Powered By Blogger

Wednesday, August 28, 2013

Interoperability

Interoperability with Novell Netware

To install the NWLink protocol, right-click on My Network Places.
Select Properties.
Right-click the network connection you wish to install NWLink on.
Select Properties.
Click on Install.
Select Protocol.
Click on Add.
A list of protocols is displayed. Highlight NWLink.
Click on OK.
NWLink has now been installed for Local Area Connection.

Configuring NWLink

To configure NWLink, Highlight NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.
Select Properties.
The adapter group controls what types of network data frames the adapter will recognize as containing NWLink. In order for machines to communicate they must be using the same frame type. In most cases Auto frame type will detect it. However, the frame type can be manually entered as well.

Client Service for NetWare

Although NWLink enables Windows 2003 machines to communicate with NetWare machines, a gateway service is needed for the two different systems to share resources. A Windows 2003 computer can access resources on the NetWare server as a client through the integrated Client Service for NetWare component.  CSNW relies on the NWLink protocol, which is automatically installed alongside CSNW.

Installing CSNW

To install CSNW right-click on My Network Places.
Select Properties.
Right-click the local area connection on which you want to install CSNW.
Select Properties.
Click Install.
Client has been selected, click on Add.
Client Service for NetWare has been selected, click on OK to continue.
Notice that NWLink has also been installed. Click on Close to close the Local Area Connection properties box.
When the computer restarts, you are prompted to set your Default Tree and Context or your Preferred Server. This information is used to access the NetWare server.

Interoperability with Apple Macintosh


Many companies with Windows 2003 Servers may also have Apple Macintosh computers. For this reason, Windows 2003, continues to support three tools for Macintosh interoperability :
  • The AppleTalk Protocol
  • Print server for Macintosh
  • File server for Macintosh                                                                                                                     The File Server for Macintosh allows your Windows 2003 computer running AppleTalk to act as a file server for Macintosh computers. In order to act as a Macintosh file server, your Windows 2003 server must have NTFS volumes available on which to create a Macintosh-accessible volume.
  • Installing AppleTalk

    To install AppleTalk, right-click on My Network Places.
    Select Properties.
    Right-click on the connection on which AppleTalk is to be installed.
    Select Properties.
    Click on Install to install a new protocol.
    Select Protocol.
    Click on Add.
    A list of protocols is displayed. AppleTalk has been highlighted by default, click on OK to continue.
    AppleTalk has been installed for the Local Area Connection.

    Installing File Server for Macintosh

    To install File Server for Macintosh, the Add/Remove Windows Components wizard is used. Click on Start.
    Select Control Panel.
    Select Add or Remove Programs.
    Double-click on Add/Remove Windows Components.
    Select the check box next to Other Network File and Print Services.
    Click on Details to view the available File and Print Services.
    Deselect Print Services for Unix as this is not required.
    Both File Services for Macintosh and Print Services for Macintosh have been selected. Click on OK to continue.
    Click on Next to install the selected components.
    Windows will install and configure the selected components. The Windows CD-ROM may be needed during this stage.
    Click on Finish to close the Components Wizard.

    Creating a Macintosh Accessible Volume

    To create a Macintosh accessible volume, the Shared Folders management tool is used. Right-click on My Computer.
    Select Manage.
    Computer Management will appear, expand Shared Folders.
    To create a new share, right-click on Shares.
    Select New Share.
    The Share a Folder Wizard appears. Click Next to continue.
    In the Folder to share box, type the name of the folder to share. The folder can also be browsed for. (N.B. This folder must be located on an NTFS volume.)
    Check the Apple Macintosh check box to make the folder available for Macintosh machines.
    Click on Next to continue.
    Choose the level of access clients will have to the share. Select Administrators have full control; other users have read-only access.
    Click on Finish to create the volume.
    The newly created shares appear in the shares list.

    Print Server for Macintosh

    Print Server for Macintosh provides for 2 functions on a network:
    The ability for Macintosh clients to print to printers controlled by Windows 2003 servers.
    The ability for Windows clients to connect to Macintosh printers through a Windows 2003 Print Server.
    To configure this functionality, AppleTalk protocol and the Print Server for Macintosh must be installed.

Saturday, June 15, 2013

TCP/IP


Transmission Control Protocol/Internet Protocol (TCP/IP)


In order for communication to occur on a network  all parties must use a common language. In IT networks this is known as a protocol.  There are many different protocols available for computer networks. The most common and widely used being TCP/IP.
TCP/IP is the standard protocol that is used on the internet. In order for any network to access the internet you must use the TCP/IP protocol suite. TCP/IP is required by Active Directory. For this reason, TCP/IP is the default protocol for Windows XP and 2003.

Protocols

Reference is often made to the TCP/IP stack. This consists of layers of mini applications which perform the discrete job of  sorting and filtering the data packets picked up by the NIC and then passing the packet on to the next layer for further processing. Eventually a coherent message pops out of the top of the stack into the operating system for the user to read. The reverse is also true i.e. converting of the reply into data packets that can be sent over the network media.
The layers in a TCP/IP stack write headers for network messages as well as decoding them.  Each level in the stack adds a portion to the network packet which its counterpart in the receiving computer will understand.  Strictly speaking, the NIC isn’t part of TCP/IP, but protocols are bound to a particular adapter.
At the receiving computer, the headers are stripped off as they pass up through the  TCP/IP stack until only the bare payload is presented to the user.

The DOD Four Layer Model

Transmission Control Protocol/Internet Protocol (TCP/IP)TCP/IP is often referred to as the TCP/IP protocol suite. TCP/IP is in fact a group of protocols/applications working together to provide network communication. TCP/IP was invented by the US Department of Defence (DOD) to allow machines to communicate over a network. It is a simpler model than the 7 layer OSI model.  The different components of TCP/IP all function at different layers. These layers group the different components into four different categories.

The Application Layer

The Application Layer contains the applications that use TCP/IP such as Internet Explorer and Outlook.  The Application Layer also contains Application Programming Interfaces (API) such as Winsock, which enables applications to use TCP/IP.

The Transport Layer

The Transport Layer is responsible for the transfer of data on the network.  There are two different transport protocols TCP and UDP. Both protocols provide transport but work in different ways.

Transmission Control Protocol (TCP)

TCP is a connection-orientated protocol. Both sides confirm that the data is being sent and received.

User Datagram Protocol (UDP)

UDP is a connectionless-orientated Protocol. Both computers presume the other side has received the data.  As an example, name resolution uses UDP. If the query fails then a TCP name query is made.

The Internet Layer

To send data the sender must have a method of distinguishing the recipient. This is called an IP address and they take the form of a unique number on the network . The Internet Protocol is responsible for these addresses.  The Internet Control Messaging Protocol (ICMP) is used to test connectivity between machines by sending ICMP messages using the PING command.  The Internet Group Messaging Protocol (IGMP) is used to send data to groups of machines, e.g. Streaming Video. This is known as Multicast.  The Address Resolution Protocol (ARP) is responsible for changing an IP address into the network card’s physical address. Every network card has a unique physical address hardwired into the card itself which is needed for communication on a network.

The Physical Layer

The Physical Layer is responsible for the actual physical media and how the data is sent to another machine, e.g. Fibre Optic, ATM.  There are many ways to send data down the cable, the most common technologies for LANs are Token Ring and Ethernet. In order for two machines to communicate they must be using the same technology or be connected via a bridge .

Binary Numbers

The thinking bits of a computer use “flip-flops” to show “up” or “down” or “ on” or “off”. It’s just as easy to think of these as on/off light bulbs. Arrays of these flip-flops are used for storing and manipulating numbers. The point is that they can only have two states like a light bulb. These two states can also be stores as N/S magnets on a hard disk, or pits in foil on CD, or high and low voltages in a cable etc. etc.
Computers similarly use groups of switches to represent numbers and perform calculations. These groups of switches are known as registers and show numbers in Binary form. Denary numbers (which we also call Decimal) use 10 symbols to represent numbers – 0123456789, whereas Binary needs just two symbols 01.
The number of digits in a binary number can be represented by a corresponding number of switches. In computer parlance, these are bits.
A bit is either a 1 or a 0. The different bits in a binary number represent different values which are used to create a number.
Binary Numbers
If the bit is switched on (1) then we use that bit. If the bit is switched off (0) then we ignore it. Add all the (1) switches together, 128+64+16+8+1, and you get the number 217. So the binary number for 217 is 11011001.

Binary Number Examples

11111010      128+64+32+16+8+2=250
00011010     16+8+2=26
11110000     128+64+32+16=240

The IP Address

Every computer on a network and the internet needs an address. This address is known as an IP address. Two computers can never have the same address.  An IP Address is a group of 4 eight bit binary numbers represented in decimal. Each number is separated by a period, e.g. 10.1.0.1.  Any machines that are connected to a network will each need a unique address. Two machines cannot use the same address.
The IP address is divided into the network ID and the host ID. The network ID represents what network the machine is on. For two machines to communicate they have to be using the same network ID. The host ID represents a unique number assigned to the machine attached to the end of the network ID. For two machines to communicate they need to Have the same network address. They must, however have different host numbers.
A machine can identify which part of its IP address is the host ID and which part is the network ID by using a set of numbers called a subnet mask.

Subnet Masks

As well as an IP address every machine using TCP/IP needs a subnet mask.  The subnet mask splits the IP address into two parts, allowing the computer to identify which part is the network ID and which part is the host ID.
The subnet mask divides the IP address into two parts by using on (1) and off (0) switches. 1 represents a network ID and 0 represents a host ID.
A computer with an IP address of 10.1.0.1 and a subnet mask of 255.255.0.0 would have a network ID of 10.1 and a host ID of 0.1. This is worked out by converting both numbers into binary.
10            .1           .0.          1
00001010.00000001.00000000.00000001
255           .255.            0.               0
11111111.11111111.00000000.00000000
Using the subnet mask, divide the IP address up by using the 1’s to represent the network ID and the 0’s to represent the host ID.
00001010.00000001.00000000.00000001
11111111.11111111.00000000.00000000.
Using this, we can assume that the network ID is 00001010.00000001 (10.1) and the host ID is 00000000.00000001 (0.1).
A subnet mask doesn’t have to be a full octet. It is possible to use a subnet mask that is only a partial octet.
For example 255.255.240.0: This enables the administrator to create custom subnets to divide a private network into several discrete sub- networks

Bit Notation

An easier way of writing an IP address and its subnet mask is by using the form xxx.xxx.xxx.xxx/bits in the mask.  The address 10.1.0.1 with a subnet mask of 255.255.0.0 can also be written as 10.1.0.1/16.
This form of notation shows the number of Bits in the subnet mask, e.g. /8 represents 11111111.00000000.00000000.00000000 or 255.0.0.0.
/20 would represent 11111111.11111111.11110000.00000000 or 255.255.240.0.

IP Address Classes

When TCP/IP first appeared, IP addresses were placed into different classes A,B,C and D. The subnet mask of the machine would be determined by its IP address class.  To determine what class an IP address is , refer to the first octet of the address, e.g. 100 for 100.23.23.1
To determine what class an IP address is , refer to the first octet of the address, e.g. 100 for 100.23.23.1
Class    Subnet Mask                         Host ID’s
A       255.0.0.0                                   16,777,214
B       255.255.0.0                               65,534
C       255.255.255.0                           254
D       255.255.255.255 (Multicast)     N/A
The IP AddressOf the 32 bits available, the bits required for the network ID can’t be used. In a class B network for example this takes away 16 bits, leaving 16 bits for the host addresses. This can be used to make numbers up to 65536 (2 to the power 16). Host addresses using all 1’s or all 0’s are reserved for special use, hence the figure in the above table of 65534.
You have been assigned the address 134.34.0.0/20, how many hosts will you have?
/20 represents the subnet mask of 11111111.11111111.11110000.00000000 (255.255.240.0)
Therefore the Host ID is 0000.00000000, giving a total of 12 host ID’s to play with.
Therefore  (212)-2=4094. So there are 4092 different host ID’s
Why take off 2?
Two host ID addresses are reserved for every network.
If the host ID contains all 0’s it represents the Network it is on and can’t be used, e.g. 10.1.0.0/24 (00000000) is invalid. This is known as the Network Address.
If the host ID contains all 1’s then this represents every computer in the network. This is known as the Broadcast Address, e.g. 194.34.23.255/24 (11111111) represents every computer in the 194.34.23 network.
Reserved addresses:
If the host part of the address is all zeroes, this looks similar to the subnet mask and is called the Network Address. By convention, this address is not used for any host. If the host part of the address is all ones, this represents not a single host but all hosts on that network. It is termed the broadcast address, and it shouldn’t be used for any host.
Although these days you can have any subnet mask, classes are still used when a subnet mask isn’t given. There are  a number of private address ranges available for use in internal networks. These addresses will never be seen on the internet. As internet routers will not pass packets that originate from these addresses.
Class A : 10.0.0.0 – 10.255.255.255
Class B : 172.16.0.0 – 172.31.255.255
Class C : 192.168.0.0 – 192.168.255.255

Custom Subnet Masks

Imagine a scenario where you have been assigned the address range 193.28.34.0 for your company’s network. You need to have 14 separate networks each with ten computers in.
193.28.34.0 is a class C address which means you have 254 hosts but only the one network (the 193.28.34) network.
Considering that you only need 10 hosts and not 254 we can take some of the host ID’s and turn them into Network ID’s. You can do that by creating a custom subnet mask…
We have the 8 host digits to play with. This equates to (28)-2=254 addresses. However we only need 140. Some of the host ID’s can be used as network ID’s.

Routers

Routers are network devices that are used to connect separate networks and to enable network traffic to pass between the networks.  We have seen that machines on separate networks cannot pass data between themselves without assistance.  A router or default gateway passes data to addresses that are not on the senders network.
With the help of a router computers on both networks would be able to communicate. The router is physically connected to both networks and has two IP addresses.
When a client wants to send a packet out on the network it checks the network ID of the destination machine. If it is different from its own it would send the packet to its default gateway.
Routers can communicate with other routers so that network packets can be passed to their correct destinations.
A network packet travelling out on the internet may pass through several routers before reaching its target. Each router forwards the packet on to the next router until it either reaches or fails to reach its destination.
Routing is covered in much greater detail later on in this course.

Configuring TCP/IP

This free lesson will teach you how to configure TCP/IP in windows and how to use the ipconfig command.
To configure TCP/IP click on Start.
Right-click on My Network Places.
Select Properties.
Right-click on the connection you want to configure and select Properties.
Highlight Internet Protocol (TCP/IP).
Select Properties.
Configuring TCP/IPThis machine is currently configured to obtain an IP address automatically. Select Use the following IP address and fill out the relevant details.
Additional gateways and IP addresses can be added by clicking the Advanced Button…
..and configuring the appropriate options.

Using the ipconfig command

The ipconfig command can be used to display IP address information from a command prompt
Running ipconfig with /all switch produces a much more verbose display.

Internet Connection Firewall

Windows XP ships with a basic built-in firewall. The firewall helps protect the computer from outside attacks on the internet. A firewall controls which network traffic is allowed in and out of a computer. It does this by opening and closing ports.
When communications take place between two machines different port numbers are used depending on the service. As an example a Web Browser will communicate with a Web Server on port 80, which is the default port for HTTP (The language used to display web pages).
There a thousands of port numbers available many of the lower range numbers being reserved for common services. A few of the common port numbers are listed below.
Port 80:    HTTP (Web Pages)
Port 21:    FTP    (File Transfer Protocol)
Port 25:    SMTP (E-Mail)
Port 110:   POP3   (E-Mail)
Port 443:   SSL     (Secure Web Pages)
A hacker can sometimes compromise security on a machine by gaining access to the machine through an unused port. A Trojan horse virus opens a port on a client machine allowing a hacker to gain access to the machine.  A firewall can be configured to allow only specific ports in and out of the computer thus greatly reducing the risk of a cracker gaining access.
Internet Connection FirewallTo enable and configure the Internet Connection Firewall navigate to the properties of your network connection and selected Advanced.
Check the Internet Connection Firewall box to enable the firewall.
And select Settings to configure it.
A list of services allowed to connect to this machine is shown. New services can be added by selecting Add.
And filling out the details for the service.
For example this machine is hosting a Puma chat room server. Click on OK to add the service.
Connections on port 270 are now allowed to connect to this machine.
The Security Logging Tab specifies settings relating to the security log. For example you can log any unsuccessful connections.
The ICMP tab can be used to configure ICMP packets on the computer. ICMP packets are used during ping requests.
The options for the Internet Connection Firewall have been improved slightly for Windows XP Service Pack 2 however the principals remain exactly the same.  Although the firewall is good enough to protect home users, for larger corporate networks and servers a third-party firewall should be used such as Microsoft ISA server.

Troubleshooting TCP/IP

These are the two main utilities for troubleshooting TCP/IP:
ping – used to test connectivity
ipconfig – used to view IP address information.
Before launching into detailed settings investigation, always check that the hub/switch has power to it, or that the network cable hasn’t been pulled out.
The ping command does the following:
Verifies connections to one or more remote computers by sending ICMP echo packets to the computer and listening for echo reply packets.
Waits for up to one second for each packet sent.
Prints the number of packets transmitted and received.
Each received packet is validated against the transmitted message to check that no data loss occurs.
The first  item to ping is the local NIC. The loopback address is 127.0.0.1. (Pinging “localhost” does pretty much the same thing.). If this fails then either your TCP/IP stack isn’t installed correctly, or the network card is not functioning.
Troubleshooting TCP/IPThe first  item to ping is the local NIC. The loopback address is 127.0.0.1. (Pinging “localhost” does pretty much the same thing.). If this fails then either your TCP/IP stack isn’t installed correctly, or the network card is not functioning.
Note that an address or computer name can be pinged.
Here a computer “jacklap” (ip address 10.1.0.104) can’t be pinged. This doesn’t necessarily imply a connection problem. It may be a name resolution problem, and can be tested by pinging the ip address.
If you can ping your own machine and others on the local network, then try pinging the default gateway. A message such as the one above implies that either the address is a wrong one, or if the report reads destination host unavailable then there may a problem with the gateway machine (router).

Ipconfig

Default gateways or DNS servers can be discovered using the Ipconfig utility.
Typing Ipconfig at a command prompt brings up useful information. No settings can be altered from this window, but it reports the current settings for TCP/IP.
Typing Ipconfig with the /all switch presents additional items such as the adapter’s MAC address and name resolution information.

The Recovery Console

The Recovery Console

The Recovery Console is a text-mode command interpreter that allows you to access the hard disk of a computer running Windows Server 2003 for basic troubleshooting and system maintenance.  The Recovery Console is particularly useful when the operating system cannot be started, as the recovery console can be used to run diagnostics, disable drivers and services, replace files, and partition disks.
You can start the recovery console by booting from the Windows Server 2003 CD-ROM and, when prompted, pressing R to choose the repair and recover option. Alternatively, you install the recovery console and use it as a standard boot-up option. This option is preferred since the Windows Server 2003 CD-ROM is not needed.
To install the Recovery Console, insert the Windows Server 2003 CD-ROM and from a command-prompt use the winnt32 command with the /cmdcons switch.
For example e:\i386\winnt32 /cmdcons will use the winnt32 command from the Windows Server 2003 CD-ROM with the /cmdcons switch.
Click on Yes to install the Recovery Console.
The Recovery Console is then installed.
Once installed, Click on OK.
The Recovery Console can now be accessed from the boot choices menu when starting the computer.
To load the Recovery Console hit Enter.
The Console is then loaded.
Choose which operating system you would like to log onto, in this case “1”.
Specify the Administrator password.
Once logged in you can access various options from the installation:
Listsvc: Displays the services and drivers that are listed in the registry as well as their start-up settings. You can use this to find out the name of a driver or service that is causing a problem.
Enable/Disable: Controls the start-up status of a service or driver. You can obtain the name of the service or driver by using the listsvc command.
Diskpart: Provides the ability to create and delete partitions by using an interface similar to that of the text-based portion of setup.
Bootcfg: Enables you to manage the start-up menu.
For more options specify Help at the command line. Or for help on a specific command type help command.
e.g. The listsvc command shows a list of all services and drivers on the machine as well as their status.
The command disable messenger will prevent the messenger service from starting.

Restoring Data

Restoring Data

Restoring a normal backup is a straightforward procedure, however when restoring data from incremental or differential backups, you will often need to restore both the normal backup and the relevant incremental backups, or differential backup.
The ntbackup utility is used to restore data from a backup. Select the Restore and Manage Media tab.
When performing a complete restore, you should always start with the normal backup.
Restoring DataSelect the box next to the backup media.
The Data folder will be restored to its original location, although this can be changed by selecting the Restore files to drop-down list. Once configured, select the Start Restore button.
Click on OK to begin the restore process.
Click on Close once the restore has complete.

Performing a Backup

Performing a Backup

This lesson will show you, step by step, how to perform the various types of backup as described in the previous lesson.
In the following example, the C:\Data folder will be backed up using the Backup Utility.
Notice that the A (Archive Attribute) is currently set for all of the files.
The backup utility can be quickly accessed by typing the command “ntbackup”.
Performing a BackupBy default, the Backup Utility will use Wizard Mode. Uncheck the Always start in wizard mode checkbox.
Select Advanced Mode, which enables you to configure the backup exactly as you want it.
Select the Backup tab.
From the tree view, select the location of the backup.
Check the box next to the folder you wish to backup, e.g. Data. You can also backup an entire drive by selecting the checkbox next to the relevant drive letter.
Once you have selected all the files you wish to backup, you can save the selection by clicking Job.
And selecting Save Selections.
Choose a name for the backup selection and click Save.
You can now open the backup selection each time you  perform a backup, rather than re-selecting all of the files.
Next, specify a location for the backup, e.g. A network share or removable hard disk.
Once a location has been specified, select the Start Backup button.
Because this is a new backup, you should select the Replace the data on the media with this backup radio button.
Select the Advanced Option.
The Disable volume shadow copy option allows the backup of locked and open files. If this option is selected, some files that are open or in use might be skipped.
You can choose the Backup type from the Backup Type drop-down list.
In this case, a Normal backup is required.
Click on OK once all options have been configured.
To begin the backup select Start Backup.
The backup will then begin.
Once completed, you can either view a Report or Close the Backup dialog box.
Notice that the Archive attribute on the files in the data folder have now been cleared.
The backup has been saved to the network share as “databackup.bkf”.

Performing a Differential Backup

In this scenario, a differential backup is performed the day after the normal backup. Because the current.txt file has been modified, the archive attribute is set.
Open the ntbackup utility and select Job.
Select Load Selections.
And open the backup selection saved previously.
Specify a new name for the backup file.
Select Start Backup.
Click the Advanced Button.
Select the Backup type drop-down list.
Select the Differential Option.
Click on OK once all options have been configured.
Click on Start Backup to begin the backup process.
Once the backup is complete, click on Close.
Notice that the archive bit on the modified file stays selected. The differential backup will only contain this file.

Performing an Incremental Backup

With an incremental backup, the archive bit will be cleared. In this example, two files in the folder have been modified since the normal backup.
Again, using the ntbackup utility, open the backup selection, and begin the backup process.
This time, select the Incremental Backup type.
Once the backup has finished, click on Close.
Notice that, unlike a differential backup, the archive bit has now been cleared.

Creating a Backup Schedule

Incremental Backup Strategy

Monday – Normal Backup of entire computer
Tuesday – Incremental Backup of Data folder
Wednesday – Incremental Backup of Data folder
Thursday – Incremental Backup of Data folder
Friday – Incremental Backup of Data folder
The backup utility allows you to schedule backup jobs to run at pre-set times. In this example, every Monday a normal backup of the entire computer is performed. Every Tuesday, Wednesday, Thursday and Friday nights, an incremental backup of the data folder is performed.
Launch the ntbackup utility and select the Schedule Jobs tab.
Select the Add Job button.
Click on Next to continue.
Select which files you would like to backup, in this case Back up everything on this computer. Once selected, click Next.
Choose a name and location for the backup and click Next.
Ensure Normal backup is selected and click Next.
Click on Next to continue.
Because this is a normal backup, data should not be appended to the end of an existing backup. Select the Replace the existing backup radio button.
Click on Next to continue.
Choose a name for the Schedule and then select the Set Schedule button.
Using the Schedule options, a backup schedule for the job can be set.
In this example, a normal backup will be performed every Monday night. Click on OK to continue.
The scheduled task will need to run with the permissions of a user with the relevant rights, e.g. A member of the Administrators or Backup Operators group. Click on OK to continue.
Click on Next to continue.
Click on Finish to close the wizard.
The normal backup job has now been created. Click on Add Job to create the incremental backup schedule.
Click on Next to continue.
Select which files you would like to backup, in this case Back up selected files, drives, or network data. Once selected, click Next.
Select the files to be backed up.
Click on Next to continue.
Click on Next to continue.
Select the Backup type drop-down list and select Incremental.
Click on Next to continue.
Click on Next to continue.
Because this is an incremental backup, it is often easier to append data to the end of an existing backup. Click on Next to continue. N.B. You should set the Tuesday backup to replace the existing backup .
Choose a name for the backup job and click Set Schedule.
Choose a schedule from the available options.
The backup will be performed at midnight every Tuesday, Wednesday, Thursday, and Friday. Click on Next to continue.
Click on Next to continue.
Click on Finish to close the wizard.
The backup schedule has now been set.