Client/Server vs Direct Interface
In client/server architecture, you run programs on your local computer, usually a Windows PC or Macintosh, which communicates with the server, in our case a Novell Netware file and application server. The client/server most users would be familiar with would be a web browser such as Netscape or Internet Explorer. These programs are the client that presents requests for web pages to servers all over the Internet.
On our system, the first client you use is the Novell client. This program requests authentication information, namely login name and password and sends the information to a Novell Server. When authenticated, the client opens a connection to the server making files and applications existing on the server available to you on your local computer. You will not get a command line prompt, you never give commands directly to the server, you use clients. An example is a mail client, in the computer labs this will be Groupwise. If you have not logged in, the program and your mail will not be available. After login, the Groupwise client is available to request to the server that your mail be made visible to you.
Log in to the network
When a Windows computer is first booted or another user has logged out, the Novell Netware Login Box appears, type your Login Name and Password. Click OK.
A Macintosh should have a small TREE icon in the top right corner of the Desktop. Click on this and select Log in. The information required is the same as displayed above. If this icon is not there, please contact CTS for an install of the Novell client.
Note: The login screen may have 2 other fields displayed for filling in, Tree and Context. The tree field should be set to, "CWU_TREE". If not, select it. The context field does not matter as long as the context is entered in the Name file as described below.
Your login name is typically last name followed by first initial i.e. John Smith would have the loginname smithj and John Smithley would have the user name smithlej. If there is more than one student with the same name, a middle initial will be used, i.e. firstname.lastname@example.org. Your context name also depends on your last name. One part of the context is the first letter of your last name. Your full context name is required for login. It looks like .username.x.students.cwu. So the student John Smith would have a full context name of .smithj.s.students.cwu (note the leading period). The second part of the context is the first letter of the last name. So John Jones would have the context .jonesj.j.students.cwu.
If your password expires
An Attention (!) box will usually appear asking if you want to change your password. Click Yes. Enter your new password in the text box and retype to confirm it in the second box. Click OK and REMEMBER your password.
To confirm that your password has been changed, a box will appear stating, "Your password has been changed." Click OK.
Ready to use
You now have access to all applications that are contained in the Network Applications folder, including Groupwise Mail, MS Office, Kermit and the Netscape web browser. You also have access to your files sitting on the network directories.
When You Are Finished Using Your Account
When you are finished using the computer, please BE SURE TO LOG OUT to insure that no one else has access to your data and mail.
To log out, click the Start button and click the ShutDown button. A box will appear with several options, select "Close all programs and log on as a different user", Click Yes. You are now logged off. You will know for sure when a new login box comes up.
To log out, click the tree icon and click the Log all the way out button. Click OK when asked are you sure. You are now logged off.
Only one person can be logged on a computer at a time. Your Netware accounts are called "Roaming Profile Accounts." This means that some information about your session and setup preferences is saved between logins, even when you use different computers. You can also save files to the network so that it no longer necessary to carry a floppy disk around for personal use. Further information is available in E-mail use and File access. Please be aware of the Acceptable Use of Information Technology Resources Policy (Posted in labs).