Terminal Server Frequently Asked Questions 1

Total Page:16

File Type:pdf, Size:1020Kb

Terminal Server Frequently Asked Questions 1 Terminal Server Frequently Asked Questions 1. What is Microsoft® Windows NT® Server, Terminal Server Edition, version 4.0? Terminal Server is a new technology that adds UNIX-like multiuser capabilities and support for thin client, Windows® Based Terminals to Windows NT Server 4.0. With Terminal Server, applications run 100 percent on the server. Terminal Server has three components: the multiuser server core, the Terminal Server client software and the Remote Desktop Protocol (RDP). The multiuser server core provides the basic ability to host multiple, simultaneous client sessions, and also includes administration tools for managing both the server and the various client sessions. Terminal Server will ship with two types of software clients in the box: one for 32-bit Windows operating systems (Windows NT Workstation 4.0, Windows 95, Windows 98, Windows NT 3.51), and one for Windows for Workgroups (3.11). These clients will use the Remote Desktop Protocol, a protocol based on the International Telecommunications Union T.120 suite of standard communications protocols. For a basic explanation of T.120, see http://gw.databeam.com/ccts/t120primer.html. 2. What is Citrix’s role in the development and marketing of Terminal Server? Microsoft licensed Citrix MultiWin (multiuser server core) technology used in the Citrix WinFrame product line in May 1997, and the two companies are working together on the development of Terminal Server. 3. What is MetaFrame? “MetaFrame” is the code name for the thin client/server software from Citrix that extends the Terminal Server solution with additional functionality for both the Terminal Server-based server and for clients connected to a Terminal Server-based server. On the server side, MetaFrame contains user, system, and application management functionality such as the ability to load-balance multiple Terminal Servers into a “server farm.” On the client side, MetaFrame provides the ability to connect any client—MS- DOS®, 16-bit Windows, 32-bit Windows, Java-based devices, Macintoshes, UNIX devices, and ICA Windows-based Terminals—to a Terminal Server-based server. 4. My customer already has one or more WinFrame servers from Citrix. Is there an upgrade path to Terminal Server/MetaFrame? Yes. There will be an upgrade discount and technical upgrade path for WinFrame 1.6/1.7 users to Terminal Server/MetaFrame. Technically, the upgrade will preserve the WinFrame configuration information such as users, registry entries, and application settings. Price-wise, the upgrade discount will apply to both server and client access licenses for Terminal Server. 5. How will Terminal Server be priced and packaged? How will MetaFrame be priced and packaged? Microsoft Windows NT Server, Terminal Server Edition, version 4.0, is an extension of the Windows NT Server operating system product line that delivers the Microsoft Windows operating system experience through Windows desktop emulation. Terminal Server supports a full range of client desktops including Windows-based terminals, 32-bit and older 16-bit Windows-based personal computers, and non-Windows-based desktops including Apple Macintosh, MS-DOS, and UNIX (non- Windows-based devices require a third-party add-on product from Citrix). Desktops connected to the Terminal Server are able to seamlessly access a 32-bit Windows user interface and run 32-bit and 16- bit Windows-based applications that reside on the server. 1. Terminal Server licensing contains three licensing components that must be purchased. 2. Windows NT Server, Terminal Server Edition, version 4.0, is required to host terminal server sessions. 3. Windows NT Server 4.0 Client Access License (CAL) is required to access file and print resources on the Terminal Server. Windows NT Workstation 4.0 License is required to run a remote Windows NT-based desktop and Windows-based applications. If Windows NT Workstation 4.0 (or greater version number) is already installed or associated with a device, an additional Windows NT Workstation license is not required. Windows NT Workstation licenses must be purchased on a per-seat basis and cannot be used in a per-server or concurrent manner. 6. What is a Windows-based Terminal? Where and when can I get one? How much will a Windows-based Terminal cost? A Windows-based Terminal is a thin client hardware device that connects to a Terminal Server and allows customers to use Windows-based applications. A Windows-based Terminal runs an embedded RDP or ICA display protocol to communicate with a Terminal server. Windows-based Terminals using RDP will be available from companies such as Wyse, NCD, or Boundless. A Windows-based Terminal, as a thin client device with no local applications processing, has by definition a very small amount of RAM and ROM and may contain a lower-end processor than a typical personal computer. A Windows- based Terminal does not run a browser locally on the client (as some network computers do); however, it can run a browser like it runs any other Windows-based application—off the server. A Windows-based Terminal could potentially have either the RDP or the ICA client, or both, as well as an embedded 3270 emulator. These options are up to the individual terminal manufacturer. The key criterion that differentiates Windows-based Terminals from a network computer or Net PC is that there is no local downloading of operating systems or applications and no local processing of applications at the client. Wyse, Boundless Technologies, and NCD are currently shipping Windows-based Terminals using ICA. These devices work with the current WinFrame product line and will work with Terminal Server/MetaFrame in the future. Additionally, Wyse, Boundless, NCD, Neoware, and Tektronix and others are working with Microsoft to develop Windows-based Terminals that will use RDP. The terminal vendors will set the price for these devices, but it is anticipated many of the basic models will be in the $500 range (without monitor). 7. What is the scalability and performance of a Terminal? Scalability is obviously important in a scenario like Terminal Server in which applications are fully running on the server. Scalability of a Terminal Server will very much depend on the application suite that is being run on the server, the server configuration, and usage intensity. However, a good rule of thumb is that Terminal Server on a single Pentium Pro processor server will support about 18-45 concurrent users, depending on user activity. Memory recommendations are 32 MB of base memory plus 4-12 MB per user for the Terminal Server, depending on the type of application and the users' performance requirements. A dual-processor server will support about 30-90 concurrent users. Microsoft will be releasing more detailed scalability and performance information on the Terminal Server Web site, so keep watching for the latest information..
Recommended publications
  • Since Sliced Bread?
    Douglas A. Hamilton WINDOWS NT NT: The Greatest Thing Since Sliced Bread? T'S OFFICIAL. Windows unlike OS/2, is not the only product in the family. Right around the corner is the NT is finally out of the Chicago technology that Microsoft will be using in DOS 7.0 and Windows 4.0. Earli­ oven. The pricing has est betas for software developers are I scheduled for early fall and products been set and delivery dates based on it should be out in 1994. Chicago is a rewrite of the same Win32 have been promised. Those API (application programming interface) seen on NT. Compared with NT, it leaves promises (back in May) out the security (how many of us need government-certified C2 security on our were that the base system personal machines?), portability to RISC processors and the OS/2 character-mode would ship within 60 days and POSIX subsystems. And it wouldn't surprise me if Unicode support were trimmed out or if the networking were and the Advanced Server version would ship 30 days unbundled. What Chicago leaves in is 32- bit flat virtual memory, preemptive multi­ later. So there's every chance that by the time you read tasking, threads, pipes and semaphores­ all the really good stuff in Win32. That be­ this, there'll be piles of Windows NT packages at your comes Windows 4.0. Subtract the graphi­ cal user interface and you get DOS 7.0. local computer store. Is there anyone left who wonders why developers are so excited about NT? It's After a false rumor that Microsoft might price NT at not just because NT is expected to do ex­ tremely well.
    [Show full text]
  • Why Os/2 Failed: Business Mistakes Compounded by Memory Prices
    Mountain Plains Journal of Business and Economics Volume 10 Issue 1 Article 4 Date Published: 10-1-2009 Why Os/2 Failed: Business Mistakes Compounded By Memory Prices Eric G. Swedin Weber State University Davis Follow this and additional works at: https://openspaces.unk.edu/mpjbt Part of the Business Commons Recommended Citation Swedin, E. G. (2009). Why Os/2 Failed: Business Mistakes Compounded By Memory Prices. Mountain Plains Journal of Business and Economics, 10(1). Retrieved from https://openspaces.unk.edu/mpjbt/ vol10/iss1/4 This Case Study is brought to you for free and open access by OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. It has been accepted for inclusion in Mountain Plains Journal of Business and Economics by an authorized editor of OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. For more information, please contact [email protected]. 36 WHY OS/2 FAILED: BUSINESS MISTAKES COMPOUNDED BY MEMORY PRICES ERIC G. SWEDIN WEBER STATE UNIVERSITY DAVIS ABSTRACT In 2006, IBM ended their support of OS/2, closing the book on an ambitious effort to create a modern operating system for the personal computer. IBM and Microsoft released the OS/2 operating system in December 1987 to replace the primitive DOS with a more sophisticated, preemptive multitasking operating system for personal computers. This article argues that OS/2 failed because of the U.S.-Japan Semiconductor Trade Agreement of 1986, subsequent accusations of DRAM chip dumping by the United States, and the resulting tariffs on Japanese memory chips, led to a memory chip shortage that drove up memory prices.
    [Show full text]
  • Windows NT Architecture Previous Screen Gilbert Held Payoff Windows NT Is a Sophisticated Operating System for Workstations and Network Servers
    50-30-19 Windows NT Architecture Previous screen Gilbert Held Payoff Windows NT is a sophisticated operating system for workstations and network servers. This article helps network managers to understand the communications capability of workstations and servers running on Windows NT, and data base administrators to determine the suitability of this platform for a structured query language (SQL) data base server. Introduction Windows NT is a 32-bit, preemptive multitasking operating system that includes comprehensive networking capabilities and several levels of security. Microsoft markets two version of Windows NT: one for workstations—appropriately named Windows NT Workstation—and a second for servers—Windows NT Server. This article, which describes the workings of the NT architecture, collectively references both versions as Windows NT when information is applicable to both versions of the operating system. Similarly, it references a specific version of the operating system when the information presented is specific to either Windows NT Workstation or Windows NT Server. Architecture Windows NT consists of nine basic modules. The relationship of those modules to one another, as well as to the hardware platform on which the operating system runs, is illustrated in Exhibit 1. Windows NT Core Modules Hardware Abstraction Layer The hardware abstraction layer (HAL) is located directly above the hardware on which Windows NT operates. HAL actually represents a software module developed by hardware manufacturers that is bundled into Windows NT to allow it to operate on a specific hardware platform, such as Intel X86, DEC Alpha, or IBM PowerPC. HAL hides the specifics of the hardware platform from the rest of the operating system and represents the lowest level of Windows NT.
    [Show full text]
  • Page 1 of 3 How to Enable NTLM 2 Authentication 2/8/2012 Http
    How to enable NTLM 2 authentication Page 1 of 3 Article ID: 239869 - Last Review: January 25, 2007 - Revision: 4.7 How to enable NTLM 2 authentication System Tip This article applies to a different version of Windows than the one you are using. Content in this article may not be relevant to you. Visit the Windows 7 Solution Center This article was previously published under Q239869 SUMMARY Historically, Windows NT supports two variants of challenge/response authentication for network logons: • LAN Manager (LM) challenge/response • Windows NT challenge/response (also known as NTLM version 1 challenge/response) The LM variant allows interoperability with the installed base of Windows 95, Windows 98, and Windows 98 Second Edition clients and servers. NTLM provides improved security for connections between Windows NT clients and servers. Windows NT also supports the NTLM session security mechanism that provides for message confidentiality (encryption) and integrity (signing). Recent improvements in computer hardware and software algorithms have made these protocols vulnerable to widely published attacks for obtaining user passwords. In its ongoing efforts to deliver more secure products to its customers, Microsoft has developed an enhancement, called NTLM version 2, that significantly improves both the authentication and session security mechanisms. NTLM 2 has been available for Windows NT 4.0 since Service Pack 4 (SP4) was released, and it is supported natively in Windows 2000. You can add NTLM 2 support to Windows 98 by installing the Active Directory Client Extensions. After you upgrade all computers that are based on Windows 95, Windows 98, Windows 98 Second Edition, and Windows NT 4.0, you can greatly improve your organization's security by configuring clients, servers, and domain controllers to use only NTLM 2 (not LM or NTLM).
    [Show full text]
  • Windows 95, Windows 98, Windows 98SE, and Windows ME Courtesy of Nashville Home Linux Solutions
    Important information for users of Windows 95, Windows 98, Windows 98SE, and Windows ME courtesy of Nashville Home Linux Solutions FACT: As of July 2006, Microsoft has officially ended support for Windows 95, Windows 98, Windows 98SE, and Windows ME (Millennium Edition). What does this mean for you? Microsoft©s end-of-support announcement means that users of Windows 95, 98, and ME will no longer receive security updates, bug fixes, and other patches for their computer©s operating system. It also means that future releases of Microsoft software (such as Media Player, Internet Explorer, and Outlook Express) will no longer support these operating systems. Users of these versions of Windows will not benefit from enhanced features and security in these new versions. Why should I be concerned? Windows 95, 98, and ME are based around the DOS operating system, an inherently insecure operating system. Users of DOS-based Windows will become increasingly at risk for viruses, spyware, malware, and system intrusions as new holes and exploits are discovered in these operating systems and the older software that runs on them. In addition, software vendors (including makers of anti-virus and other security products) will be phasing out support for these operating systems now that Microsoft has ended its support. If you are connecting your DOS-based Windows operating system to the Internet, you need to take action to secure your computer. What are my options? If you would like to continue to operate on your current hardware, you have a few options available to you: 1. Upgrade Windows Microsoft©s only currently-available Windows workstation operating system is Windows XP (Home or Professional).
    [Show full text]
  • Installing the IPM Client on Windows NT
    CHAPTER 6 Installing the IPM Client on Windows NT IPM supports running only the IPM client software on a Windows NT system. However, you can run the IPM client on Windows NT with an IPM server that resides on a different operating system platform such as Sun Solaris. The IPM client software can be installed from the CD-ROM or it can be downloaded for installation using the IPM server’s web server. This chapter provides the following information about installing the IPM client software on Windows NT: • Requirements for the IPM Client on Windows NT on page 6-2 • Installing the IPM Client on Windows NT from the CD-ROM on page 6-3 • Installing the IPM Client on Windows NT Using the Web Server on page 6-4 • Verifying the IPM Client Installation on Windows NT on page 6-6 • Modifying the IPM Client Configuration on Windows NT on page 6-7 • Uninstalling the IPM Client on Windows NT on page 6-10 Installing the IPM Client on Windows NT 6-1 Requirements for the IPM Client on Windows NT Requirements for the IPM Client on Windows NT The following hardware and software is required to install the IPM client on a Windows NT system: • Windows NT version 4.0 with Service Pack 3 Note IPM software release 2.0 has not been tested with Windows NT Service Pack 4. • 64 MB RAM minimum (128 MB recommended) • 30 MB hard disk space Before you install the IPM client on a workstation running Windows NT, you should know the following information: • IPM server port number for the Naming server (the default is 44342) • Name of the host where the IPM server software is installed Tips The IPM server port number is obtained using the pkgparam -v CSCOcwbS | grep OSAGENT_PORT command on the Solaris server system.
    [Show full text]
  • Windows 95 and Window 98® Operating System
    ® Windows 95 and Window 98® Operating System Microsoft Base Cryptographic Provider FIPS 140-1 Documentation: Security Policy September 20, 2000 11:33 AM Abstract This document specifies the security policy for the Microsoft Base Cryptographic Provider (RSABASE) as described in FIPS PUB 140-1. CONTENTS INTRODUCTION .......................................................................... 1 SECURITY POLICY...................................................................... 2 SPECIFICATION OF ROLES ........................................................ 3 SPECIFICATION OF SERVICES................................................... 4 CRYPTOGRAPHIC KEY MANAGEMENT ..................................... 9 SELF-TESTS .............................................................................. 11 MISCELLANEOUS...................................................................... 12 FOR MORE INFORMATION ....................................................... 13 { TC "INTRODUCTION" \F SP }INTRODUCTION Microsoft Base Cryptographic Provider (RSABASE) is a FIPS 140-1 Level 1 compliant, general- purpose, software-based, cryptographic module. Like other cryptographic providers that ship with nternet Explorer 5.1 or later, RSABASE encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. It can be dynamically linked into applications by software developers to permit the use of general-purpose FIPS 140-1 Level 1 compliant cryptography. Cryptographic Boundary The Microsoft
    [Show full text]
  • Level One Benchmark Windows NT 4.0 Operating Systems V1.0.5
    Level One Benchmark Windows NT 4.0 Operating Systems V1.0.5 Copyright 2003, The Center for Internet Security www.cisecurity.org Page 2 of 32 Terms of Use Agreement Background. CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (“Products”) as a public service to Internet users worldwide. Recommendations contained in the Products (“Recommendations”) result from a consensus-building process that involves many security experts and are generally generic in nature. The Recommendations are intended to provide helpful information to organizations attempting to evaluate or improve the security of their networks, systems and devices. Proper use of the Recommendations requires careful analysis and adaptation to specific user requirements. The Recommendations are not in any way intended to be a “quick fix” for anyone’s information security needs. No representations, warranties and covenants. CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the Products or the Recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness or completeness of any Product or Recommendation. CIS is providing the Products and the Recommendations “as is” and “as available” without representations, warranties or covenants of any kind. User agreements. By using the Products and/or the Recommendations, I and/or my organization (“we”) agree and acknowledge that: 1. No network, system, device, hardware, software or component can be made fully secure; 2.
    [Show full text]
  • Starburn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started
    StarBurn Software Technical Reference Series StarBurn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started April 18, 2016 StarBurn Software www.starburnsoftware.com Copyright © Rocket Division Software 2001-2016. All rights reserved. Copyright © StarBurn Software 2009-2016. All rights reserved. StarBurn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started Page 1 of 13 StarBurn Software Technical Reference Series INTRODUCTION .................................................................................................. 4 KEY BENEFITS ..................................................................................................... 5 KEY FEATURES .................................................................................................... 7 SUPPORTED PLATFORMS .................................................................................. 11 SYSTEM REQUIREMENTS................................................................................... 12 CONTACTS........................................................................................................ 13 StarBurn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started Page 2 of 13 StarBurn Software Technical Reference Series COPYRIGHT Copyright © Rocket Division Software 2001-2016. All rights reserved. Copyright © StarBurn Software 2009-2016. All rights reserved. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written
    [Show full text]
  • Windows 95 & NT
    Windows 95 & NT Configuration Help By Marc Goetschalckx Version 1.48, September 19, 1999 Copyright 1995-1999 Marc Goetschalckx. All rights reserved Version 1.48, September 19, 1999 Marc Goetschalckx 4031 Bradbury Drive Marietta, GA 30062-6165 tel. (770) 565-3370 fax. (770) 578-6148 Contents Chapter 1. System Files 1 MSDOS.SYS..............................................................................................................................1 WIN.COM..................................................................................................................................2 Chapter 2. Windows Installation 5 Setup (Windows 95 only)...........................................................................................................5 Internet Services Manager (Windows NT Only)........................................................................6 Dial-Up Networking and Scripting Tool....................................................................................6 Direct Cable Connection ..........................................................................................................16 Fax............................................................................................................................................17 Using Device Drivers of Previous Versions.............................................................................18 Identifying Windows Versions.................................................................................................18 User Manager (NT Only) .........................................................................................................19
    [Show full text]
  • Windows 10: Considered Harmful
    Windows 10: Considered Harmful 26 August, 2016 Last Updated: 25 September 2016 Previously I made a series of articles against Windows 10, consisting of basic explanation, open letters, and even a long-winded chance.org petition. However, I have come to realize that these various things could be better as one page rather than fragments across my website. On this page I hope to explain why the Windows 10 system is evil and also include why Windows as a whole is Considered Harmful . Sources to unreferenced items in this article can be found in the various resource links on the bottom of the page. Information can also be found in the photographs shown and with a simple web search. The primary reason against the Windows 10 system is an obvious one. The system is designed to be a system that data-mines the user. This is proven time and time again. Using a tool such as wireshark, one can clearly see that it makes encrypted connections to a variety of Microsoft servers. This uses a very weak RSA encryption that can be broken in under a minute. When a user successfully decrypted the encrypted data, he simply converted the decrypted ``.bin'' extension to ``.png'' and opened them. The image files were screen- shots of him installing the RSA decryptor tool. This was in a VM and was a fresh install. In addition to this, another user in Australia also monitored the odd connection but did not decrypt it. He noticed this when he opened a photograph in the Windows Photo App.
    [Show full text]
  • What Is Windows NT
    What is Windows NT Windows NT is worked out on the base OS/2 NT. OS/2 is developed by Microsoft and IBM together. It has Microsoft OS/2 NT and IBM OS/2 two types. The two firms part on bad terms after cooperation. IBM continues to provide OS/2 version but Microsoft renames its OS/2 NT Wndows NT. That is the first generation of Windows NT 3.1. Windows NT is pure 32-bit operating system. It employs advanced NT core technology. NT stands for New Technology. --Source from http://www.powerdatarecovery.com/data-recovery/windows-nt.html Microsoft Windows NT (Network Termination) is a kind of operating system developed by Microsoft. Microsoft hires a few staffs from Digital Equipment Corporation to develop this new system. Many features of this system have showed the early conceptions with VMS, RSX-11, and DEC. Windows NT is the operating system for the workstation, networkserver, and large computer. It can also be used as PC operating system. It has a close relationship with communication services and provides file print service. It can run client/server applications, and it has built-in Internet/Intranet function. It is gradually becoming the standard platform of enterprise network. This article mainly introduces Wondows NT Server4.0. Features 1. 32-bit operating system. Multiple guide function. It is compatible with other operating systems. 2. It realizes the "preemptive" multitask and multithreading operation. 3. It uses SMP technology and supports multi-CPU system. 4. It supports CISC (such as Intel system) and RISC (such as Power PC, R440) and all kinds of hardware platform.
    [Show full text]