeric error code into a bit of explanatory English text—see the sidebar for more information.
Before leaving the topic of the browser, let me offer one more piece of advice: try to avoid it,
as it’s unreliable. If your users need access to particular file shares, then you can deliver access to those
shares in a few ways. First, you can map file shares, which means that you can create imaginary drive
letters on your user’s workstations. In other words, if the user often uses \\server1\compdata, then
you could set up her workstation so that she’d see a new drive V: which isn’t a local hard disk—
although it looks like a local hard disk—but is instead a network drive. Or you could simply create a
shortcut to the UNC on her desktop. You’ll learn how to do both of those things in Chapter 11.
How Do I View a Browse List? (continued)
From Windows 2000 If your system is in a workgroup, open My Network Places and then the icon
labeled Computers Near Me. If your system is part of a domain, then that icon isn’t available. Instead,
open My Network Places and the icon labeled Entire Network, then the icon named Microsoft Windows
Network. You’ll see one or more icons representing the workgroups on your network—open the
one representing your workgroup and you’ll see your workgroup’s browse list.
From Windows XP or Server 2003 Open My Network Places. It might be on your desktop, or it
might be on the Start menu, or you might have to right-click the Desktop and choose Properties, then
click the Desktop tab, followed by the Customize Desktop button, then check the box next to My
Network Places and click OK twice. My Network Places will be on your desktop. Once you have My Network
Places open, then you’ll either see a Network Task on the left of the folder labeled View
Workgroup Computers or you might have an icon labeled Entire Network, in which case you should
double-click that, then double-click Microsoft Windows Network. You’ll then see an icon of three PCs
representing your workgroup—click that and you’ll get your workgroup’s browse list.
How to Convert a Numeric Error Code to English Text
Just type net helpmsg number, where number is the error code. For example, you’ll probably stumble
across error 5 now and then: “access is denied.” It means that you didn’t have the right to do something
that you tried to do. Another common one is error 53, “the network path was not found.” It means that you
tried to access some server that the system can’t find or, as is usually the case for me, you misspelled the
server’s name.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
SO WHY USE NT/2000/SERVER 2003? 39
Summary: The Necessary Evils
I hope in this section that I’ve provided a bit of an answer to the question, “Why do we have to worry
about all of this stuff just to get a mail server up and running?”
Ÿ First, you need a piece of server software that can accomplish whatever it is that you’re trying
to do—Web server, mail server, or whatever.
Ÿ Next, you need to be compatible with and connected to a physical network that connects to
your clients—either the public Internet or a private network of some kind.
Ÿ Then your server must move its data around in the same way that your clients’ machines do,
using the same network language or protocol, probably TCP/IP. TCP/IP itself will require
some server functions as well, to maintain it.
Ÿ It wouldn’t be necessary in a perfect world, but in our imperfect world your network needs to
protect its data with a security system, and in today’s world that unfortunately means an
elaborate security system.
Ÿ Finally, you’ll need some way of finding what you put in that network, once you’ve got it working.
Active Directory will become that way in the future, but for now it’s a kludgy thing called
the Computer Browser that you see in My Network Places.
So presumably you now see why your network needs so many moving parts. Why buy them from
Microsoft?
So Why Use NT/2000/Server 2003?
I hope that by now I’ve convinced you that networking seems like a good thing. But you could build
your network atop any number of operating systems, including Unix, Linux, Novell NetWare,
IBM’s OS/400 or MVS, or Compaq’s VMS, just to name a few. Why NT or its most recent incarnation,
Windows Server 2003?
Well, understand when I answer that question that (1) I’m not from Microsoft, (2) I’m not
here to sell NT/2000/2003 to you, I’m just here to tell you how to make it work, and (3) the reality
of the matter is that every one of the OSes that I just named are good products that have not only
their adherents and detractors, but that also have many solid positive features. After decades of
business computer use, the market has filtered out both the truly terrible products and some perfectly
good but inadequately marketed products, leaving only products that are at least competent (and
always well-marketed). So if you want to read that Server 2003 is not only your best choice, but also
that you’re a total fool to try to use anything else, then I’m afraid you’ve come to the wrong place. Yes,
I like NT, including its latest incarnation (Server 2003), but it’s not the only answer.
But it is a very good answer. Here’s why.
It’s the Market Leader
Most stats that I see say that the Microsoft family of operating systems has the largest market share—
43 percent of servers according to the last set of numbers that I saw. Being part of the biggest market
share means that it’s easier to find consultants, support, and third-party tools. Oh, and it also means
that there’s plenty of demand for your services once you become an expert!
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
40 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
Its Familiar GUI Makes It Easier to Get Started
The fact that Windows Server 2003 uses a GUI that is basically the same as Wintendo—oops,
I meant Windows 9x/Me—means that hundreds of millions of people already know how to navigate
the 2003 Desktop. Yes, some things have been moved around, but in general once you know
Windows, you know how to get around on 2003.
In contrast, I have recently done a lot of work with Linux and, while it’s a quite powerful operating
system, the user interface is not for novices; even its multitude of GUIs are still clumsy, although that’ll
probably change with time. (That’s not to say that you shouldn’t use Linux—just that I think the
Microsoft OSes have an easier-to-use GUI.) With 2003, you can often figure out how to solve a
problem by noodling around in the GUI—it lends itself more to exploration than would an operating
system that relies mainly upon command-line commands to control it.
Many Tools Come “in the Box”
When NT 3.1 first came out, it was pretty amazing that it came with a dial-in module and a host
of other goodies that you had to buy separately in order to run its competition at the time, Novell
NetWare. NT had a free TCP/IP stack when many other OSes were charging big bucks for it, a
free Web server, and so on. Since then, other server operating systems have continued to include
more and more things with the basic operating system—for example, the variety of tools that comes
with Linux is nothing short of stunning—but Microsoft has kept the heat on the competition by
including a variety of new tools with every release. At this point, the basic version of Server 2003
includes (in addition to its basic functionality of a file and print server) a Web server, an FTP server,
a sophisticated Internet router, automated workstation rollout tools (Remote Installation Services),
centralized software distribution tools (Group Policies), a two-level disk storage system (Remote
Storage Manager), encryption (Encrypted File System), an e-mail server, a SQL-based database server
and lots of other tools.
Not all of the tools are stellar; for example, the disk quota system, which allows you to keep any
given user from stealing all of the disk space on the shared file servers, is pretty lame. But because
Server 2003 provides at least a basic quota functionality, the many shops that are trying to minimize
the number of vendors they deal with can get an awful lot of their networking needs met in just
one package: Server 2003.
When you view Microsoft products, bear in mind that you usually won’t encounter really cuttingedge
tools; in my judgment, that’s not Microsoft’s market niche. Instead, they seem to focus on
incrementally improving existing products, as well as adding new tools by imitating competitors. Not
being the first on the block can sometimes be a pretty good thing, as you get to watch the competition’s
mistakes. Very little in Windows Server 2003 is truly never-seen-before-in-the-world new.
Instead, it’s a distillation of a lot of other people’s good ideas. Yes, some may see that as stealing
other people’s good ideas, and there’s some merit to that view. And Microsoft has what some might
call an unfair advantage in that they’ve got enough money to keep trying and trying and trying; for
example, their first two networking products, MS-NET and LAN Manager, were pretty weak
compared to the competition’s, but they had the money and tenacity to keep slugging away it, finally
releasing the far-better NT product. Another example of this strategy occurred in 2001, with
Microsoft’s release of the Pocket PC 2002 operating system. They’re trying to crush the PalmOS
guys in the palmtop market, and they’ve made two weak attempts with Windows CE 1.0 and 2.0, but
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
A BRIEF HISTORY OF NT 41
they’re learning. I don’t know if Pocket PC will beat PalmOS—as a long-time Palm user, I tend to
think not—but they’ll definitely steal more of PalmOS’s market share with Pocket PC than they ever
did with Windows CE.
And while Microsoft’s detractors like to paint Microsoft as nothing but a bunch of rip-off artists,
it’s actually hard to find who originated these ideas. Some say that Microsoft stole Novell and Apple’s
best ideas; well, Novell certainly didn’t invent networking, and their IPX/SPX protocol is blatant
“theft” of a Xerox protocol. Apple didn’t invent the GUI that Microsoft supposedly stole—Xerox
did. (Hmmm, maybe there’s a pattern here.) Nor is Active Directory a rip-off of an original Novell
product, Netware Directory Services—NDS is based on a directory standard called X.500 and terms
that many people think that Novell invented, like “organizational unit,” are X.500 terms. In any case,
it is something of a comfort for people to be able to buy a single product that is a decent fit for just
about all of their networking needs, instead of looking for the best of breed in each area. Why?
Anyone who’s ever tried to troubleshoot a multivendor network problem knows why: Both vendors
just point the finger at the other vendor and say, “That’s him—he’s the guy causing your problem.”
(They’re hoping you’ll get tired and go away. Most of us do, sadly.)
In contrast, the same people are developing all of 2003’s pieces; so you have to believe that at some
point someone would have noticed if they didn’t fit together. Or that if someone didn’t notice it before
they shipped, they’ll get around to fixing it afterward.
In sum, why use 2003? It’s fairly reliable, it does most of what you want a network operating
system to do, it’s reasonably priced, and enough other people use it that you’re probably not going
to go terribly wrong.
A Brief History of NT
Let’s finish this chapter with a look at how NT has grown and changed since its early days.
Even in the early 1980s, Bill Gates knew that networking was a key to owning the computer
business. So, on April 15, 1985, Microsoft released its first networking product, a tool called
MS-NET, and its companion operating system, DOS 3.10. Most people knew about the new DOS
and were puzzled at its apparent lack of new features. What it contained, however, were architectural
changes to DOS that made it a bit friendlier to the idea of networks.
Now, Microsoft wasn’t big enough at that time to create much hoopla about a new network operating
system, so they let others sell it—no matter how high or low you looked, you couldn’t buy a product
called MS-NET. Instead, it sold mainly as an IBM product under the name of the IBM PC Network
Support Program; IBM viewed it as little more than some software to go along with their PC Network
LAN boards and, later, their Token Ring cards. The server software was DOS-based, offered
minimal security, and, to be honest, performed terribly. (Believe me, I know; I used to install them for
people.) But the software had two main effects on the market.
First, the fact that IBM sold a LAN product legitimized the whole industry. IBM made it possible
for others to make a living selling network products. And that led to the second effect: the growth of
Novell. Once IBM legitimized the idea of a LAN, most companies responded by going out and
getting the LAN operating system that offered the best bang for the buck. That was an easy decision:
NetWare. In the early days of networking, Novell established itself as the performance leader. You
could effectively serve about twice as many workstations with Novell NetWare as you could with any
of the MS-NET products. So Novell prospered.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
42 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
As time went on, however, Microsoft got better at building network products. 3Com, wanting to
offer a product that was compatible with the IBM PC Network software, licensed MS-NET and
resold it as their 3+ software. 3Com knew quite a bit about networking, however, and recognized the
limitations of MS-NET. So 3Com reworked MS-NET to improve its performance, a fact that didn’t
escape Microsoft’s attention.
From 1985 to 1988, Microsoft worked on their second generation of networking software. The
software was based on their OS/2 version 1 operating system. (Remember, Microsoft was the main
driving force behind OS/2 from 1985 through early 1990. Steve Ballmer, Microsoft’s number two
guy, promised publicly in 1988 that Microsoft would “go the distance with OS/2.” Hey, the world
changes and you’ve got to change with it, right?) Seeing the good work that 3Com did with
MS-NET, Microsoft worked as a partner with 3Com to build the next generation of LAN software.
Called Microsoft LAN Manager, this network server software was built atop the more powerful
OS/2 operating system. As with the earlier MS-NET, Microsoft’s intention was never to directly
market LAN Manager. Instead, they envisioned IBM, 3Com, Compaq, and others selling it.
IBM did indeed sell LAN Manager (they still do in the guise of OS/2 LAN Server). 3Com sold
LAN Manager for years as 3+Open but found little profit in it and got out of the software business.
In late 1990, Compaq announced that they would not sell LAN Manager because it was too complex
a product for their dealers to explain, sell, and support. Microsoft decided then that if LAN Manager
was to be sold, they’d have to do the selling, so on the very same day as the Compaq withdrawal, they
announced that they would begin selling LAN Manager directly.
Note Interesting side note: Ten years after Compaq decided that their sales force couldn’t sell network software,
they reversed direction and said that they’d sell a special version of Windows 2000 called Datacenter Server. It’s
special because you cannot buy it from Microsoft—you must buy it preinstalled on specially certified vendor hardware.
In other words, the hardware vendors (Compaq’s not the only one selling Datacenter) now believe that they can sell
complex network operating systems. I wish them the best of luck, but stay tuned to see the outcome of this particular
marketing maneuver!
LAN Manager in its first incarnation still wasn’t half the product that Novell NetWare was, but
it was getting there. LAN Manager 2 greatly closed the gap, and in fact, on some benchmarks LAN
Manager outpaced Novell NetWare. Additionally, LAN Manager included administrative and security
features that brought it even closer to Novell NetWare in the minds of many network managers.
Slowly, LAN Manager gained about a 20 percent share of the network market.
When Microsoft designed LAN Manager, however, they designed it for the 286 chip (more
accurately, I should say again that LAN Manager was built atop OS/2 1.x, and OS/2 1.x was built
for the 286 chip). LAN Manager’s 286 foundation hampered its performance and sales. In contrast,
Novell designed their premier products (NetWare 3 and 4) to use the full capabilities of the 386 and
later processors. Microsoft’s breakup with IBM delayed the release of a 386-based product and, in a
sense, Microsoft never released the 386-based product.
Instead of continuing to climb the ladder of Intel processor capabilities, Microsoft decided to
build a processor-independent operating system that would sit in roughly the same market position
as Unix. It could then be implemented for the 386 and later chips, and it also could run well on other
processors, such as the PowerPC, Alpha, and MIPS chips. Microsoft called this new operating system
NT, for new technology. Not only would NT serve as a workstation operating system, it would also
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
A BRIEF HISTORY OF NT 43
arrive in a network server version to be called LAN Manager NT. No products ever shipped with that
name, but the wallpaper that NT Server displays when no one is logged in is called LANMANNT.BMP to
this day.
In August 1993, Microsoft released LAN Manager NT with the name NT Advanced Server. In
a shameless marketing move, they labeled it version 3.1 in order to match the version numbers of the
Windows desktop products. This first version of NT Advanced Server performed quite well.
However, it was memory-hungry, lacked Novell connectivity, and had only the most basic TCP/IP
connectivity.
September 1994 brought a new version and a new name: Microsoft Windows NT Server version 3.5.
Version 3.5 was mainly a “polish” of 3.1; it was less memory-hungry, it included Novell and
TCP/IP connectivity right in the box, and it included Windows for Workgroups versions of the
administrative tools so network administrators could work from a Workgroup machine rather than
an NT machine. Where many vendors would spend 13 months adding silly bells and whistles, NT 3.5
showed that the Microsoft folks had spent most of their time fine-tuning the operating system,
trimming its memory requirements, and speeding it up.
In October 1995 came NT version 3.51, which mainly brought support for PCMCIA cards
(a real boon for us traveling instructor types), file compression, and a raft of bug fixes.
NT version 4, 1996’s edition of NT, got a newer Windows 95–like face and a bunch of new
features, but no really radical networking changes. Under the hood, NT 4 wasn’t much different from
NT 3.51.
From mid 1996 to early 2000, no new versions of NT appeared, an “upgrade drought” such as
we’d not seen in quite some time from Microsoft. Then, in February 2000, Windows 2000 (“NT 5.0”)
shipped. 2000 included a whole lot of new stuff, but perhaps the most significant was a new way of
storing and organizing user accounts and related information: Active Directory domains. Closely
following AD in importance was the then-new notion of group policies, something that you’ll see has
become quite important to anyone wanting to run a network based on XP and Server 2003.
The next version of NT shipped in pieces for the first time since 1993. First NT Workstation 5.1
or, as it’s better known, XP Professional and its lesser sibling, XP Home. Microsoft intended to
follow up with the server version of NT 5.1, but events conspired to compel them to wait a bit longer,
and produce NT Server 5.2—that is, Windows Server 2003. As you read in the last chapter,
it’s a “1.1” version of Windows 2000, a welcome improvement to 2000’s fit and finish.
That’s not the end of the story for NT. Sometime in 2004 or 2005, we will see a re-unified
NT (5.3? 6.0? Time will tell) code-named Longhorn. That in turn will pave the way for yet another
version of NT, code-named Blackcomb, but let’s wait for another edition or two of this book to cover
that product.
Well, I hope this chapter wasn’t boring for those already expert in NT—I did warn you!—and
helped bring the newbies up to speed. No matter what version of NT you’re running, however, you’ll
need to configure it. And there are, as there always have been, two main ways to do it. The preferred
way is through the GUI with windowed programs that offer help and a bit of error-checking, or its
somewhat more complex relatives, the command-line tools. The less-preferred, but often necessary,
way is to directly tweak some setting in its lair … a place called the Registry. The next two chapters
introduce these two configuration approaches.
ways, Windows Server 2003, Standard Edition (which I’ll call “Server 2003” or “2003”
in this chapter) should be named “NT 2.1.” Anyone coming into the Microsoft networking story
without any previous experience with some version of NT, Windows 2000, or Server 2003
probably feels just as lost as someone who gets dragged into a movie theater to see
The Empire Strikes
Back
while knowing nothing of the original
Star Wars
. They end up asking things like, “Who
is
the
tall guy with the black shiny mask and the bad attitude; and speaking of attitude, what is
with
that
woman whose hairdo looks like she strapped a couple of Danishes on her head?”
In this chapter, I’ll give you a bit of history on Server 2003 and then take a very high-altitude
look at why we’re using Microsoft’s networking software in the first place. This is
not
intended
to prepare you for a test on networking essentials, nor is it a complete book on NTs past and
present. (When I say “NT,” remember that Windows Server 2003, Standard Edition is really just
NT Server 5.2.) What I’m trying to accomplish in this chapter is to answer the questions:
Ÿ
Why should I care about all of this networking stuff, anyway?
Ÿ
Why does Microsoft’s networking software approach networking the way that it does? Here,
I’m referring to the fact that much of why Server 2003 works the way that it does is simply
because NT always did it that way—
so knowing more about NT’s history makes 2003 make
more sense.
What’s the Point of Networks and Networking?
In a way, this chapter is penance for my youthful misdeeds.
When I was in the seventh grade, I had a math teacher named Mr. Schtazle. Seventh-grade math
was a kind of potpourri of mathematical topics—I recall one chapter that took pains to drill into our
heads the difference between precision and accuracy—and I’d plague the poor man at the beginning
of every chapter by asking him, “How will we use this?”—a slightly more-polite version of “why do
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
22 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
we care?” Well, nowadays I find that when I’m teaching a room full of people about Windows 2000,
I’ve
got to be careful to answer that question, “Why do you care?” even if it isn’t asked. Because if I
don’t answer that, then many people in the room will leave the class with a pretty good notion of
how
to accomplish a bunch of tasks but not a really good feel for
why
they’d do the tasks in the first
place. And you know what? Answering the “Why do I care?” question can be pretty rough some times.
So, Mr. Schtazle, if you’re out there…my apologies.
Let’s consider the two questions that I asked a paragraph or two back:
Ÿ
Why network in the first place, and
Ÿ
If we agree that networking is a good thing, why do we do it this way?
The answer to the first question will turn out to be pretty straightforward: Networking solves a
set of problems for us. The answer to the question, “Why do we do it this way?” is a bit longer.
First and foremost, you’re doing this to try to solve some problem that networking can help you
with. Your company might want, for example, a great Web site, or to be able to send and receive
e-mail, or a simple file and print server for a small office. These are the goals; a network is the means
or tool to reach them. In short:
The ultimate goal of any networking project is to provide some kind of service
.
Everything else is just a necessary evil—but there are a
lot
of those necessary evils!
Second, there are many kinds of services that networks can provide, and every kind of service needs
different software to make it work. For example, suppose you wanted to set up a Web site on the
Internet. Network services, including Web sites, need two main pieces: a
server
piece and a
client
piece.
To put up that great Web site, you’ll create the site itself with HTML and drop that HTML onto a
Web server. One way to get a Web server is by taking one of your computers and putting a piece
of software on that computer to make it function as a Web server. But that’s only half the story—in
order for your customers to enjoy that Web server’s content, they will need a piece of client software
called a
Web browser
. That’s our first networking piece:
Every network service needs server software and client
software
.
Third, you need to ensure that there’s a way for your information to get from your server to your
clients, a physical system that the service can travel over. If the clients and servers are in the same
building, then you only need a local area network (LAN), and setting that up only requires pulling
wires through the building. If, however, you want to offer your service to the world, as in the case
of a Web server, then you’ll need some kind of WAN (wide area network) connection to the Internet.
In other cases, you’ll need a WAN connection, but not to the Internet: many organizations with more
than one location connect those locations via private communications links with names like
leased
line
,
T1
, or
frame relay
. That’s our next networking piece:
Networks need connection hardware (switches, hubs,
routers, modems) and links (phone lines, network cables, frame relay, DSL, cable modem, ISDN, etc.) or the clients can’t
connect to the servers
.
Fourth, to provide a service over a network, your server and your clients must agree on how to
transmit information over that network. That agreement is called a
network protocol
, and the one that
you’ll most probably use in the Windows 2003 world is called the Transmission Control Protocol/
Internet Protocol (TCP/IP). You may have heard of it before, as it’s the network protocol that
the Internet uses, but you needn’t be on the Internet to use it. In short:
Clients and servers must speak the
same network protocols
.
Fifth, once you’ve got the channels open, and before information starts flowing in both directions,
you’ll almost certainly need to worry about security. When you use the tool that is networking, you
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
23
want to be sure it doesn’t increase your risk, and in fact you can shape the tool so it reduces hazards.
Briefly:
Networks need security
.
Sixth and finally, once you’ve set up that terrific network service, you need a way for people to
find
that great service. You do that with a “naming” system. Windows 2003 has two of them—one that
appeared years ago before the first version of NT, and a newer (to NT, anyway) method that the
Internet’s been using for years. The last network piece, then is that:
Networks must provide a way for users
to find their services
.
Let’s examine these pieces in order, take a closer look at why they work the way that they do, and
get some insight into how Windows 2003 in particular handles them.
Network Client and Server Software
The reason that we network computers in the first place is so that computers acting as clients can benefit
from the services of computers acting as servers. For example, suppose you want to visit my Web site,
www.minasi.com
.
Two of the ingredients that you’ll need to make that possible are software:
Ÿ
You’ll need a computer running a program that knows how to request Web information and
then how to receive it—in other words, a
client application
.
Ÿ
I’ll need a computer running a program that knows how to listen for requests for Web
information and then how to deliver that information—in other words, a
server application
.
As sometimes occurs
too
often in the computer business, you’ve got choices about both the client
and the server.
The Client Piece: A Web Browser
I’ve said that first you’ll need a computer, of course, one that’s running a Web browser program like
Netscape Navigator or Internet Explorer. But let me rephrase that in basic network client-server
terms.
There is technically no such thing as “the World Wide Web.” Instead, there is an agreement
about how to transfer text, pictures, and the like, and that agreement is called the HyperText
Transfer Protocol—which is normally shortened to HTTP. The phrase World Wide Web just
refers collectively to all of the HTTP servers on the Internet. When you think you’re surfing a
Web page, what really happens is this:
1.
Your client computer asks the Web server (oops, I meant
the HTTP server
) something like, “Do
you have any documents?”
2.
The Web server responds by saying, “Here’s my default document,” a simple text file that
is the so-called home page for that Web server. The Web server sends that file to your client
using the HTTP protocol.
3.
Once your client receives the text file, it notices that the page is full of references to
other
files.
For example, if the home page that you requested has pictures on it, your Web browser
(HTTP client) didn’t originally know to ask for them, so the Web server (HTTP server)
didn’t send them. Your client notices the lack of the images and requests that the server send
them, which it does—again using the HTTP protocol.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
24 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
Here, “HTTP client” just means a program that knows how to speak a language that transfers
a particular kind of data—Web data. Your computer is deaf to the Web unless it knows how to
request and receive data via HTTP.
Notice what
client
means here. It doesn’t refer to you, or even to your computer. Instead, it just
means a program that your computer runs.
The Server Piece: A Web Server
Next, let’s consider what’s sitting on my side of the conversation.
I’ll need a computer running a special piece of software that is designed to listen for your computer
(or anyone else’s, for that matter) requesting to see my Web pages via the HTTP protocol, and that
can respond to those requests by transferring those pages to the requesting client software. You
might
call such a piece of software an “HTTP server” program, although almost no one calls it by that
name. You’d more
commonly
call it “Web server” software. There is a variety of Web server software
that I might run on my Windows Server 2003 computer, but I’m most likely to run the one that
comes free with Server 2003, a program called Internet Information Services (IIS) 6. Alternatively,
I might find, download (probably using HTTP!), and install a popular piece of free Web server
software called Apache.
Once again, notice carefully what “server” means here. It does not really refer to the particular
computer hardware that I’ve got stashed in my network room connected to the Internet. Instead,
“server” means “the program running on Mark’s computer that listens for HTTP requests and knows
how to fulfill them.”
Now that I’ve gone through all of that, consider again the question that I asked at the beginning of
the chapter—why are you bothering with a network? The answer is probably “because you want
to offer a Web site, either internally or on the public Internet, and you that think that IIS is the best
(highest-performance, cheapest, or some combination of the two) Web server software around”—
which means that you must use Server 2003, as it’s the only operating system that supports IIS 6.
(Or you could use an earlier version of Server and an earlier version of IIS, but why not go with the
latest and greatest?)
Other Types of Servers
I’ll tend to use the Web client-server example for this discussion. But I don’t want to lose sight
of the fact that there are quite a few client-server systems, besides Web servers, that are in common
use and that you may want to use 2003 to create. Returning to the theme of this chapter, then—
“Why do I care or why do I need this stuff?”—networks offer several valuable services, and you
may want to set up a computer to act as a server and offer some of those services. Here are a few
besides the Web server example.
File Servers
File servers act as central places to store data files. Why put them on a server
rather than just keep them on your local computer? Well, in some cases someone else created
the file, and placing a file on a central server is a simple way to make the files available to others.
The other good thing about storing files in a central location is that they’re more easily backed
up that way. 2003 comes with file server software built in.
Print Servers
Print servers let you share printers. Not everyone wants to put a printer on their
desk, and besides, if you share the printers, you can afford more expensive (and presumably better)
models. 2003 comes with print server software built in.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
25
E-Mail Servers
Mail servers are essential if you’re going to do e-mail. Some computer (or
computers) must act as the post office, collecting e-mail from the local users and sending it to
other mail servers across the Internet and acting as a receiving point for other mail servers to
send mail destined for your organization. You
can
outsource this function by letting your ISP
act as your mail server, but running your own mail server gives you more flexibility. (However,
it
does
require a persistent connection to the Internet.) 2003’s new features include a basic e-mail
server. Yes, it’s “basic” because Microsoft
really
wants to sell you Exchange as your mail server.
But it’s not a bad server for many people’s needs.
Group Scheduling Servers
The centralized nature of servers means that they’re a great place
to keep track of scarce resources like meeting rooms or your time. 2003 does not come with a
scheduling server, as Microsoft wants to sell you Exchange to do that sort of thing. But there are
alternatives to Exchange; there are some terrific Web-based scheduling tools that work great on
2003—for one example, take a look at
www.mattkruse.com/scripts/calendar/
or other tools,
like Lotus Notes.
E-Commerce Online Stores
If you’ve got something great to sell, then the Web’s one place
to do it. There are thousands of online stores on the Web, and a good number of them run on
2003. While 2003 includes a Web server, it doesn’t include the other software that you’d need to
create a complete online store. But there are a lot of consulting and programming firms that would
be happy to help you create an online store atop 2003!
Networks Need Connection Hardware and Links
If I want to offer a server service and ensure that you can enjoy that service, then we’ll both need to be
physically attached to the same network—the same series of cables, satellite links, or whatever—or
your computer’s requests will never get to my computer in the first place. That probably means that
we’re both on that huge network-of-networks called the Internet, but we could just be working for the
same company in a single wired building, or a multilocation firm connected by a private intranet.
Now, notice that if I’m going to run a Web server, I’ll need to be connected to our common
network (Internet or otherwise) persistently: I couldn’t decide to run a Web server out of my
house and just dial in to the Internet now and then. Of course, if I’m only serving some private
network that we share, then an Internet connection is unnecessary, as we already have connection
to a common network.
People who worry about the physical connection part of networking concern themselves with
getting cables run through walls, calling the phone company to arrange for persistently connected
data links of various kinds—links with names like DSL, cable modem, frame relay, leased lines, T1
or T3 lines—and then work with a family of hardware that helps get the bits going off in the right
direction—devices with names like switches, hubs, and routers.
Does 2003 help you with this part of the job? In some parts, it can. Switches and hubs are very
basic, simple devices, and 2003 has nothing to do with them—although clearly 2003 depends on
their presence in order to network! Routers are, however, more complex devices. You probably know
that the market leader in the router world is a firm named Cisco Systems, but you may not know that
a router is really just a small, single-purpose computer. If you wanted to, you could use a computer
running Server 2003 to replace a Cisco router. Additionally, if you wanted to allow people outside
your network to dial in to your network, you could use a Windows Server 2003 to make that
possible. (It’s not the best answer, as you’ll see in Chapter 6, but it
is
possible.)
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
26 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
Clients and Servers Must Speak the Same Protocols
But simply being connected to the same wire isn’t enough—we need a common communications language.
If I were to pick up a phone and dial some number in Beijing , I’d have a physical connection
with whatever poor soul picked the phone on the other end—but that would be the extent of our
interaction. In the same way, computer networks need to agree on things like, “What’s the biggest
block of data that I can ever send you?” and, “How shall I acknowledge that I actually
got
that block
of data?” or, “Should I bother acknowledging receipt of data at all?” and hundreds of other questions.
The answers to all of those questions are contained in the “network language” or, in network
techie terms, the
network transport protocol
. It probably won’t surprise you that more than one network
transport protocol exists, and over the years NT has generally supported three of them:
Ÿ
NetBEUI (Network Basic Input/Output System Extended User Interface), an old Microsoft/
IBM/Sytek protocol designed to support small networks
Ÿ
IPX/SPX (Internet Packet Exchange/Sequenced Packet Exchange), the protocol that Novell
NetWare predominantly used for years
Ÿ
TCP/IP (Transmission Control Protocol/Internet Protocol), the protocol of the Internet
and intranets
Although you have three choices, it’s a good bet that your Microsoft software-based network uses
TCP/IP. Why TCP/IP? Well, there have been some really great protocols over the years, but as the
Internet uses TCP/IP and as the Internet is so popular, TCP/IP has sort of trumped the other
protocols. In fact, it’s impossible to do a fair number of things that 2003 and its predecessors
Windows 2000 and, to a lesser extent, Windows NT 4 are capable of
without
TCP/IP. So I’m
going to assume for our discussion and indeed for most of this book that your network will use
TCP/IP.
Oh, and one more thing—once you’ve decided that TCP/IP is your network protocol of choice,
then you’ll need to install several
more
servers to support TCP/IP’s infrastructure. And here again,
when I say “more servers,” I’m not suggesting that you have to buy more PCs, although you might.
What I mean is that you’ll have to install software on some computer or group of computers to
perform three basic pieces of plumbing or infrastructure jobs:
Ÿ
A Domain Naming System (DNS) server keeps track of the names of the computers in your
network (an important task, believe it or not).
Ÿ
A Dynamic Host Configuration Protocol (DHCP) server configures the specifics of TCP/IP
on each computer in your network, both great and small.
Ÿ
A Windows Internet Name Server (WINS) does something like what DNS does—keeps
track of names—but isn’t really necessary on a “pure” Windows 2003 network—its main job
is to support older Microsoft operating systems like Windows 9
x
, Me, and NT 3.
x
and 4.
You’ll learn more about the specifics of DNS, DHCP, and WINS in Chapter 7. I should point
out that if you’re a one-person shop, then you might not need all of that, as your ISP might
be handling it for you—but I’m assuming throughout this book that you are probably a network
administrator/manager for a network of at
least
a few computers, and possibly for a tremendous
number of computers.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
27
Keeping the Bad Guys Away: Security
Once you’ve gotten the first four things done, then your job’s finished, in a sense—people can now
read and write files on that file server, view pages on that Web server, print to that shared printer, set
up meetings with you over your scheduling server, and so on. I mean, hey, networking’s all about
sharing, so just open the doors and let ’em in!
As you’ve probably realized, there’s a missing piece here: security. While there’s a lot to security,
it basically boils down to two things:
authentication
and
permissions
.
Ÿ
First, you want to be able to identify who’s entering your network. That’s authentication.
Ÿ
Second, once you know for sure who you’re talking to—once you’ve authenticated—then you
must be able to look up somewhere what that person is allowed to do, his
permissions
. For
example, a network logon could figuratively go something like, “Okay, now I know you’re
Jack…but I’ve been told to deny Jack access to everything.” Merely being authenticated
doesn’t mean that you get access!
Authentication
The first part of security is called
authentication
, and you usually accomplish it through usernames
and passwords, although as time goes on you’ll eventually use the more science-fiction means of
authentication: One day, the computer may recognize you by your fingerprint, face, voice, retina
blood vessel pattern, or some other item that’s distinctly you. The geek term for those authentication
approaches is
biometric
.
For now, however, it’s user accounts and passwords that identify users. I realize that nearly everyone
who’s reading this book has undergone an authentication at some point—you’ve logged in to a
network some time. It all sounds simple, doesn’t it? And yet user accounts and passwords present
special problems.
Storing Authentication Information
First, you’ll need some kind of program that lets administrators create user accounts and store them
in a file. In their simplest form, user accounts consist of a database of usernames and passwords.
That’s no big deal—it’s a very simply structured database, and there are tons of database programs
out there—but don’t forget that you need to
encrypt
that information. Otherwise, there’s the possibility
that someone could come along and steal the database file, take it home, and perhaps crack it
for your user’s passwords.
Just such a thing happened to NT 4. NT stored user information in a file named SAM. If you leave
me in the same room as your server, then I can copy that SAM onto a floppy and take it off-site to
analyze it. Wasn’t it encrypted? Well, yes, but sometimes encryption isn’t enough—a group of hackers
figured out how to crack SAM’s encryption. With just a bit of work, anyone could extract passwords
from an NT SAM. (Which is a good reason to keep your servers behind lock and key, so that it’s
harder for someone to steal your account files.) Windows 2000- and 2003-based domains (a term
I’ll define soon) use a more sophisticated encryption scheme on its user account/password file
(which is named
NTDS.DIT
, not SAM), but unfortunately even that file can be cracked with some
determination. Again, let me stress that this is only a danger if you let someone physically sit down
at the servers that do logons, a set of servers called domain controllers, so don’t worry that 2003 isn’t
secure. Any security person can tell you that you should
never
give the bad guys physical access to
your important servers—lock ’em up!
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
28 C
HAPTER
2
THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
The tool that lets administrators create, modify, or delete user accounts is called Active Directory
Users and Computers.
Active Directory
refers to Windows 2000 and 2003’s system for storing usernames
and passwords. It’s called a directory because
directory
is the current network lingo for “database
of user accounts.” Personally, I think it’s kind of confusing—in my mind, directory conjures up
visions of drive letters, like C:\DOS—but it’s the current argot, so it’s worth knowing. And, in case
you’re wondering, the “Active” part is just Microsoft marketing; don’t look for any deep meaning
there. (It’s not like Novell makes a product called Comatose Directory or Lethargic Directory.)
Authenticating without Compromising Security
So you’ve got a server somewhere that contains the list of usernames and passwords. Those are only
good if someone can use her username and password to be authenticated and get access to things
on the network. So you need some way for a user sitting at her workstation computer to be recognized
by that server. You’re already familiar with this recognition process: we call it logging on.
Suppose I’m sitting at my Windows XP workstation and I want to get to some files on a file server
named files-r-us.bigfirm.biz. Before files-r-us will give me access, I’ve got to submit myself for
authentication—I’ve got to log on. One of the many programs that comes with every version of NT
since version 3.1 is called
winlogon.exe
, and it’s the program that pops up when you first turn
your workstation on, asking you to punch in your username, password, and domain. (Again, I’ll
explain what a domain is in a minute.)
So imagine that I’m trying to access some data on files-r-us. Files-r-us responds by asking my
workstation, “What’s his name and password?”
Now
I’ve got a problem.
You see, what I’d
like
to do is to just say over the network line, “This is Mark and his password
is ‘swordfish.’” Then files-r-us can just look in its directory file of usernames and passwords and
see if it has a user named Mark with a password of “swordfish.” If so, then it lets me in. If not, it
doesn’t. Simple, eh?
Well, there’s one flaw here—the part where my workstation passes “swordfish” over the network.
A class of programs called “sniffers” can record and display any data that passes over a network wire.
So passing passwords around on an unencrypted Ethernet cable isn’t a great idea. That means
you’ve got another challenge: how to prove to a server across the network from you that you’ve got
Mark’s password without actually showing that password to the server.
Over time, networks have come up with different answers, but Active Directories, whether based
on Windows 2000 or 2003, use an old authentication method called Kerberos which some folks at
MIT first invented in the mid ’80s. It replaces an older method employed by NT 3.
x
and 4 called
NTLM, which was short for NT LAN Manager, a reference to one of NT’s predecessors. What
follows is an extremely simplified version of how Kerberos works. (It’s actually a wildly simplified
description, but it’ll help you understand the more complete explanation that you’ll see in the next
section.)
Let’s return to files-r-us. I try to access its data, so files-r-us needs to first log me in. It does that
by saying, “I’ll tell you how to access my data,” and sends me some instructions on how to get to its
data. But the data is
encrypted—
with my password! In other words,
anyone
could claim to be me, and
files-r-us would happily send these vital instructions-for-connection. But only I can decrypt those
instructions, so only I can benefit from them. So files-r-us ensured that only someone with my
password could gain access, without sending my password over the wire.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING?
29
Centralizing and Sharing User Account Information: Domains
But my simple example about trying to access one file server is, well, a bit
too
simple. Most companies
will end up with more than one server, and in fact it’s not unusual to end up with dozens
or hundreds of servers. And that leads to the following problem. Recall that I said a page or so
back that if you’re going to employ user accounts, then you’ll need a file to store them in. But what
if you have more than one server? What if in addition to the server named files-r-us.bigfirm.biz, I’ve
also got a mail server named postoffice.bigfirm.biz and a Web server named www.bigfirm.biz?
I might want to log in to any one of those three, so they
all
have to be able to accomplish logons. But
now let’s examine what that actually means in terms of keeping track of user accounts. Should
each server contain a complete copy of
NTDS.DIT
, the file containing the names and passwords
for users?
That might work, but it’d be a pain, for several reasons. First,
NTDS.DIT
can get pretty big, and I’d end
up burning up a lot of disk space copying it to every server in my enterprise. Second, if servers are
connected by low-speed WAN links, the process of copying the changes to
NTDS.DIT
to all of the
servers on my network (a process called
directory replication) would take up a lot of time and network bandwidth.
Third, do I really want to have to create a network “storm” of file copying amongst the servers
every time someone just changes his password? And finally, what about the issue of securing the
NTDS.DIT file in the first place? If I copy NTDS.DIT to every single server in the enterprise, there are bound
to be a few that are out in the open, not physically secured. It’d be easy for an intruder to copy the
NTDS.DIT from a poorly secured computer and spirit it off-site, to crack it at leisure.
The better idea that we’ve used in networks for years is to put the user directory, the NTDS.DIT, not
on every single server, but instead on a relatively small subset of the servers. Those NTDS.DIT-holding
servers then serve in the role of logon server, doing the job of authenticating for the other servers. In
Microsoft parlance, a logon server is more commonly called a domain controller. So, to return to the
example of accessing data on files-r-us, imagine that files-r-us is not a domain controller and doesn’t
contain a copy of NTDS.DIT, and that another computer, vault.bigfirm.biz, is a domain controller
and contains a copy of NTDS.DIT. In this newer arrangement, I don’t directly log into files-r-us but
instead enlist the aid of vault.bigfirm.biz in order to authenticate with files-r-us.
In a purely Active Directory network (which can only include Windows 2000, XP, and 2003 systems),
vault.bigfirm.biz would help me log in to files-r-us with Kerberos. In order to understand how
Kerberos works, you first need to understand that under Kerberos, not only do the users have passwords,
the server programs do also. Thus, the file server program running on files-r-us has its own
password. So both the user and the server each have passwords—remember that.
When I tell my workstation to try to get some data from files-r-us, my workstation sees that
it’ll need to get me logged in to files-r-us. It does that by asking the domain controller, vault, to
give me something called a “ticket” to the file server service on files-r-us. The domain controller
responds by handing my workstation an encrypted piece of data, which is the Kerberos ticket.
The ticket can be decrypted with my password, making its contents a mystery to anyone but me
(or my workstation, which obviously knows my password). My workstation decrypts the ticket,
which contains two things. First, it contains a message saying “your special one-time-only password
for accessing the file server at files-r-us is ‘opensesame.’” Second, it contains another encrypted
message—but this one’s not encrypted with my password, so I can’t decrypt it! But my workstation knows
to send it to the file server, which decrypts it successfully, as the file server has its own passwords.
Once the file server receives and decrypts the part of the Kerberos ticket that I sent it, the file server
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
30 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
sees that that ticket piece says something like, “The special one-time-only password for communicating
with Mark is ‘opensesame.’ And by the way, you should have gotten this message from Mark
sometime between 10:45 A.M. and 10:50 A.M. from his IP address, which should be 117.39.82.3.”
Once the file server gets its half of the Kerberos ticket, it knows a few things:
Ÿ The user claiming to be Mark who wants access to the file server is indeed Mark.
Ÿ Any messages from that now-authenticated person named Mark should have originated from
IP address 117.39.82.3.
Ÿ If Mark and the file server really want to maintain a secure connection, they could even encrypt
their communications using this shared—but secret—password, opensesame.
Security Roles and Definitions: Domains, Domain Controllers, and Member Servers
Armed with this information, I can define a few Microsoft networking terms.
Domain You just saw an example where one machine (vault) let me log in to another machine
(files-r-us). I haven’t mentioned this yet, but before I could get anywhere I needed to log in to the
computer at my desk, my workstation—and when I first tried to log in to my workstation, it was
once again vault.bigfirm.biz that authenticated me. Clearly, then, my workstation and files-r-us
“trust” vault.bigfirm.biz in some fashion.
The collection of machines that share the same list of user accounts, the same NTDS.DIT, is a
domain. Or, to put it a bit more specifically: several computers hold a copy of NTDS.DIT and are
willing to act as “logon servers” (domain controllers) with that NTDS.DIT. The collection of
machines that are willing to accept logons from those domain controllers (in Microsoft terms, who
“trust” those domain controllers) and the domain controllers themselves are collectively called
a domain. So my workstation, vault, and files-r-us are all part of the same domain.
Domain Controller A server, such as vault.bigfirm.biz, that contains a copy of the user
account/password data, and that therefore can let users log in to servers, is a domain controller. Domain
controllers exist to centralize the user account/password information so that you needn’t put
the NTDS.DIT on every server.
Member Server A machine that is running NT 3.x, 4.0, 2000, or Server 2003 but not acting
as a domain controller will not contain a copy of NTDS.DIT and therefore can’t authenticate domain
members. Such a machine is called a member server.
Permissions and Access Control Lists (ACLs)
Once a server has determined that I am indeed me, does that mean that I’ll get access to the server’s
information? Not necessarily. Authentication just identifies me. The next step in security is access
control, also known as (depending on what network operating system you are using) rights, permissions,
or privileges.
Ever since its earliest versions, NT (which includes Windows Server 2003) has had a very
flexible system of file and directory permissions. As you’ll see later in this book, you can exert
very fine-grained control, such as specifying that Mary can read or write to a given file, that Bill can
only read it, and that June cannot access the file at all. Don’t get the idea, however, that permissions
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 31
refer only to files. There are permissions to do things like create, modify, and destroy user accounts,
and even permissions to create domains in the first place. The flexibility of these permissions is one
of Microsoft networking’s great strengths.
Just about everything in the Microsoft networking world has security on it. Want to read a
file? You need the permissions to read it. Want to shut down the program that provides the Web
server? You need the permissions to shut it down. Want to create a new user account on your network?
You need the permissions to create a new user.
These permissions are stored as a list. In the case of the file, the operating system sets aside a little
space for every file that it creates, and keeps the permissions in that space. A set of permissions for
a file, then, might look like
Ÿ A user named June can do anything that she wants to the file.
Ÿ Another user, Joe, can only read it.
Ÿ Any user in a group named Cube-dwellers can read or modify the file, but not delete it.
Ÿ The operating system can do anything that it wants to the file.
In Microsoft networking-speak, that list is called an access control list or, inevitably, ACL. Each
of the four entries are called access control entries or ACEs. You will learn in this book that lots of
things have ACLs, and adjusting those ACLs is how you configure security in your network.
Access to Earlier Security Systems
The last challenge that Windows 2000 and 2003’s security designers faced was the so-called “legacy”
support—ensuring that they could interact with the security systems built into Windows for
Workgroups, Windows 9x, NT 3.x, and 4. I’ve described in very broad strokes how Kerberos works,
but Windows and NT didn’t use anything like that and in fact couldn’t do Kerberos logons; Kerberos
first appeared in the Microsoft networking world in February 2000, with the introduction of
Windows 2000. Microsoft knew that you wouldn’t be very happy if they required you to throw away
all of your old Windows 9x and NT systems before you could implement Active Directory, so
Windows 2000, XP, and Server 2003 know a variety of logon methods—NTLM 1.2 for Windows 9x
and NTLM 2.0 for NT 3.x and 4—in addition to Kerberos.
It’s hard to overstate the importance of security. For example, in the past, one of Novell’s main
advantages over NT was in the way that it stored user accounts and handled logins—Novell’s security
was faster and more flexible. Sure, one could argue that Novell moved data around file servers more
quickly, but not so much more quickly that anyone would really modify a buying decision. Basically,
people were buying Novell for Novell’s security system, something called NetWare Directory Services
(NDS). NDS was essentially a big-time user database, something with a more enterprise feel to it than
NT’s older SAM-based system. In short, security is important.
Names: Finding Servers and Resources
When PC-based networking first appeared, we didn’t do much Web work—the earliest common
LAN functions were file and print services. So from the very beginning (all of 15 years ago) of
PC-based networking, we’ve done file and print services; they’re the most basic network services. But
now suppose that you’ve got a network with more than one server on it, and you want to find out
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
32 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
which server has a printer available for sharing, or you can’t remember which server holds that share
called hrdocuments; how do you search for network functions?
That’s one of the oldest problems in networking, and not just in Microsoft networking.
Microsoft’s most current answer to the “how can I find resource X on the network?” question is
to store that information in the Active Directory database. But they’re not there by any means yet and,
even if you have an all-Windows 2003 and XP network (which is unlikely), you’ll find that by
default the Active Directory isn’t all that much help in finding file and printer shares. I’m sure
that’s going to change as new versions of NT appear, but for now, we Microsoft operating systems
users are pretty much stuck with an old technology known colloquially as the Network Neighborhood
or, in Windows 2000 and later, My Network Places. Here’s where it came from and how
it works.
How would you set up a system that provided a centralized directory of services on a network,
a kind of “yellow pages” that lets a user quickly find a file share or shared printer? Microsoft networking
uses a name server system called the computer browser or browse services—it has nothing at all
to do with the Web, it’s had that name since before the Web existed—where you, the network
administrator, don’t have to do anything; the name servers set themselves up automatically. Sounds
good? Well, it is for small networks, but it gets troublesome for larger ones—which is why
Microsoft is trying to phase it out.
The servers in a Microsoft network that contain information about network services are called
browse masters or master browsers. What’s different about the concept of Microsoft browse servers is
that no one computer is fixed as the browse master. Instead, when your computer logs in to your network,
it finds a browse master by broadcasting a request for one, saying, “Are there any browse masters out
there?” The first browse master to hear the workstation (there can be multiple browse masters,
as you’ll see) responds to the workstation by saying, “Just direct all your name service requests
to me.”
When a server starts up, it does the same thing. It broadcasts, “Are there any browse masters out
there?” and when it finds one, it says to it, “I am a server with the following shares. Please add me
to your list of servers.” The list of servers that a browse master maintains is called the browse list,
not surprisingly.
Tip This is the really irritating thing about the browse list: it’s broadcast-based. That means that if your network isn’t
100 percent broadcast-friendly, then you’ll sometimes end up with an incomplete list of servers on your network. So if
you have a network built in more than one segment (and who doesn’t?), or you use some kinds of Ethernet switches rather
than hubs, then you may experience missing servers in the browse list. That’s part of why Microsoft is trying to phase out
the browse list. But for now, understand that the browse list is a largely lame and unreliable technology. You’ll see later
on, in Chapter 7, that you can install a service called the Windows Internet Name Service (WINS) to reduce the chance
that the browser breaks, but trust me—you’ll eventually come to a point where you’ve done everything that you can do,
but the browser still doesn’t work. When that happens, don’t feel bad—we’ve all been there. I’ll suggest some ways to make
it work better and reduce your dependence on the browser a bit later in this section.
By now, you may be wondering, “How come I’ve never seen one of these browse lists?” You
have. If you ever worked with earlier versions of NT or with Windows for Workgroups, then
you saw Figure 2.1 when you opened the File Manager and clicked Disk/Connect Network Drive.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 33
FIGURE 2.1
Sample browse list
from Windows for
Workgroups or
Windows NT
version 3.x
From Windows 9x or Windows NT 4, you can see a browse list by opening the Network Neighborhood
folder, as in Figure 2.2.
FIGURE 2.2
Sample browse list
from Windows NT 4
or Windows 9x
From DOS or indeed any command line, you can see a browse list by typing net view or net view
\\ machinename. You see a screen like the one in Figure 2.3.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
34 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
FIGURE 2.3
Sample browse list
from a command line
Note What’s with that \\ thing? Microsoft’s network software has, since 1985, used a way of writing the names
of servers and of shares on servers called a Universal Naming Convention or UNC. It looks like \\servername\
sharename. So, for example, if I had a server named bigserver that contained a file share called mydata, I’d refer to
that share as \\bigserver\mydata—that would be the UNC for that share. You’ll learn more about this in Chapter 11,
on file shares, but I wanted to explain the mystifying \\ briefly here. And by the way, you pronounce “\\” as “whackwhack”
in the Microsoft world. Now, to my way of thinking, that’d mean that a regular forward slash— / —would
be pronounced “backwhack” in Microsoftese, but I’ve never gotten confirmation on that.
Each figure shows you the list of servers available: Aldebaran, Artemis, and Astro, just to list a
few. Other servers—Daffy and MWM66—appear only in some of the browse lists because a few
minutes passed between taking the screen shots, and a few “test” servers went up or down in those
few minutes. In all three cases, the workstations that these screens were taken from got their
browse lists from a local browse master.
You can drill down further into these browse lists, as well. In Windows 9x/Me, Windows NT 4,
2000, XP, or Server 2003 (in 2000, XP, or Server 2003, open My Network Places), you can
double-click any one of those servers and see the list of shares that the servers offer; that too, is
information from the browse list. In Windows for Workgroups or Windows NT 3.x, you’d just
click a server once, and the list of its shares would appear in the bottom pane of the dialog box. From
DOS or any other command line, you’d get the list of servers by typing net view, as you’ve already
seen, and then you get the list of shares for any given server by typing net view \\ servername, where
servername is the name of the server whose shares you want to see.
When Browse Lists Get Too Large: Workgroups to the Rescue
As I’ve described them so far, browse lists seem pretty convenient. But in the little test network
that I used for the previous screen shots, you saw only a few servers. Hell, everything works fine on
small networks.
Now let’s talk about your network. Sit down at a corporate network of any size and you see dozens,
hundreds, or thousands of servers. Scrolling down through a 500-server browse list would be a bit
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 35
time-consuming—to say nothing of how much work the browse master would have to do to keep
it up-to-date! The problem to solve is, then, managing the size of the browse list. There are two
ways to do that:
Ÿ Reduce the number of servers in your enterprise.
Ÿ Divide the enterprise-wide browse list into several smaller browse lists called workgroups.
Disable Peer-to-Peer Sharing on Workstations
The first answer is actually a bit off the main topic, but let me digress for a moment and talk about it
before returning to the main item: workgroups. When I say, “Reduce the number of servers,” I’m
talking about an unfortunate side effect of running Windows for Workgroups, Windows 9x/ME,
Windows NT, 2000, or XP workstations—they all have the capability to become peer-to-peer
servers. The browse masters don’t distinguish between industrial-strength servers running NT Server
and low-octane peer-to-peer servers, so you could end up with a browse list that’s supposed to only
list your servers, but actually lists all of your servers and workstations. In general, I think peer-to-peer
networking is a bad idea. If a piece of data is important enough to be used by two employees, then
it’s a company asset that should be backed up regularly and so should go on a managed file server, not
a desktop machine that’s probably backed up once a decade. My recommendation is this: Disable
the peer-to-peer sharing option on your Windows for Workgroups, Windows 9x/ME, Windows
NT, 2000, and XP workstations. How you do this depends on the operating system of the workstations
in question. In NT 3.x and 4, open the Control Panel and then the Services applet; locate the
service called Server and stop it, as well as disabling it for future reboots. In Windows 9x, go to
Control Panel/Network/File and Print Sharing and make sure both options, to share files and
printers, are unchecked. In Windows for Workgroups, make sure the sharing control in Network
Setup is set not to enable file or printer sharing. In Windows 2000 and later, right-click My Computer
and choose Manage, then find the Services folder and stop the Server service. (You’ll see more
about doing this later in the book.)
Not only will your network have less traffic—workstations will no longer have delusions of serverdom,
so they won’t be chattering at the browse master all of the time—but not loading the server part
of the workstation’s operating system saves RAM on the workstation.
Divide the Browse List into Workgroups
The other approach to keeping a browse list to a manageable size is to subdivide it in some way.
That’s a reasonable thing to suggest if you realize that, no matter how large an organization seems
to be, it’s usually composed of lots of smaller groups, such as Manufacturing, Sales, Marketing,
Accounting, Finance, Personnel, Senior Management, and so on. Each of those groups can be called
workgroups, and you can pretty much chop up your enterprise into workgroups in any way you like
(but a rule of thumb says that a workgroup should be a group of people for whom 95 percent of the
data generated by that group stays within that group).
From a more network-technical point of view, the minimum definition of a workgroup is just
a group of workstations that share a browse list. (That’s my definition, not Microsoft’s.) The idea is that
when someone in Accounting opens up her browse list, you want her to see just the Accounting
servers, not the Manufacturing servers, as she has no use for the Manufacturing servers. (Besides,
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
36 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
there’s a good chance that she doesn’t have permission to access the Manufacturing servers anyway—
but I’ll get to workgroups and security in a little bit.) How do you join a workgroup? See the sidebar
“How Do I Join a Workgroup?”
Note Workgroup names are like Windows 9x and NT 3.x/4.x machine names and can be up to 15 characters long.
So, to review what you’ve seen so far:
Ÿ Network browse lists allow a user at a workstation to see all of the servers on the network, and
from there to see all of the shares on a given server.
How Do I Join a Workgroup?
Generally, all you need to do is to tell the networking software on your workstations and servers that
they’re members of a given workgroup. There isn’t any “security” in being part of a workgroup—you
pretty much just declare yourself a member and you are a member. (As a matter of fact, if you misspell the
name of the workgroup, you end up accidentally founding a whole new workgroup all by yourself, which
I’m sure was not your intention!)
Specifically, you designate which workgroup you’re a member of in one of the following ways:
From a DOS or Windows for Workgroups workstation In the [network] section of the SYSTEM.INI
file you’ll find a WORKGROUP=parameter. (You’ll have a SYSTEM.INI even if you’re just running DOS,
because the network client software creates one.) You can also set the workgroup from the MS-DOS Network
Client Setup program, or in the Windows for Workgroups’ Network applet of the Control Panel.
From Windows 9x Open the Control Panel and double-click the Network icon. In the property sheet
that you see, click the Identification tab. You see the place to fill in the workgroup name.
On Windows NT 3.x Open the Control Panel and double-click the Network applet. You’ll see a button
labeled Domain or Workgroup. (NT has a kind of confusing way of blurring workgroups and domains,
which I’ll make clearer later in this chapter.) Click that button, and you can change the workgroup you’re
a member of. Again, NT complicates choosing a workgroup somewhat, so read the rest of this chapter if
you want to change an NT workgroup.
On Windows NT 4 Open the Control Panel and double-click the Network applet. Like Windows 9x,
Windows NT 4 has a property sheet with an Identification tab. Click Change to change the workgroup.
Again, with NT you may see no references to workgroups at all; instead you see references to
domains. Read on to understand the differences.
On Windows 2000 If you’re a member of a domain, then do not join a workgroup—I’ll explain that
in a minute. Otherwise, right-click My Computer and choose Properties. Click the Network Identification
tab and then the button labeled Properties. Fill in a new workgroup in the field named Workgroup;
then close the dialog box and reboot.
On Windows XP and Server 2003 Right-click My Computer and choose Properties. (You may have
to click the Start button to find My Computer.) Click the tab labeled Computer Name, then the button
labeled Change. In the resulting dialog box, you’ll see the choice to become a “Member of:” either a
domain or a workgroup. Click the radio button next to Workgroup and fill in the workgroup name,
then close the dialog box and reboot.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
WHAT’S THE POINT OF NETWORKS AND NETWORKING? 37
Ÿ Browse lists can get fairly long, so you can partition your entire network into workgroups, which
are just groups of people that share a browse list.
Ÿ When you request a browse list, you don’t get the entire list of servers in your enterprise
network, you only get the list of servers within your workgroup.
Ÿ Each workgroup has one or more servers that act as gatherers of browse information. They’re
called browse masters or master browsers, and they’re picked automatically.
Ÿ Machines that are only workstations and don’t act as servers even in a peer-to-peer capacity
do not appear on browse lists.
As the question of what machines go on a browse list and what machines don’t is important to the
length of a browse list, let me list the kinds of machines that can act as servers in a Microsoft
enterprise network:
Ÿ Windows 3.x (with the Workgroup Add-On for MS-DOS clients)
Ÿ DOS (with Workgroup Add-On for MS-DOS clients)
Ÿ Windows for Workgroups
Ÿ Windows 9x/Me
Ÿ NT Workstation
Ÿ NT Server
Ÿ Windows 2000 Professional
Ÿ Windows Server 2003
How Do I View a Browse List?
Microsoft has built different browse programs into its various network client software.
From a DOS or NT/2000/XP/2003 Command Line Type net view. That shows you the list of
servers. You can view the shares on a given server by typing net view \\servername. To see the browse
list for a workgroup other than your own, type net view /workgroup:workgroupname.
From NT, 2000, XP or Server 2003, don’t use /workgroup: in the command; instead, use /domain:.
From Windows for Workgroups or Windows NT 3.x Open the File Manager, click Drive, and then
click Connect Network Drive. You’ll see a window with two panes. The browse list for your workgroup
and a list of the other workgroups on the network appears as the list of possible servers in the top pane and,
when you click a server, that server’s shares appear in the bottom pane. To see the browse list for a
workgroup other than your own, double-click the name of the workgroup in the top pane.
From Windows 9x or Windows NT 4 Open the Network Neighborhood folder. You’ll see the servers
in your workgroup represented as PC icons in a folder. Double-click one of the servers, and a folder
will open up showing you the shares. To see the browse list for a workgroup other than your own,
double-click the Entire Network icon and you’ll see a list of workgroups. On Windows NT 4, click
Entire Network and then Microsoft Network, and you’ll get a list of the other workgroups.
Continued on next page
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
38 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
As it’s an unusual product, let me just explain that the Workgroup Add-On for MS-DOS is a
separate Microsoft product that lets you use a DOS machine as a peer-to-peer server. (Also, it’s pretty
old, so I have no idea where you’d get a copy these days.) Again, I recommend that you disable file
and print sharing on all of these machines except, of course, for the machines dedicated to the task
of being servers, all of which are probably running NT Server.
And once you’re in a workgroup, you’ll no doubt want to see your browse list; the sidebar “How
Do I View a Browse List?” tells you the specifics.
Now, if you tried that on a working network, then you might have gotten one of NT and family’s
less helpful responses, like “System error 1230 has occurred.” That gives me the chance to offer another
important bit of advice for anyone using a modern Microsoft operating system: how to convert a
numeric error code into a bit of explanatory English text—see the sidebar for more information.
Before leaving the topic of the browser, let me offer one more piece of advice: try to avoid it,
as it’s unreliable. If your users need access to particular file shares, then you can deliver access to those
shares in a few ways. First, you can map file shares, which means that you can create imaginary drive
letters on your user’s workstations. In other words, if the user often uses \\server1\compdata, then
you could set up her workstation so that she’d see a new drive V: which isn’t a local hard disk—
although it looks like a local hard disk—but is instead a network drive. Or you could simply create a
shortcut to the UNC on her desktop. You’ll learn how to do both of those things in Chapter 11.
How Do I View a Browse List? (continued)
From Windows 2000 If your system is in a workgroup, open My Network Places and then the icon
labeled Computers Near Me. If your system is part of a domain, then that icon isn’t available. Instead,
open My Network Places and the icon labeled Entire Network, then the icon named Microsoft Windows
Network. You’ll see one or more icons representing the workgroups on your network—open the
one representing your workgroup and you’ll see your workgroup’s browse list.
From Windows XP or Server 2003 Open My Network Places. It might be on your desktop, or it
might be on the Start menu, or you might have to right-click the Desktop and choose Properties, then
click the Desktop tab, followed by the Customize Desktop button, then check the box next to My
Network Places and click OK twice. My Network Places will be on your desktop. Once you have My Network
Places open, then you’ll either see a Network Task on the left of the folder labeled View
Workgroup Computers or you might have an icon labeled Entire Network, in which case you should
double-click that, then double-click Microsoft Windows Network. You’ll then see an icon of three PCs
representing your workgroup—click that and you’ll get your workgroup’s browse list.
How to Convert a Numeric Error Code to English Text
Just type net helpmsg number, where number is the error code. For example, you’ll probably stumble
across error 5 now and then: “access is denied.” It means that you didn’t have the right to do something
that you tried to do. Another common one is error 53, “the network path was not found.” It means that you
tried to access some server that the system can’t find or, as is usually the case for me, you misspelled the
server’s name.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
SO WHY USE NT/2000/SERVER 2003? 39
Summary: The Necessary Evils
I hope in this section that I’ve provided a bit of an answer to the question, “Why do we have to worry
about all of this stuff just to get a mail server up and running?”
Ÿ First, you need a piece of server software that can accomplish whatever it is that you’re trying
to do—Web server, mail server, or whatever.
Ÿ Next, you need to be compatible with and connected to a physical network that connects to
your clients—either the public Internet or a private network of some kind.
Ÿ Then your server must move its data around in the same way that your clients’ machines do,
using the same network language or protocol, probably TCP/IP. TCP/IP itself will require
some server functions as well, to maintain it.
Ÿ It wouldn’t be necessary in a perfect world, but in our imperfect world your network needs to
protect its data with a security system, and in today’s world that unfortunately means an
elaborate security system.
Ÿ Finally, you’ll need some way of finding what you put in that network, once you’ve got it working.
Active Directory will become that way in the future, but for now it’s a kludgy thing called
the Computer Browser that you see in My Network Places.
So presumably you now see why your network needs so many moving parts. Why buy them from
Microsoft?
So Why Use NT/2000/Server 2003?
I hope that by now I’ve convinced you that networking seems like a good thing. But you could build
your network atop any number of operating systems, including Unix, Linux, Novell NetWare,
IBM’s OS/400 or MVS, or Compaq’s VMS, just to name a few. Why NT or its most recent incarnation,
Windows Server 2003?
Well, understand when I answer that question that (1) I’m not from Microsoft, (2) I’m not
here to sell NT/2000/2003 to you, I’m just here to tell you how to make it work, and (3) the reality
of the matter is that every one of the OSes that I just named are good products that have not only
their adherents and detractors, but that also have many solid positive features. After decades of
business computer use, the market has filtered out both the truly terrible products and some perfectly
good but inadequately marketed products, leaving only products that are at least competent (and
always well-marketed). So if you want to read that Server 2003 is not only your best choice, but also
that you’re a total fool to try to use anything else, then I’m afraid you’ve come to the wrong place. Yes,
I like NT, including its latest incarnation (Server 2003), but it’s not the only answer.
But it is a very good answer. Here’s why.
It’s the Market Leader
Most stats that I see say that the Microsoft family of operating systems has the largest market share—
43 percent of servers according to the last set of numbers that I saw. Being part of the biggest market
share means that it’s easier to find consultants, support, and third-party tools. Oh, and it also means
that there’s plenty of demand for your services once you become an expert!
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
40 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
Its Familiar GUI Makes It Easier to Get Started
The fact that Windows Server 2003 uses a GUI that is basically the same as Wintendo—oops,
I meant Windows 9x/Me—means that hundreds of millions of people already know how to navigate
the 2003 Desktop. Yes, some things have been moved around, but in general once you know
Windows, you know how to get around on 2003.
In contrast, I have recently done a lot of work with Linux and, while it’s a quite powerful operating
system, the user interface is not for novices; even its multitude of GUIs are still clumsy, although that’ll
probably change with time. (That’s not to say that you shouldn’t use Linux—just that I think the
Microsoft OSes have an easier-to-use GUI.) With 2003, you can often figure out how to solve a
problem by noodling around in the GUI—it lends itself more to exploration than would an operating
system that relies mainly upon command-line commands to control it.
Many Tools Come “in the Box”
When NT 3.1 first came out, it was pretty amazing that it came with a dial-in module and a host
of other goodies that you had to buy separately in order to run its competition at the time, Novell
NetWare. NT had a free TCP/IP stack when many other OSes were charging big bucks for it, a
free Web server, and so on. Since then, other server operating systems have continued to include
more and more things with the basic operating system—for example, the variety of tools that comes
with Linux is nothing short of stunning—but Microsoft has kept the heat on the competition by
including a variety of new tools with every release. At this point, the basic version of Server 2003
includes (in addition to its basic functionality of a file and print server) a Web server, an FTP server,
a sophisticated Internet router, automated workstation rollout tools (Remote Installation Services),
centralized software distribution tools (Group Policies), a two-level disk storage system (Remote
Storage Manager), encryption (Encrypted File System), an e-mail server, a SQL-based database server
and lots of other tools.
Not all of the tools are stellar; for example, the disk quota system, which allows you to keep any
given user from stealing all of the disk space on the shared file servers, is pretty lame. But because
Server 2003 provides at least a basic quota functionality, the many shops that are trying to minimize
the number of vendors they deal with can get an awful lot of their networking needs met in just
one package: Server 2003.
When you view Microsoft products, bear in mind that you usually won’t encounter really cuttingedge
tools; in my judgment, that’s not Microsoft’s market niche. Instead, they seem to focus on
incrementally improving existing products, as well as adding new tools by imitating competitors. Not
being the first on the block can sometimes be a pretty good thing, as you get to watch the competition’s
mistakes. Very little in Windows Server 2003 is truly never-seen-before-in-the-world new.
Instead, it’s a distillation of a lot of other people’s good ideas. Yes, some may see that as stealing
other people’s good ideas, and there’s some merit to that view. And Microsoft has what some might
call an unfair advantage in that they’ve got enough money to keep trying and trying and trying; for
example, their first two networking products, MS-NET and LAN Manager, were pretty weak
compared to the competition’s, but they had the money and tenacity to keep slugging away it, finally
releasing the far-better NT product. Another example of this strategy occurred in 2001, with
Microsoft’s release of the Pocket PC 2002 operating system. They’re trying to crush the PalmOS
guys in the palmtop market, and they’ve made two weak attempts with Windows CE 1.0 and 2.0, but
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
A BRIEF HISTORY OF NT 41
they’re learning. I don’t know if Pocket PC will beat PalmOS—as a long-time Palm user, I tend to
think not—but they’ll definitely steal more of PalmOS’s market share with Pocket PC than they ever
did with Windows CE.
And while Microsoft’s detractors like to paint Microsoft as nothing but a bunch of rip-off artists,
it’s actually hard to find who originated these ideas. Some say that Microsoft stole Novell and Apple’s
best ideas; well, Novell certainly didn’t invent networking, and their IPX/SPX protocol is blatant
“theft” of a Xerox protocol. Apple didn’t invent the GUI that Microsoft supposedly stole—Xerox
did. (Hmmm, maybe there’s a pattern here.) Nor is Active Directory a rip-off of an original Novell
product, Netware Directory Services—NDS is based on a directory standard called X.500 and terms
that many people think that Novell invented, like “organizational unit,” are X.500 terms. In any case,
it is something of a comfort for people to be able to buy a single product that is a decent fit for just
about all of their networking needs, instead of looking for the best of breed in each area. Why?
Anyone who’s ever tried to troubleshoot a multivendor network problem knows why: Both vendors
just point the finger at the other vendor and say, “That’s him—he’s the guy causing your problem.”
(They’re hoping you’ll get tired and go away. Most of us do, sadly.)
In contrast, the same people are developing all of 2003’s pieces; so you have to believe that at some
point someone would have noticed if they didn’t fit together. Or that if someone didn’t notice it before
they shipped, they’ll get around to fixing it afterward.
In sum, why use 2003? It’s fairly reliable, it does most of what you want a network operating
system to do, it’s reasonably priced, and enough other people use it that you’re probably not going
to go terribly wrong.
A Brief History of NT
Let’s finish this chapter with a look at how NT has grown and changed since its early days.
Even in the early 1980s, Bill Gates knew that networking was a key to owning the computer
business. So, on April 15, 1985, Microsoft released its first networking product, a tool called
MS-NET, and its companion operating system, DOS 3.10. Most people knew about the new DOS
and were puzzled at its apparent lack of new features. What it contained, however, were architectural
changes to DOS that made it a bit friendlier to the idea of networks.
Now, Microsoft wasn’t big enough at that time to create much hoopla about a new network operating
system, so they let others sell it—no matter how high or low you looked, you couldn’t buy a product
called MS-NET. Instead, it sold mainly as an IBM product under the name of the IBM PC Network
Support Program; IBM viewed it as little more than some software to go along with their PC Network
LAN boards and, later, their Token Ring cards. The server software was DOS-based, offered
minimal security, and, to be honest, performed terribly. (Believe me, I know; I used to install them for
people.) But the software had two main effects on the market.
First, the fact that IBM sold a LAN product legitimized the whole industry. IBM made it possible
for others to make a living selling network products. And that led to the second effect: the growth of
Novell. Once IBM legitimized the idea of a LAN, most companies responded by going out and
getting the LAN operating system that offered the best bang for the buck. That was an easy decision:
NetWare. In the early days of networking, Novell established itself as the performance leader. You
could effectively serve about twice as many workstations with Novell NetWare as you could with any
of the MS-NET products. So Novell prospered.
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
42 CHAPTER 2 THE BASICS: NETWORKING SOFTWARE, SERVERS, AND SECURITY
As time went on, however, Microsoft got better at building network products. 3Com, wanting to
offer a product that was compatible with the IBM PC Network software, licensed MS-NET and
resold it as their 3+ software. 3Com knew quite a bit about networking, however, and recognized the
limitations of MS-NET. So 3Com reworked MS-NET to improve its performance, a fact that didn’t
escape Microsoft’s attention.
From 1985 to 1988, Microsoft worked on their second generation of networking software. The
software was based on their OS/2 version 1 operating system. (Remember, Microsoft was the main
driving force behind OS/2 from 1985 through early 1990. Steve Ballmer, Microsoft’s number two
guy, promised publicly in 1988 that Microsoft would “go the distance with OS/2.” Hey, the world
changes and you’ve got to change with it, right?) Seeing the good work that 3Com did with
MS-NET, Microsoft worked as a partner with 3Com to build the next generation of LAN software.
Called Microsoft LAN Manager, this network server software was built atop the more powerful
OS/2 operating system. As with the earlier MS-NET, Microsoft’s intention was never to directly
market LAN Manager. Instead, they envisioned IBM, 3Com, Compaq, and others selling it.
IBM did indeed sell LAN Manager (they still do in the guise of OS/2 LAN Server). 3Com sold
LAN Manager for years as 3+Open but found little profit in it and got out of the software business.
In late 1990, Compaq announced that they would not sell LAN Manager because it was too complex
a product for their dealers to explain, sell, and support. Microsoft decided then that if LAN Manager
was to be sold, they’d have to do the selling, so on the very same day as the Compaq withdrawal, they
announced that they would begin selling LAN Manager directly.
Note Interesting side note: Ten years after Compaq decided that their sales force couldn’t sell network software,
they reversed direction and said that they’d sell a special version of Windows 2000 called Datacenter Server. It’s
special because you cannot buy it from Microsoft—you must buy it preinstalled on specially certified vendor hardware.
In other words, the hardware vendors (Compaq’s not the only one selling Datacenter) now believe that they can sell
complex network operating systems. I wish them the best of luck, but stay tuned to see the outcome of this particular
marketing maneuver!
LAN Manager in its first incarnation still wasn’t half the product that Novell NetWare was, but
it was getting there. LAN Manager 2 greatly closed the gap, and in fact, on some benchmarks LAN
Manager outpaced Novell NetWare. Additionally, LAN Manager included administrative and security
features that brought it even closer to Novell NetWare in the minds of many network managers.
Slowly, LAN Manager gained about a 20 percent share of the network market.
When Microsoft designed LAN Manager, however, they designed it for the 286 chip (more
accurately, I should say again that LAN Manager was built atop OS/2 1.x, and OS/2 1.x was built
for the 286 chip). LAN Manager’s 286 foundation hampered its performance and sales. In contrast,
Novell designed their premier products (NetWare 3 and 4) to use the full capabilities of the 386 and
later processors. Microsoft’s breakup with IBM delayed the release of a 386-based product and, in a
sense, Microsoft never released the 386-based product.
Instead of continuing to climb the ladder of Intel processor capabilities, Microsoft decided to
build a processor-independent operating system that would sit in roughly the same market position
as Unix. It could then be implemented for the 386 and later chips, and it also could run well on other
processors, such as the PowerPC, Alpha, and MIPS chips. Microsoft called this new operating system
NT, for new technology. Not only would NT serve as a workstation operating system, it would also
Copyright ©2003 SYBEX, Inc., Alameda , CA www.sybex.com
A BRIEF HISTORY OF NT 43
arrive in a network server version to be called LAN Manager NT. No products ever shipped with that
name, but the wallpaper that NT Server displays when no one is logged in is called LANMANNT.BMP to
this day.
In August 1993, Microsoft released LAN Manager NT with the name NT Advanced Server. In
a shameless marketing move, they labeled it version 3.1 in order to match the version numbers of the
Windows desktop products. This first version of NT Advanced Server performed quite well.
However, it was memory-hungry, lacked Novell connectivity, and had only the most basic TCP/IP
connectivity.
September 1994 brought a new version and a new name: Microsoft Windows NT Server version 3.5.
Version 3.5 was mainly a “polish” of 3.1; it was less memory-hungry, it included Novell and
TCP/IP connectivity right in the box, and it included Windows for Workgroups versions of the
administrative tools so network administrators could work from a Workgroup machine rather than
an NT machine. Where many vendors would spend 13 months adding silly bells and whistles, NT 3.5
showed that the Microsoft folks had spent most of their time fine-tuning the operating system,
trimming its memory requirements, and speeding it up.
In October 1995 came NT version 3.51, which mainly brought support for PCMCIA cards
(a real boon for us traveling instructor types), file compression, and a raft of bug fixes.
NT version 4, 1996’s edition of NT, got a newer Windows 95–like face and a bunch of new
features, but no really radical networking changes. Under the hood, NT 4 wasn’t much different from
NT 3.51.
From mid 1996 to early 2000, no new versions of NT appeared, an “upgrade drought” such as
we’d not seen in quite some time from Microsoft. Then, in February 2000, Windows 2000 (“NT 5.0”)
shipped. 2000 included a whole lot of new stuff, but perhaps the most significant was a new way of
storing and organizing user accounts and related information: Active Directory domains. Closely
following AD in importance was the then-new notion of group policies, something that you’ll see has
become quite important to anyone wanting to run a network based on XP and Server 2003.
The next version of NT shipped in pieces for the first time since 1993. First NT Workstation 5.1
or, as it’s better known, XP Professional and its lesser sibling, XP Home. Microsoft intended to
follow up with the server version of NT 5.1, but events conspired to compel them to wait a bit longer,
and produce NT Server 5.2—that is, Windows Server 2003. As you read in the last chapter,
it’s a “1.1” version of Windows 2000, a welcome improvement to 2000’s fit and finish.
That’s not the end of the story for NT. Sometime in 2004 or 2005, we will see a re-unified
NT (5.3? 6.0? Time will tell) code-named Longhorn. That in turn will pave the way for yet another
version of NT, code-named Blackcomb, but let’s wait for another edition or two of this book to cover
that product.
Well, I hope this chapter wasn’t boring for those already expert in NT—I did warn you!—and
helped bring the newbies up to speed. No matter what version of NT you’re running, however, you’ll
need to configure it. And there are, as there always have been, two main ways to do it. The preferred
way is through the GUI with windowed programs that offer help and a bit of error-checking, or its
somewhat more complex relatives, the command-line tools. The less-preferred, but often necessary,
way is to directly tweak some setting in its lair … a place called the Registry. The next two chapters
introduce these two configuration approaches.
Comments