* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Presentation
Survey
Document related concepts
Transcript
9 Resource Sharing Over a Network Guide to Operating Systems Second Edition Chapter 9 1 9 Objectives After reading this chapter and completing the exercises you will be able to: • Explain the principles behind sharing disks and files on a network • Set up accounts, groups, security, and disk and file sharing on network server operating systems Chapter 9 2 9 Objectives After reading this chapter and completing the exercises you will be able to: • Set up disk and file sharing on client operating systems • Set up printer sharing on server and client operating systems • Discuss how network and Internet servers are used for vast information-sharing networks Chapter 9 3 9 Sharing Disks, Files and Printers • Sharing files was one of the first reasons for linking a workstation’s operating system onto a network, and it remains one of the most important reasons for networking • In terms of network operating systems, NetWare was early on the scene at the start of the 1980s to enable file sharing through a server • This was possible through two methods: (1) by downloading a file from a file server to a workstation, and (2) by purchasing third-party software to create a special shared drive for other computers or workstations to access over a network Chapter 9 4 9 Sharing Disks, Files and Printers • Downloading a file directly from a file server was one of the first methods for sharing files, and was incorporated in the first version of NetWare • The concept of sharing resources quickly blossomed into other ways to access files, such as making shared drives available on a network, and making each shared drive look just like another local drive at the client • When a workstation accesses a shared drive, the process is called mapping Chapter 9 5 9 Sharing Disks, Files and Printers • Mapping is a software process that enables a client workstation to attach to the shared drive of another workstation or server, and assign it a drive letter • The network drive that is attached is called a mapped drive in Windows-based operating systems • In the Mac OS, a mapped drive is called a mounted volume Chapter 9 6 9 Securing Shared Resources • Sharing disks, files, and printers is a potential security risk because it is then possible for non-authorized users to access a file or use a printer • Fortunately, all of the operating systems discussed in this book offer security measures for protecting shared resources Chapter 9 7 9 Securing Shared Resources • Access to a file, directory, or disk can be denied to those who are not authorized • Access to a shared network printer can be given to only a specific group of people • Also, permission to manage print jobs, such as to delete or prioritize the jobs submitted by coworkers, can be granted only to one or two qualified people who have the responsibility Chapter 9 8 9 Sharing Disks and Files Through Server Network Operating Systems • Windows NT Server, Windows 2000 Server, Windows .NET Server, UNIX, Mac OS X Server, and NetWare are prime examples of server network operating systems that can share disks and files over a network • Further, each operating system enables the network administrator to establish security through techniques such as assigning accounts, account passwords, groups, and access privileges Chapter 9 9 9 Windows NT Server • Windows NT Server uses accounts, groups, and permissions; in this respect, it is similar to UNIX and NetWare • The steps involved in sharing Windows NT Server resources over a network include setting up the following: – Groups – Account policies – User accounts – Permissions – Shared disk and folders Chapter 9 10 9 Windows NT Server • With Windows NT Server, you use groups to manage resources and permissions to resources in a way that is similar to NetWare and UNIX • Windows NT Server employs two kinds of groups: local and global • A local group is generally used to manage resources such as shared disks, folders, files, and printers Chapter 9 11 9 Managing Shared Resources Using Local and Global Groups Chapter 9 12 9 Windows NT Server • A global group typically consists of user accounts, and can be made a member of a local group that is in the same or a different domain • A domain is a grouping of servers in a particular geographic area, business unit, department, or other functional area • The process of controlling shared resources in Windows NT involves creating the resource, such as a shared folder, and then creating a local group that has specific permissions to that shared resource Chapter 9 13 9 Windows NT Server • Finally, a global group is created and user accounts are added to that global group, which is then designated as a member of an appropriate local group • The headquarters domain that contains the global group for managers is designated as a trusted domain, which means that it is granted access to the resources in each of the other domains • Also, the four other domains are designated as trusting domains, which means that they grant permission to the headquarters domain to access their resources Chapter 9 14 9 Windows NT Server • Global and local groups are created by using the GUI tool, User Manager for Domains, in Windows NT Server • Figure 9-2 illustrates the Windows NT dialog box that is used to create a new global group Chapter 9 15 9 Windows NT Server • User accounts are also created through the User Manager for Domains • Windows NT Server uses account policies and restrictions, as does NetWare, which accomplish many of the same ends as follows: – Require a password – Set a minimum password length – Require that a password is changed within a specified interval – Require that a new password is used each time the old one is changed Chapter 9 16 9 Windows NT Server – Limit the number of unsuccessful attempts to log onto an account – Set time restrictions that specify when users can log on – Set intruder detection capabilities – Specify from which workstations an account can be accessed – Control remote access to a server, such over as a dial-up line Chapter 9 17 9 Windows NT Server • As is true for UNIX and NetWare, access privileges (permissions) are associated with Windows NT Server disks, folders, and files • Windows NT Server recognizes two main file systems, FAT16 and the NT File System (NTFS) Chapter 9 18 9 Attributes and File Permissions Compared Chapter 9 19 9 Attributes and File Permissions Compared Chapter 9 20 9 Attributes and File Permissions Compared Chapter 9 21 9 Windows NT Server • After groups, user accounts, and permissions are set up in Windows NT Server, disk volumes, folders, and files can be accessed through the network by creating shares • A share is an object—a disk or folder, for example—that is given a name and made visible to network users, such as through Network Neighborhood in Windows 95, 98, and NT, or My Network Places in Windows 2000 and XP • A disk or folder is shared through its properties Chapter 9 22 9 Windows NT Server • Figure 9-4 illustrates the sharing properties for a folder called “Public” • One of the problems associated with permissions is that there can be permission conflicts, such as between the NTFS permissions granted to a user account, and those granted to a group to which the user belongs Chapter 9 23 9 Windows NT Server • Or, there can be a conflict between the NTFS permission granted to a user or group and the share permissions granted to the same user or group • When you assign or troubleshoot permissions, remember that NTFS permissions are cumulative with one another (accept for No Access), but share permissions are not cumulative with NTFS permissions Chapter 9 24 9 Windows NT Server • NTFS and share permissions on the same folder are not cumulative, however • A summary of the permissions rules are: – NTFS permissions are cumulative, with the exception that if an account or group is given No Access, this overrides other permissions – When a folder has both NTFS and share permissions, the most restrictive permissions apply Chapter 9 25 9 Windows NT Server • There are only four share permissions, as follows: – No Access: The specified groups and users have no access – Read: The specified groups and users can read and execute files – Change: The specified groups and users can read, add, modify, execute, and delete files – Full Control: The specified groups and users have full access to the files and folders, including the ability to take ownership or change permissions Chapter 9 26 9 Windows 2000 Server • Windows 2000 Server is similar to Windows NT Server in that it uses groups, account policies, user accounts, permissions, and shared disks and folders to offer resources over a network • The principles for how you use these elements are the same in Windows 2000, but new features are added because Windows 2000 can deploy Active Directory • When Active Directory is not implemented in Windows 2000 Server, the scope of resources is limited to the standalone server, and only local groups are created Chapter 9 27 9 Windows 2000 Server • In contrast, the implementation of Active Directory increases the scope from a local server or domain to all domains in a forest • The types of groups and their associated scopes are as follows: – Local – Domain local – Global – Universal Chapter 9 28 9 Windows 2000 Server • In Windows 2000, all of these groups are defined as security or distribution groups • Security groups are used to enable access to resources on a standalone server or in Active Directory • Distribution groups are used for e-mail or telephone lists, to provide quick, mass distribution of information • When Active Directory is implemented, Windows 2000 Server adds the ability to have container objects that are larger than domains: trees and forests Chapter 9 29 9 Windows 2000 Server • A container object is an entity that is used to group together resources in a directory service, such as Microsoft’s Active Directory • A tree consists of one or more domains, and a forest houses one or more trees • When Active Directory is not installed, you create a local group or a user account by rightclicking My Computer on the desktop, clicking Manage, and clicking Local Users and Groups Chapter 9 30 9 Windows 2000 Server • Figure 9-5 illustrates how to use the Active Directory Users and Computers tool to create a new global security group • In Windows 2000 Server with Active Directory installed, access rights and account policies are set up through group policies that can apply to a local server, a domain, or an entire tree of domains Chapter 9 31 9 Windows 2000 Server • Before any accounts are created, it is wise to establish the account policies, such as for a domain • You can set account policies that are similar to Windows NT Server 4.0, but in Windows 2000 Server, there are more options, which are grouped in three categories: – Password Policy – Account Lockout Policy – Kerberos Policy Chapter 9 32 9 Windows 2000 Account Policies Chapter 9 33 9 Setting NTFS Permissions in Windows 2000 Chapter 9 34 9 Windows 2000 NTFS Folder and File Permissions Chapter 9 35 9 Windows 2000 Server • The available share permissions are: – Read: permits groups or users to read and execute files – Change: enables users to read, add, modify, execute, and delete files – Full Control: provides full access to the folder including the ability to take control or change share permissions Chapter 9 36 9 Windows 2000 Server • Notice that the dialog box in Figure 9-8 has a button for caching • Caching enables you to set up a folder so that it can be accessed by a client, even when the client is not connected to the network • Also, Windows 2000 enables you to set up Web sharing, which makes files available on a Web server for HTML or FTP access • Tables 9-3 and 9-4 show the two sets of permissions used for Web sharing: access permissions and application permissions Chapter 9 37 9 Windows 2000 Server Chapter 9 38 9 UNIX • Access to directories and files on a UNIX server is also governed through user accounts, groups, and access permissions • Each user account in UNIX is associated with a user identification number (UID) • Also, users who have common access needs can be assigned to a group via a group identification number (GID), and then the permissions to access resources are assigned to the group, instead of to each user Chapter 9 39 9 UNIX • The password file (/etc/passwd) contains the following kinds of information: – The user name – An encrypted password or a reference to the shadow file, a file associated with the password file that makes it difficult for intruders to determine the passwords of others – The UID which can be a number as large as 60,000 – A GID with which the user name is associated – Information about the user, such as a description or the user’s job – The location of the user’s home directory – A command that is executed as the user logs on, such as which shell to use Chapter 9 40 9 UNIX • The shadow file (/etc/shadow) is normally available only to the system administrator • It contains password restriction information that includes the following: – The minimum and the maximum number of days between password changes – Information on when the password was last changed – Warning information about when a password will expire – Amount of time that the account can be inactive before access is prohibited Chapter 9 41 9 UNIX • The useradd command enables you to create a new user • The parameters that can be added to useradd include the following: – -c gives an account description – -d specifies the user’s home directory location – -e specifies an account expiration date – -f specifies the number of days the account can be inactive before access is prohibited – The remainder are listed on pages 454 and 455 of the textbook Chapter 9 42 9 UNIX • Home directories are areas on the server in which users store data • If you do not want a group automatically created at the time you create an account, use the –n parameter with the useradd command • Useradd, usermod, and userdel generally work in all versions of UNIX except IBM’s AIX, which uses mkuser, chuser, and rmuser Chapter 9 43 9 UNIX • Information about groups is typically stored in the /etc/group file (see Figure 9-10), and group security information is in the /etc/gshadow file (or the /etc/security/group file in AIX and the /etc/logingroup file in HP-UX) Chapter 9 44 9 UNIX • UNIX files are assigned any combination of three permissions: read, write, and execute • Executable programs can have a special set of permissions called Set User ID (SUID) and Set Group ID (SGID) Chapter 9 45 9 UNIX • Permissions are granted on the basis of four criteria: ownership, group membership, other (or World), and all (all is not used in every version of UNIX, but is included in Red Hat Linux) • Permissions are set up by using the chmod command in UNIX • Chmod has two different formats, symbolic and octal • In the symbolic format, you specify three parameters: (1) who has the permission, (2) the actions to be taken on the permission, and (3) the permission Chapter 9 46 9 Mac OS X Server • The Mac OS X Server is built on the Mac OS X foundation, but is designed as a true server for file sharing, printer sharing, managing network users and groups, and providing Web services • A computer running Mac OS X Server can support up to several thousand users • Mac OS X Server includes the Apache Web server software, which was originally designed for UNIX computers and has been adapted for Mac OS X Server Chapter 9 47 9 Mac OS X Server • Through Apache, you can set up multiple Web sites and enable users to participate in Web authoring • As is true of Mac OS X , Mac OS X Server supports TCP/IP and AppleTalk • Two important tools are included with Mac OS X Server that enable server management: Server Admin and Macintosh Manager • Accounts and groups can be created and managed through the Server Admin tool Chapter 9 48 9 Mac OS X Server • Through Server Admin, you can set up logging of events on a Mac OS X Server • The events log can include: – Login and Logout events – Opened files – Newly created files – Newly created folders – Deleted files and folders Chapter 9 49 9 NetWare • When a Novell NetWare server is installed, one of the first projects is to design a file structure that makes it easy to establish drive mappings • Consider, for example, a NetWare server set up for use by accountants • The main disk volume composing the root directory is the system volume, called the SYS volume • The server would have default directories on the SYS volume created during installation, which are available to users, such as PUBLIC, LOGIN, HOME, APPS, and DATA Chapter 9 50 9 NetWare • Before users can access any shared directory, the network administrator performs several tasks to prepare the server before it is made available on the network Chapter 9 51 9 NetWare • Net Administrator tasks include the following: – Set security on each directory, subdirectory, and on particular files – Create an account and account password for each user who needs to access the server – Set up groups as a way to provide shortcuts for managing security • After the server is prepared for network access, individual users log onto their accounts and map to particular drives Chapter 9 52 9 NetWare Network Drive Mappings Chapter 9 53 9 NetWare • NetWare recognizes another type of network drive, called a search drive, which is given drive letters such as S1 for the first drive, S2 for the second drive, and so on • The difference between a mapped network drive and a mapped search drive is that NetWare can execute a file on a search drive, regardless of whether the file is in the main directory or in a subdirectory under the search drive Chapter 9 54 9 NetWare • There are several ways to map a NetWare drive from a client workstation operating system • One way is to use the MAP command from the MS-DOS prompt, or MS-DOS command prompt window for Windows-based operating systems • The syntax of the MAP command is MAP drive: = volume:directory[\subdirectory] for regular network drives, and it is MAP#:=volume:directory[\subdirectory] for search drives Chapter 9 55 9 NetWare • Another way to set up the same search drive (so that you map it each time you log onto your account) is to put the MAP command in a NetWare login script • A login script is a file of commands that is stored on the NetWare server and associated with an account or a group of accounts Chapter 9 56 9 NetWare • Access to a NetWare shared drive is granted through creating an account for each user • A user account can be set up using several kinds of restrictions, which include: – Requiring a password – Setting a minimum password length – Requiring that a password is changed within a specified interval of time – The remainder are listed on page 462 of the textbook Chapter 9 57 9 Password Restrictions in NetWare Administrator Chapter 9 58 9 NetWare • After accounts are set up, the network administrator can grant rights to access specific directories, subdirectories, and files • The rights control the ability to: – Perform a directory listing – Create a new directory, subdirectory, or file – Read the contents of a directory, subdirectory, or file – Write to the contents of a file – Refer to the list on page 463 of the textbook for the rest Chapter 9 59 9 NetWare • Rights are assigned by making a user or group a directory or file trustee • Rights also can be inherited on the basis of the rights already assigned to higher level directories, and they can be inherited based on container objects • User accounts, groups, printers, directories, subdirectories, files, and other resources in NetWare are considered objects (and the same is true for Windows NT/2000/.NET Server) Chapter 9 60 9 NetWare • Information about objects, such as rights that are associated with them, is stored in the Novell Directory Services (NDS) • A portion of the NDS is used to store information about clients, which are one example of NDS leaf objects in an organization container, given various levels of authorization to access NetWare servers • A directory service provides three important functions on a network: a central listing of resources, a way to quickly find resources, and the ability to access and manage resources Chapter 9 61 Accessing and Sharing Disks and Files Through Client Network Operating Systems 9 • Many operating systems include the ability to act as clients, to map to disks and directories on servers • Some client operating systems can share files and folders as well Chapter 9 62 9 Accessing and Sharing Resources in Windows 95/98/Me • Windows 95/98/Me have nearly the same capabilities to access shared disks and folders • All three operating systems also can offer shared resources for other network workstations to access • These operating systems enable access to resources through two access control techniques • One, called share-level access control, creates a disk or directory share that is protected by share permissions, and on which the share owner can require a password for access Chapter 9 63 9 Accessing and Sharing Resources in Windows 95/98/Me • The second technique, called user-level access control, requires the share owner to create an access list of groups and users who are allowed to access the share • In share-level access, you create a share that is similar to a share created on a Windows NT or 2000 server Chapter 9 64 9 Accessing and Sharing Resources in Windows 95/98/Me • The difference is that several hundred simultaneous users (depending on the server resources, such as CPU and memory) can access a Windows NT or 2000 Server share, whereas, a computer running Windows 95/98/Me is designed to host 10 or less (also depending on the workstation resources) • There are three share-level access permissions in Windows 95, 98, and Me: – Read-Only – Full Chapter 9 – Depends On Password 65 9 Accessing and Sharing Resources in Windows 95/98/Me • The Read-Only and Full permissions can be assigned with or without a password • The default is to use no password, which simply means that you leave the password box empty • A list of users and groups also can be obtained from Windows NT Workstation or Windows 2000 Professional • To obtain a list of valid users and groups, you specify either the domain name or the name of a computer that has a defined set of users and groups Chapter 9 66 9 Accessing and Sharing Resources in Windows 95/98/Me • Users and groups are given three kinds of access: – Read-Only – Full – Custom • Before setting up share-level access or userlevel access, it is necessary to install file and printer sharing services Chapter 9 67 Windows 95, 98, and Me Custom Share Permissions for User-Level Access Chapter 9 9 68 9 Accessing and Sharing Resources in Windows 95/98/Me • To map a drive that is shared by another computer, Windows 95 and 98 use the Network Neighborhood utility on the desktop, while Windows Me uses the newer My Network Places Chapter 9 69 9 Accessing and Sharing Resources in Windows 95/98/Me • To disconnect a mapped drive, you right-click the drive in My Computer or Windows Explorer, and click Disconnect on the menu Chapter 9 70 9 Accessing and Sharing Resources in Windows 2000 Professional • Mapping a drive in Windows 2000 Professional and Server is similar to the process used for Windows 95/98/Me, but Network Neighborhood is replaced by My Network Places • The steps for mapping a drive in Windows 2000 are shown on page 468 of the textbook Chapter 9 71 9 Accessing and Sharing Resources in Windows XP • Windows XP uses My Network Places to locate and map network drives, but this tool offers more options in Windows XP than in Windows 2000 • You can access My Network Places using several techniques, such as through the Control Panel or Windows Explorer, but among the fastest is to use the steps illustrated on page 469 of the textbook Chapter 9 72 9 Accessing and Sharing Resources in Windows XP Chapter 9 73 9 Accessing Shared Resources via UNIX and Specialized Utilities • UNIX computers can access resources on other computers that support the Network File System (NFS), which provides file transfer capabilities • Accessing shared resources on a Windows NT Server provides one example of how UNIX can participate as a network client with the ability to access shared resources • One way to support a UNIX client in Windows NT Server is to implement third-party disk sharing software that employs NFS, such as Intergraph DiskShare (recommended by Microsoft as compatible) Chapter 9 74 9 Accessing Shared Resources via UNIX and Specialized Utilities • Typically UNIX share permissions include: – Root – Read-write – Read-only – No access • Windows 2000 Server comes with a software component called Services for UNIX that can be installed using the Add/Remove Programs icon on the Control Panel Chapter 9 75 9 Accessing Shared Resources via UNIX and Specialized Utilities • This software component works with Sun Solaris, DEC/Compaq/HP UNIX, and Hewlett-Packard’s HP-UX Services for UNIX includes the following components – Server and client software to run NFS for file sharing between UNIX and Windows 2000 computers – Server and client software for Telnet, so that a UNIX computer can log on remotely to a Windows 2000 server and vice versa – Ability to synchronize passwords between Windows 2000 servers and UNIX computers for accounts used by the same account holders – Various UNIX utilities that can be used from Windows 2000, such as the Korn shell Chapter 9 76 9 Accessing and Sharing Resources via Mac OS • The Mac OS offers two ways to connect to shared resources on a network: the Chooser and the Network Browser • The Chooser is the original way to access shared network volumes, which can be an entire disk drive or a directory, depending on the way in which the resource is set up • The Chooser is available up through Mac OS 9.x • In Mac OS X, you connect to another computer that is sharing a disk or folder by using the Go menu Chapter 9 77 9 Accessing and Sharing Resources via Mac OS • To mount a shared drive, open the Go menu, and select Connect To Server • Mac OS X regards both computers configured as servers and computers that share drives or folders • The Connect to Server window provides a list of computers to which you can connect, and gives you three ways to connect to a computer: – By selecting the computer in the pop-up menu – By selecting the computer from the list in the right pane – By entering the AFP (Apple File Protocol) or IP address of the computer in the Address box—by typing afp://200.92.10.8, for example Chapter 9 78 9 Accessing and Sharing Resources via Mac OS • Files are shared from a Macintosh workstation by first creating users and groups, and then defining which files to share • As in server operating systems, a Macintosh user is set up by assigning an account and a password • Also, groups can be established that consist of accounts with the same access • The process of creating a new user in Mac OS 9.x involves these steps Chapter 9 79 9 Using the Chooser Chapter 9 80 9 Accessing and Sharing Resources via Mac OS • In Mac OS X, you establish the network identity and turn on file sharing through System Preferences • Privileges are set in order to enable users and groups to access the folders and files you wish to share • There are four kinds of privileges that can be set: – None: No access to files – Read-Only: Access to only read the contents of files only – Write only: Access to write files, but not open them – Read & write: Access to open and write files Chapter 9 81 9 Sharing Printing Devices • All of the operating systems discussed in this book have the ability to share printers as well as disks, directories, and files • The sections that follow describe how printers are shared through these operating systems Chapter 9 82 9 Windows-based Systems • Printing is configured in Windows-based systems by using the Add Printer Wizard to set up a printer • Once a printer is set up, it appears in the Printers folder • In Windows 95 through Windows XP, you share a printer by first opening the Printers folder • In Windows 95/98/NT/Me/2000, click Start, point to Settings, and click Printers Chapter 9 83 9 Windows-based Systems • In Windows XP, click Start, and click Printers and Faxes • Select the printer you want to share and right-click it to access menu options, such as those shown in Figure 9-20 Chapter 9 84 9 Windows-based Systems • When you configure sharing in Windows NT and Windows 2000, particularly in the Server versions, make sure that you configure sharing permissions for the shared printer Chapter 9 85 9 Windows-based Systems • The printer share permissions for Windows NT are : – No Access: Cannot access the shared printer – Print: Can send print jobs and manage your own jobs – Manage Documents: Can send print jobs and manage yours or those sent by any other user – Full Control: Have complete control, including the ability to change share permissions, turn off sharing, and delete the share Chapter 9 86 9 Windows-based Systems • For windows 2000, the following share permissions are checked for allow or deny: – Print: Can send print jobs and manage your own jobs – Manage Documents: Can send print jobs and manage yours or those sent by any other user – Manage Printers: Can access the share, change share permissions, turn off sharing, configure printer properties, and delete the share • Mapping to a shared printer is an easy process in Windows 95 through Windows XP Chapter 9 87 9 UNIX • UNIX printing in a networked environment is essentially the process of logging on to the UNIX server and printing to one of its printers • Typically, when a UNIX server is accessed through network connectivity, it is set up to use the BSD or the SVR4 spooling system as describe in Chapter 6 • In Red Hat Linux 7.2, you can set up a printer and start lpd by using the GNOME Printer Configuration tool Chapter 9 88 9 Mac OS • The Mac OS can make a connected local printer available to other computers running the Mac OS on a network • Also, the Mac OS can attach to a shared printer offered by another workstation on the network • In Mac OS 9.x, you use the Chooser utility to set up a printer share, and to attach to a shared printer through the network Chapter 9 89 9 Mac OS • Accessing a shared printer requires that you first install a printer driver for the printer, such as a driver for a LaserWriter 8 or a StyleWriter 1200 • In Mac OS 9.x, there is the option to share a USB printer • For Mac OS X, printer sharing and accessing a shared printer are handled through the Print Center Chapter 9 90 9 NetWare • Shared printing in NetWare is accomplished by using two different approaches • Both approaches are relatively complex and are only summarized in this chapter • The first approach is to employ queue-based printing, which is used for MS-DOS or Windows applications Chapter 9 91 9 NetWare • The second is Novell Distributed Print Services (NDPS), which is used for Windows applications, and printers that have options tailored to NDPS • The next step is to create a print queue for the printer • For versions of NetWare that use NDS, the next step is to set up an NDS printer object, which defines the printer to NDS • NDPS is a print service capability added in NetWare 5.0 and above Chapter 9 92 9 Network and Internet Resource Servers • NetWare, UNIX, Windows NT/2000/.NET, and Mac OS X servers can be set up as resource servers to provide network and Internet resources • All of these operating systems can act as servers for many kinds of functions • One of the most common is to handle e-mail • Another area in which these operating systems participate as resource servers is in videoconferencing and multimedia Chapter 9 93 9 Network and Internet Resource Servers • Many companies are implementing videoconferencing capabilities on servers and workstations as a way to save money by reducing travel expenses • Client/server applications are also a reality, and are made possible by networks and servers • A typical client/server application consists of three components: a workstation running a Windows-based operating system, a server from which to run applications, and one or more database servers Chapter 9 94 9 Network and Internet Resource Servers • These applications are made possible because database software runs well on NetWare, UNIX, and Windows NT/2000/.NET Server • Web servers are another fast-growing implementation of NetWare, UNIX, Windows NT/2000/.NET, and Mac OS X servers • Web servers provide a huge range of services that include the ability to quickly access information and download it through FTP Chapter 9 95 9 Network and Internet Resource Servers • The uses for network servers are growing at an unimaginable rate • As networks are able to transport higher volumes of traffic at faster speeds, the implementation of servers grows reciprocally Chapter 9 96 9 Summary • Resource sharing is why networks exist and are thriving • At first, networks were particularly designed to share files • One of the first methods of doing this was by using protocols such as FTP to upload and download individual files Chapter 9 97 9 Summary • One way to distinguish network-capable operating systems is by classifying them as server or client operating systems, although in some cases, the distinctions are slight • NetWare, UNIX, Windows 2000 Server, and Mac OS X Server are four current popular server network operating systems Chapter 9 98 9 Summary • Mac OS, UNIX, Windows 95/98/Me, Windows NT Workstation, Windows 2000 Professional, and Windows XP are examples of client network operating systems • All of these operating systems can share disks, directories, and files for other computers to access through a network • Network server operating systems will be particularly interesting to watch as they provide more and more shared network and Internet resources Chapter 9 99