Your custom script

Friday, 27 November 2015


 What are routers?
Routers can connect two or more network segments. These are intelligent network devices that
store information in its routing table such as paths, hops and bottlenecks. With this info, they are
able to determine the best path for data transfer. Routers operate at the OSI Network Layer.





What is point to point link?
It refers to a direct connection between two computers on a network. A point to point connection
does not need any other network devices other than connecting a cable to the NIC cards of both
computers.





What is anonymous FTP?
Anonymous FTP is a way of granting user access to files in public servers. Users that are
allowed access to data in these servers do not need to identify themselves, but instead log in as
an anonymous guest.




 What is subnet mask?
A subnet mask is combined with an IP address in order to identify two parts: the extended
network address and the host address. Like an IP address, a subnet mask is made up of 32
bits.




 What is the maximum length allowed for a UTP cable?
A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can
be overcome by using repeaters and switches.





 What is data encapsulation?
Data encapsulation is the process of breaking down information into smaller manageable
chunks before it is transmitted across the network. It is also in this process that the source and
destination addresses are attached into the headers, along with parity checks.



Describe Network Topology
Network Topology refers to the layout of a computer network. It shows how devices and cables
are physically laid out, as well as how they connect to one another.

NETWORKING QUESTION

1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of cables and
protocols used in order for one device to be able to communicate with the other.


2) What are the layers of the OSI reference model?
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer,
Session Layer, Presentation Layer and Application Layer.



3) What is backbone network?
A backbone network is a centralized infrastructure that is designed to distribute different routes
and data to various networks. It also handles management of bandwidth and various channels.



4) What is a LAN?
LAN is short for Local Area Network. It refers to the connection between computers and other
network devices that are located within a small physical location.



5) What is a node?





Q. What are application partitions? When do I use them?

A1) Application Directory Partition is a partition space in Active Directory which an application can use to store that application specific data. This partition is then replicated only to some specific domain controllers.The application directory partition can contain any type of data except security principles (users, computers, groups).**A2) These are specific to Windows Server 2003 domains. An application directory partition is a directory partition that is replicated only to specific domain controllers. A domain controller that participates in the replication of a particular application directory partition hosts a replica of that partition. Only domain controllers running Windows Server 2003 can host a replica of an application directory partition.

Q. Name the AD NCs and replication issues for each NC

Schema NC, *Configuration NC, * Domain NCSchema NC: This NC is replicated to every other domain controller in the forest. It contains information about the Active Directory schema, which in turn defines the different object classes and attributes within Active Directory.
Configuration NC: Also replicated to every other DC in the forest, this NC contains forest-wide configuration information pertaining to the physical layout of Active Directory, as well as information about display specifiers and forest-wide Active Directory quotas.
Domain NC:
This NC is replicated to every other DC within a single Active Directory domain. This is the NC that contains the most commonly-accessed Active Directory data: the actual users, groups, computers, and other objects that reside within a particular Active Directory domain.

Q. What is the SYSVOL folder?

The SYSVOL folder is critical because it contains the domain’s public files. This directory is shared out (as SYSVOL), and any files kept in the SYSVOL folder are replicated to all other domain controllers in the domain using the File Replication Service (FRS)—and yes, that’s important to know on the exam.The SYSVOL folder also contains the following items:
  • The NETLOGON share, which is the location where domain logon requests are submitted for processing, and where logon scripts can be stored for client processing at logon time.
  • Windows Group Policies
  • FRS folders and files that must be available and synchronized between domain controllers if the FRS is in use. Distributed File System (DFS), for example, uses the FRS to keep shared data consistent between replicas.
You can go to SYSVOL folder by typing : %systemroot%/sysvol on DC.

Q. Where is the AD database held? What other folders are related to AD?

AD Database is saved in %systemroot%/ntds. You can see other files also in this folder. These are the main files controlling the AD structure
  • ntds.dit
  • edb.log
  • res1.log
  • res2.log
  • edb.chk

Q. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.

Yes you can Connect Active Directory to other 3rd -party Directory Services such as dictonaries used by SAP, Domino etc with the help of MIIS ( Microsoft Identity Integration Server ) you can use dirXML or LDAP to connect to other directories (ie. E-directory from Novell).

Q. What is FRS (File replication services)?

The File Replication Service (FRS) replicates specific files using the same multi-master model that Active Directory uses. 

WHAT IS LDAP ?

Short for Lightweight Directory Access Protocol, a set of protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because it’s a simpler version of X.500, LDAP is sometimes called X.500-lite.

Q. How do you verify whether the AD installation is proper?

  • An NTFS partition with enough free space
  • An Administrator’s username and password
  • The correct operating system version
  • A NIC
  • Properly configured TCP/IP (IP address, subnet mask and – optional – default gateway)
  • A network connection (to a hub or to another computer via a crossover cable)
  • An operational DNS server (which can be installed on the DC itself)
  • A Domain name that you want to use
  • Q. How do you verify whether the AD installation is proper?
  • Default containers: These are created automatically when the first domain is created. Open Active Directory Users and Computers, and then verify that the following containers are present: Computers, Users, and ForeignSecurityPrincipals.
  • Default domain controllers organizational unit: Open Active Directory Users and Computers, and then verify this organizational unit.
  • Default-First-Site-Name
  • Active Directory database: The Active Directory database is your Ntds.dit file. Verify its existence in the %System root%\Ntds folder.
  • Global catalog server: The first domain controller becomes a global catalog server, by default. To verify this item:
  • a. Click Start, point to Programs, click Administrative Tools, and then click Active Directory Sites and Services.
  • b. Double-click Sites to expand it, expand Servers, and then select your domain controller.
  • c. Double-click the domain controller to expand the server contents.
  • d. Below the server, an NTDS Settings object is displayed. Right-click the object, and then click Properties.
  • e. On the General tab, you can observe a global catalog check box, which should be selected, by default.
  • Root domain: The forest root is created when the first domain controller is installed. Verify your computer network identification in My Computer. The Domain Name System (DNS) suffix of your computer should match the domain name that the domain controller belongs to. Also, ensure that your computer registers the proper computer role. To verify this role, use the net accounts command. The computer role should say “primary” or “backup” depending on whether it is the first domain controller in the domain.
  • Shared system volume: A Windows 2000 domain controller should have a shared system volume located in the %Systemroot%\Sysvol\Sysvol folder. To verify this item, use the net share command. The Active Directory also creates two standard policies during the installation process: The Default Domain policy and the Default Domain Controllers policy (located in the %Systemroot%\Sysvol\Domain\Policies folder). These policies are displayed as the following globally unique identifiers (GUIDs):
  • {31B2F340-016D-11D2-945F-00C04FB984F9} representing the Default Domain policy
  • {6AC1786C-016F-11D2-945F-00C04fB984F9} representing the Default Domain Controllers policy
  • SRV resource records: You must have a DNS server installed and configured for Active Directory and the associated client software to function correctly. Microsoft recommends that you use Microsoft DNS server, which is supplied with Windows 2000 Server as your DNS server. However, Microsoft DNS server is not required. The DNS server that you use must support the Service Resource Record (SRV RR) Requests for Comments (RFC) 2052, and the dynamic update protocol (RFC 2136). Use the DNS Manager Microsoft Management Console (MMC) snap-in to verify that the appropriate zones and resource records are created for each DNS zone. Active Directory creates its SRV RRs in the following folders:
  • _Msdcs/Dc/_Sites/Default-first-site-name/_Tcp
  • _Msdcs/Dc/_Tcp
  • In these locations, an SRV RR is displayed for the following services:
  • o _kerberos
  • o _ldap

Q. Minimum requirement to install Win 2008 AD?

  • An NTFS partition with enough free space
  • An Administrator’s username and password
  • The correct operating system version
  • A NIC
  • Properly configured TCP/IP (IP address, subnet mask and – optional – default gateway)
  • A network connection (to a hub or to another computer via a crossover cable)
  • An operational DNS server (which can be installed on the DC itself)
  • A Domain name that you want to use

Q. What are the protocols used by AD?

Because Active Directory is based on standard directory access protocols, such as Lightweight Directory Access Protocol (LDAP) version 3, and the Name Service Provider Interface (NSPI), it can interoperate with other directory services employing these protocols.
LDAP is the directory access protocol used to query and retrieve information from Active Directory. Because it is an industry-standard directory service protocol, programs can be developed using LDAP to share Active Directory information with other directory services that also support LDAP.
The NSPI protocol, which is used by Microsoft Exchange 4.0 and 5.x clients, is supported by Active Directory to provide compatibility with the Exchange directory.

Q. What are the components of Active Director?

Object:


An object is any specific item that can be cataloged in Active Directory. Examples of objects include users, computers, printers, folders, and files. These items are classified by a distinct set of characteristics, known as attributes. For example, a user can be characterized by the username, full name, telephone number, email address, and so on. Note that, in general, objects in the same container have the same types of attributes but are characterized by different values of these attributes. The Active Directory schema defines the extent of attributes that can be specified for any object.

Classes

The Active Directory service, in turn, classifies objects into classes. These classes are logical groupings of similar objects


Schemas

The schema is a set of rules that define the classes of objects and their attributes that can be created in Active Directory. It defines what attributes can be held by objects of various types, which of the various classes can exist, and what object class can be a parent of the current object class. For example, the User class can contain user account objects and possess attributes such as password, group membership, home folder, and so on.When you first install Active Directory on a server, a default schema is created, containing definitions of commonly used objects and properties such as users, computers, and groups. This default schema also contains definitions of objects and properties needed for the functioning of Active Directory.




Global catalog

A global catalog server is a domain controller that has an additional duty—it maintains a global catalog. A global catalog is a master, searchable database that contains information about every object in every domain in a forest. The global catalog contains a complete replica of all objects in Active Directory for its host domain, and contains a partial replica of all objects in Active Directory for every other domain in the forest.
  • A global catalog server performs two important functions:
  • Provides group membership information during logon and authentication
  • Helps users locate resources in Active Directory

SITES-

Sites
By contrast to the logical grouping of Active Directory into forests, trees, domains, and OUs, Microsoft includes the concept of sites to group together resources within a forest according to their physical location and/or subnet. A site is a set of one or more IP subnets, which are connected by a high-speed, always available local area network (LAN) link. Figure 1-5 shows an example with two sites, one located in Chicago and the other in New York. A site can contain objects from more than one tree or domain within a single forest, and individual trees and domains can encompass more than one site. The use of sites enables you to control the replication of data within the Active Directory database as well as to apply policies to and computers or delegate administrative control to these objects within a single physical location. In addition, sites enable users to be authenticated by domain controllers in the same physical location rather than a distant location as often as possible. You should configure a single site for all work locations connected within a high-speed, always available LAN link and designate additional sites for locations separated from each other by a slower wide area network (WAN) link. Using sites permits you to configure Active Directory replication to take advantage
of the high-speed connection. It also enables users to connect to a domain controller using a reliable, high-speed connection.
all users 

DOMAIN CONTROLLER

Domain Controllers
Any server on which you have installed Active Directory is a domain controller. These servers authenticate all users logging on to the domain in which they are located, and they also serve as centers from which you can administer Active Directory in Windows Server 2008. A domain controller stores a complete copy of all objects contained within the domain, plus the schema and configuration information relevant to the forest in which the domain is located. Unlike Windows NT, there are no primary or backup domain controllers. Similar to Windows 2000 and Windows Server 2003, all domain controllers hold a master, editable copy of the Active Directory database.
Every domain must have at least one DC. A domain may have more than one DC; having more than one DC provides the following benefits:
    • Fault tolerance: If one domain controller goes down, another one is available to authenticate logon requests and locate resources through the directory.
    • Load balancing: All domain controllers within a site participate equally in domain activities, thus spreading out the load over several servers. This configuration optimizes the speed at which requests are serviced.

Organizational Unit:An organizational unit (OU) is a container used to organize objects within one domain into logical administrative groups. An OU can contain objects such as user accounts, groups, computers, printers, applications, shared folders, and other OUs from the same domain. OUs are represented by a folder icon with a book inside. The Domain Controllers OU is created by default when Active Directory is installed to hold new Microsoft Windows Server 2003 domain controllers. OUs can be added to other OUs to form a hierarchical structure; this process is known as nesting OUs. Each domain has its own OU structure—the OU structure within a domain is independent of the OU structures of other domains.There are three reasons for defining an OU:
  • To delegate administration – In the Windows Server 2003 operating system, you can delegate administration for the contents of an OU (all users, computers, or resource objects in the OU) by granting administrators specific permissions for an OU on the OU’s access control list.
  • To administer Group Policy
  • To hide object
Physical Components of Active DirectoryThere are two physical components of Active Directory:
  • Domain Controllers
  • Sites

Q. What are the physical components of active directory? Logical Components of Active Directory

In creating the hierarchical database structure of Active Directory, Microsoft facilitated locating resources such as folders and printers by name rather than by physical location. These logical building blocks include domains, trees, forests, and OUs. The physical location of objects within Active Directory is represented by including all objects in a given location in its own site. Because a domain is the basic unit on which Active Directory is built, the domain is introduced first; followed by trees and forests (in which domains are located); and then OUs, which are containers located within a domain.

ACTIVE DIRECTERY-

Q. What is Active Directory?
Active Directory is the directory service used by Windows 2000. A directory service is a centralized, hierarchical database that contains information about users and resources on a network. In Windows 2000, this database is called the Active Directory data store. The Active Directory data store contains information about various types of network objects, including printers, shared folders, user accounts, groups, and computers. In a Windows 2000 domain, a read/write copy of the Active Directory data store is physically located on each domain controller in the domain.
Three primary purposes of Active Directory are:
    • · To provide user logon and authentication services
    • · To enable administrators to organize and manage user accounts groups, and network resources
    • · To enable authorized users to easily locate network resources, regardless of where they are located on the network

A directory service consists of two parts—a centralized, hierarchical database that contains information about users and resources on a network, and a service that manages the database and enables users of computers on the network to access the database. In Windows 2008, the database is called the Active Directory data store, or sometimes just the directory. The Active Directory data store contains information about various types of network objects, including printers, shared folders, user accounts, groups, and computers. Windows 2000 Server computers that have a copy of the Active Directory data store, and that run Active Directory are called domain controllers. In a Windows 2008 domain, a read/write copy of the Active Directory data store is physically located on each domain controller in the domain.

WHAT IS FOREST ?

Forests
A forest is a grouping or hierarchical arrangement of one or more separate, completely independent domain trees. As such, forests have the following characteristics:
    • All domains in a forest share a common schema.
    • All domains in a forest share a common global catalog.
    • All domains in a forest are linked by implicit two-way transitive trusts.

Trees in a forest have different naming structures, according to their domains. Domains in a forest operate independently, but the forest enables communication across the entire organization.

WHAT IS TREE ?

Trees

A tree is a group of domains that shares a contiguous namespace. In other words, a tree consists of a parent domain plus one or more sets of child domains whose name reflects that of a parent. For example, a parent domain named examcram.com can include child domains with names such as products.examcram.com, sales.examcram.com, and manufacturing.examcram.com. Furthermore, the tree structure can contain grandchild domains such as america.sales.examcram.com or europe.sales.examcram.com, and so on, as shown in Figure 1-2. A domain called que.com would not belong to the same tree. Following the inverted tree concept originated by X.500, the tree is structured with the parent domain at the top and child domains beneath it. All domains in a tree are linked with two-way, transitive trust relationships; in other words, accounts in any one domain can access resources in another domain and vice versa.

WHAT IS DOMAIN ?

Domain:
A domain is a logical grouping of networked computers in which one or more of the computers has one or more shared resources, such as a shared folder or a shared printer, and in which all of the computers share a common central domain directory database that contains user account security information. One distinct advantage of using a domain, particularly on a large network, is that administration of user account security for the entire network can be managed from a centralized location. In a domain, a user has only one user account, which is stored in the domain directory database. This user account enables the user to access shared resources (that the user has permissions to access) located on any computer in the domain

Active Directory domains can hold millions of objects, as opposed to the Windows NT domain structure, which was limited to approximately 40,000 objects. As in previous versions of Active Directory, the Active Directory database file (ntds.dit) defines the domain. Each domain has its own ntds.dit file, which is stored on (and replicated among) all domain controllers by a process called multimaster replication. The domain controllers manage the configuration of domain security and store the directory services database. This arrangement permits central administration of domain account privileges, security, and network resources. Networked devices and users belonging to a domain validate with a domain controller at startup. All computers that refer to a specific set of domain controllers make up the domain. In addition, group accounts such as global groups and domain local groups are defined on a domain-wide basis.

Wednesday, 21 October 2015

WHAT IS VIRUS ?

Ans- a computer virus  is  without your knowledge  loaded on your computer .all computer virus is manmade .virus is harmfull  our pc

WHAT IS SUBNETTING ?

Ans- subnatting is process in which larger ip network is broken into seprated and smaller network 

Sunday, 11 October 2015

IP ADDRESS

Q- WHAT IS  IP ADDRESS ?
Ans- ip address is identies two network device

on tcp/ip

Tuesday, 8 September 2015

AUTOMIC PRIVATE IP ADDRESSING (APIPA)

APIPA-
             ( AUTOMATIC PRIVATE IP ADDRESSING  IS A ADDRESSING) FEATURE FOR SINGLE NETWORK  SEGMENT. WHENEVER A COMPUTER RUNNING WINDOWS HAS BEEN CONFIGURED  OBTAIN ON IP ADDRESS AUTOMATICALLY AND WHEN D.H.C.P.  OR ETHERNET CONFIGURATION
IS AVAILABLE THE COMPUTER USES APIPA TO ASSIGN IN THE  RANGE  OF 
169.254.0.1 TO 169.254.255.254

PRIVATE ADDRESS

1.ACCORDING TO RFC-1918


2.ORGANIZATIONS MAKE USE OF THE PRIVATE INTERNET ADDRESS SPACE FOR HOSTS THAT REQUIRE IP CONNECTVITY 
WITH IN THEIR ENTERPRISE NETWORK BUT DO NOT  REQUIRE EXTERNAL CONNECTIONS TO THE GLOBAL INTERNET


3.CLASS A: 10.0.0.0

4.CLASS B :172.16.0.0,172.31.0.0

5CLASS C :192.168.0.0,192.168.255.0



SOME FULL FORMS-
                  RFC=REQUEST FORM COMMENTS
                  AWG=AMERICAN WIRED GAUGE
                  

MAKE CROSS CABLE

CROSS CABLE USED FOR SAME USED

(@).COMPUTER TO COMPUTER, SWITCH TO SWITCH, ROUTER TO ROUTER



1.ORANGE/WHITE          1.GREEN/WHITE
2.ORANGE                        2.GREEN
3.GREEN/WHITE             3.ORANGE/WHITE
4.BLUE                              4.BLUE
5.BLUE/WHITE                5.BLUE/WHITE
6.GREEN                           6.ORANGE
7.BROWN/WHITE            7.BROWN/WHITE
8.BROWN                           8.BROWN




MAKE STRAIGHT CABLE

U.T.P. (UNSHEILED TWISTED PAIR CABLE)-
                                                                               
USED- COMPUTER TO SWITCH , SWITCH TO ROUTER , ROUTER TO SWITCH




1. ORANGE/WHITE          1.ORANGE/WHITE
2.ORANGE                         2.ORANGE
3.GREEN/WHITE              3.GREEN/WHITE
4.BLUE                               4.BLUE
5.BLUE/WHITE                 5.BLUE/WHITE
6.GREEN                            6.GREEN
7.BROWN/WHITE             7.BROWN/WHITE 
8.BROWN                           8.BROWN

BROADCAST ADDRESS

1. BROADCAST GOES TO EVERY HOST WITH A PARTICULAR NETWORK ID NUMBER


2.AN IP ADDRESS THAT ENDS WITH BINARY  IS  IN  ALL HOST BITS IS RESERVED FOR THE  DIRECTED BROADCAST ADDRESS


3.AN IP ADDRESS WITH BINARY IS IN  ALL NETWORK BITS IS RESERVED FOR THE LOCAL BROADCAST ADDRESS

NETWORK ADDRESS

1.NETWORK ADDRESS PROVIDE A CONVENIENT  WAY TPO REFER TO ALL OF THE ADDRESS  ON A PARTICULAR  NETWORK  OR SUBNETWORK


2.TWO HOSTS WITH DEFFERING NETWORK  ADDRESS REQUIRE A DEVICE TYPICALLY  ROUTER IN ORDER TO COMMUNICATE 


3. AN IP ADDRESS THAT ENDS WITH BINARY IN ALL HOST BITS IS RESERVED FOR THE NETWORK ADDRESS

IP ADDRESS CLASSES : SUMMARY

1. 1.0.0.0-127.0.0.0 :CLASS A


2. 127.0.0.0 : LOOP BACK ADAPTER

3. 128.0.0.0 -191.255.0.0 :CLASS B


4. 192.0.0.0-223.225.255.0 :CLASS C


5. 224.0.0.0 < 240.0.0.0 :CLASS D                                                                                (MULTICAST)


6. >=240.0.0.0      : CLASS E      (RESERVED)

CLASS C


1. THE FIRST 3 BITS OF A CLASS C ADDRESS IS ALWAYS 110

2.  THE FIRST THREE OCTES TO IDENTIFY THE NETWORK PAST OF THE ADDRESS

3.POSSIBLE NETWORK ADDRESS FROM 192.0.0.0 T0 223.255.255.0


4.  THE  REMAINING LAST OCTES CAN BE USED FOR THE HOST PARTION OF THE ADDRESS


5.CLASS C NETWORK  HAVE UP TO 254 P0SSIBLE IP ADDRESS 

CLASS B

1. THE FIRST 2 BITS OF A CLASS B ADDRESS IS ALWAYS 10


2.THE FIRST TWO OCTES TO IDENTIFY THE NETWORK PAST OF THE ADDRESS


3.POSSIBLE NETWORK ADDRESS FROM 128.0.0.0 T0 191.255.0.0

4.THE REMAINING TWO OCTES CAN BE USED FOR THE HOST PARTION OF THE ADDRESS 

5.CLASS B NETWORK HAVE UP 65.534 POSSIBLE IP ADDRESS

Monday, 7 September 2015

IP ADDRESS CLASSES :A

1.THE FIRST BIT OF A ADDRESS IS ALWAYS 0

2. THE FIRST 8 BITS TO IDENTIFY  THE NETWORK PAST OF THE ADDRESS 

3.POSSIBLE NETWORK ADDRESS FROM 
1.0.0.0 TO 127.0.0.0


4. THE REMAINING THREE OCTES CAN BE USED FOR THE HOST PARTION  OF THE N ETWORK

5. EACH CLASS A NETWORK HAVE UP TO
16,7,77,214 POSSIBLE IP ADDRESS

DIFFERENT CLASS ADDRESS RESERVE

1.DIFFERENT AMOUNTS OF BITS FOR THE NETWORK  AND HOST PARTIONS 


2.PROVIDE THE FLEXIBILITY  REQUIRED TO SUPPORT  DIFFERENT  SIZE NETWORK

IP ADDRESS CLASSES


BITS ON THE IP ADDRESS :-

1.NETWORK BITS:-
                                                                           1. IDENTIFIES NETWORK ID
                                      2. IDENTIFIES CLASS OF THE IP ADDRESS 
                                      3. ALL OF BITS  ARE 0: NOT ALLOWED 


2.HOST BITS:-
                             1. IDENTIFIES HOST ID
                             2.ALL  OF BITS ARE 0:RESERVED FOR NETWORK ADDRESS
                             3.ALL OF BITS ARE 1: RESERVED FOR BROADCAST ADDRES

HOST ID :-

1. ASSIGNED BY A NETWORK ADMINISTRATOR


2. IDENTIFIES  THE SPECIFIC DEVICE ON THAT NETWORK 

NETWORK ID :-

1. ASSIGNED BY INTERNET NETWORK INFORMATION CENTER

2.ASSIGNED BY UPPER ORGANIZATION


3. IDENTIFIES THE NETWORK TO WHICH A DEVICE IS ATTACHED



IP ADDRESS & SUBNETTING

IP ADDRESS-
                       1. NETWORK LAYER ADDRESS ARE 32  BITS LONG
                     
                        2.THE ARE PRESENTED AS FOUR OCTCTS IN DOTTED DECIMAL FORMAT
                          3.THE IP ADDRESS HAS TWO COMPONENTS  NETWORK ID AND HOST ID 
                          

Thursday, 3 September 2015

Class A-   1 To 126    ( 127 loop act adapter)
Class B-   128 To 191 (192 loop act adapter)
Class C-   193 To 223 
Class D- 225  To  255
LSB- LEAST SIGNIFICATION BIT




MSB-MOST SIGNIFICATION BIT




LOOP ACT ADAPTER-LAN CARD                                                                                TESTING
IP ADDRESS 2 TYPE
                             1.IPV4  (32 BIT)

                                                      2.IPV6    (128 BIT)
  

TYPE OF IP ADDRESS

IP ADDRESS-
                       1. NETWORK ADDRESS
 2.HOST ADDRESS


                         

Tuesday, 1 September 2015

3.PROXY SERVER

1.ISOLUTS INTERNAL NETWORK COMPUTERS FROM THE INTERNET


2.THE USER FIRST ACCESS THE INTERNET AND RETRIEVES THE REQUESTED WEB PAGE OR DOCUMENT THE USER THEN GETS A COPY OF THAT PAGE FROM THE PROXY SERVER

2 GATEWAY

1.CONNECT NETWORK WITH DIFFRENT PROTOCOL LIKE TCP/IP NETWORK AND IPX/SPX NETWORK


2.ROUTERS AND GATEWAYS OFTEN REFER TO THE SAME DEVICE

Monday, 24 August 2015

ADDITIONAL NETWORK HARDWARE DEVICES


*NETWORK INTERFACE CARD -
                                                       +PUTS  THE DATA INTO PACKETS TRANSMITS  PACKETA ON TO THE NETWORK

+MAY BE WIRED OR WIRELESS

ROUTER

*A DEVICE THAT CONNECTS ANY NUMBER OF LANS 


*USES STANDARDIZED PROTOCOL TO MOVE PACKET EFFICIENTLY TO  THEIR DESTINATION.


*MORE SOPHISTICATED THEN  BRIDGES CONNECTING NETWORK OF DIFFERENT TYPES (FOR EXAMPLE STAR AND  RING)


*FORWARDS DATA DEPENDING ON  THE  NETWORK ADDRESS (IP) NOT THE HARDWARE (MAC) ADDRESS



*ROUTERS ARE THE ONLY ONE OF THESE FOUR DEVICES THAT  WILL ALLOW YOU TO SHARE A SINGLE IP ADDRESS  AMONG MULTIPLE NETWORK


*RESIDES ON LAYER 3 OF THE OSI  MODEL 

`

REAPEATER

*USED TO BOOST THE SIGNAL BETWEEN TWO CABLE SEGMENTS OR WIRELESS ACCESS POINTS.


*CAN NOT CONNECT DIFFERENT NETWORK ARCHITECTURE.


*DOES NOT SIMPLY AMPLIFY THE SIGNAL IT REGENERATES THE PACKET AND RETIMES THEM.


*RESIDES ON LAYER 1 OF THE OSI MODEL

BRIDGE

*CONNECTS TWO LAN AND FORWARD FOTR FILTER DATA PACKETS BETWEEN THEM.



*CREATES AN EXTENTED NETWORK IN WHICH ANY  TWO WORKSTATIONS ON THE LINKED LAN CAN SHARE DATA.


*TRANSPORT TO PROTOCOL AND TO HIGHER LEVEL DEVICES LIKE RATES.


*FORWARD DATA DEPENDING ON THE HARDWARE (MAC) ADDRESS NOT THE NETWORK ADDRESS (IP)


*RESIDES ON A LAYER 2 THE OSI MODEL



SWITCH

*SPILT LARGE NETWORK INTO SMALL SEGMENTS DESCRASSING THE NUMBER OF USER SHARING THE SAME NETWORK RESOURCES AND BANDWIDTH


*UNDERSTANDS WHEN TWO DEVICES WANT TO TALK TO EACH OTHER ,AND GIVES THEM A SWITCH A CONNECTION


*HELP PREVENT DATA COLLISIONS AND REDUCE NETWORK CONGESTION IN CREASING NETWORK PERFORMANCE


*MOST HOME USER GET VERY  LITTLE IT ANY ALL VANTAGE FROM SWITCHES EVEN WHEN SHARING A BROADBAND CONNECTION 


*RESIDES ON A LAYER2 THE OSI MODEL 

Saturday, 22 August 2015

HUB

* an unintelligent network device that sends one signal to all of the stations connected to it

*all computer devices are competing for attention
because if takes the data that comes into a part and sends it out all the poot i hub

*traditionaly hubs are used for star topology network but they  are often used with other configuration to make it easy to add  and remove computers without bringing down the network

* hub work on layer 1 of the osi model

NETWORKING DEVICE

NETWORK HARDWARE- 
                                       1-HUB
                                       2-SWITCH
                                       3-BRIDGE
                                       4-REPEATER
                                       5-ROUTER

how to boot my pendrive for window


BROADCAST TRANSMISSION

BROADCAST TRANSMISSION- 
                                                           in broadcast transmission a simple data packet is copied and set to spacific (ALL) destination on the Network

BROADCAST PROCESS-
                                             1.the source address the packet with the broadcast address
                                              2.the packet is sent into the network 
                                              3.the network copies
the packet 
                                               4. the packet copies are delivered to all destination on the network

                                              

2.MULTICAST TRANSMISSION

In Multicast Transmission a single Data Packet is copied and send to specific destination the network
MULTICAST PROCESS-
                                            1.The Source Address The Packet Using Multicast Address
                                            2.The Packet is Sent into The Network
                                            3.The Network Copies The Packet 
                                            4.A Copy is Delivered To each destination That is include in the Multicast

1.Unicast Transmission Methods

Unicast Transmission a single Data Pocket is sent from a source to a single destination on the network
Unicast Process-
               $.The source addresses The Packet With The Destination address
               $.The Pocket is sect into the Network
              $. The Network Delivers the packet to The destination

LAN TRANSMISSION METHODS

1.Unicast Transmission
2.Multicast Transmission
3.Broadcast Transmission

FIBER OBTIC

SC-Subscriber connectr
ST-Strait Tips
Fiber Obtic Cables are The latest development in cabling Technology They Are Constructed From obtical Glasses.There is central glass filament calied the core and surrounding layers of cladding
buffer coating strengthening materials and outer jacket 
information is transmitted by wavelength  of light This is accomplishrd through devices that convent electrical signal into repiod pulses of either LED Laser Light Fiber obtic Cables After several advantage including 
1.High Bandwidth capacity (many gigabite per second)
2.Longer Distance Between Device (from 2 t0 over 60 km)
3. immunity to electromegnatic interferences
Fiber obtic Cables are widely Used in WAN for both Voice and Data communications. The primary barrier to their widespread use in LAN is the Cost of electronic

2.Shieled twisted Pair

STP cable is also Network is also used for data Network is orginess IBM to can N/w
it shielding arrowd greater tollvence for protection From EMI such as from florocence light picture and electric motor

TP(TWISTED PAIR CABLE)

(1).UNSHIELED TWISTED PAIR-
                                                          unsheild twisted pair cable use for LAN and telephone system  UTP cable are compose of four colour coded pair of copper condactr twisted arround each other and outer jacket provide protection and key the pair in aling ment UTP cable connect to device a pin modular connector told RJ45 plug all LAN protocol can oprate power UTP most model LAN device with RJ45 jacks

COAXIAL CABLE

A Coaxial Cable Consists of as single Copper Conductor as Layer of sheilding with a ground  wire can outor jacket coaxial cables are some times used for bus topologies but many LAN product cable connectvity 
The ethernet LAN protocol was originaslly developpod  oprate over coaxial cables 
10 BASED 5/THIKNET CABLE WAS THE ORGINAL ETHERNET CABLE ARE LONGER USE IN MODERN LAN.

10BASED2/THINET CABLE
WAS A A SMAILER DIAMETER THAN THICKNET REPLACED THICKNET IS NO LONGER RECCOMMED BUT IS STILL USEDIN SOME VERY SMALL CONNECT FOR COAXIAL CABLE BNC

Friday, 21 August 2015

MEDIA

MEDIA- 
               media is the medium to carry the information

Local Area network use four types of cables

TYPES OF CABLES-
1.Coaxial cable
2.Unsheiled twisted Pair (UTP)
3.Sheiled twisted Pair (STP)

4.Fiber optic

CABLING

CABLING-
                   LOCAl  AREA NETWORK CABLING-
                    The earlist LAN used coaxial cables.Over time the twisted pair cables used in telephone systems were improved  to carry higher frequencles and support LAN trraffic more recently .fiber obtic cables have emerged as a high speed cabling option 

TCP/IP & OSI LAYER


  1. TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).
TCP/IP MODEL -
                            The late gos the defense advance research project agency (DARPA)  origianally developed
transmisson control protocol/ int
ernet protocol 
internet connect various depence department computer network 
the internet and international wide area network 
uses tcp/ip to connect network accross the world 

Thursday, 20 August 2015

  1. ARPANET adopted TCP/IP on January 1, 1983, and from there researchers began to assemble the “network of networks” that became the modern Internet. The online world then took on a more recognizable form in 1990, when computer scientist Tim Berners-Lee invented the World Wide Web.Dec 18, 2013

LAYERS OF OSI MODEL


OSI MODEL


1.researced and developed by the ISO- (INTER ORANIZITION FOR STANDARDIZATIONS)
2.1977 establish a subcommit to develope a communition  architecture
3.1984 publish iso 7498 the open system interconnection osi reference model

THE OSI MODEL A FRAME WORK WITHIN WHICH NETWORKING STANDARDS CAN BE DEVELOPED IT PROVIDED VENDORS WITH A SET A STANDARDS THAT ENSURED GREATER COMPABILTIY
AND BETWEEN THE VARIOUS TYPES OF NETWORK TECHNOLOGIES THAT WERE PRODECER BY THE MANY COMPANIES AROUND THE WORLD  
    
Q-WHY A LAYERED MODEL ?
+reduce complexity
+ standardizes interfaces
+ facilitates modular engineering
+ensure interoperable technology 
+ accelerates evolation
+simplifies teachning and learning
 PROTOCOL-  
                      Protocol is a set of rules on agreement that determines the format and transmission of data that communation on a network more efficient

What is internet,interanet,extranet?

                         INTERNET
1.internet is a network of network a network to be called as internet any unknown external user or user or users are allowed to access the part of resources of the network.

2.when you want to expose information to everyone in the world then we use internet protocol such as HTTP,FTP,SMTP, it is a example of internet
                             INTRANET 
1.an intranet is a private N/w
2.it can be a collection of LAN ,MAN,&WAN
3.users access the resources from with in the oraganzition (locally)
4.if it within company's intranet the information
would not be access ible to person on the internet 
it is for private use only 
                            EXTRANET
1.extranet is a extended intranet 
2.some service are made available to known users or bussiness partner
3.they can access resource from outside the organization (remotely) like home or office
4.in intranet users access the resources from within the organization while in a extranet some known users are allowed to access the resources from the outsides network
5.if we have a web based application that allows selected outside bussness partners to review their accounts that  is called extranets

Wednesday, 19 August 2015

                         MESH TOPOLOGY
IN THIS TOPOLOGY EACH COMPUTER BY USING A SEPARATE CABLE SEGMENT THEN THE TRAFFIC CAN BE RE ROUTED THREW A DIFFRENT PATH WAY BECAUSE THERE ARE MULTIPLE PATH WAYS TO SEND DATA FROM ONE SYSTEM TO ANOTHER SYSTEM .THIS TOPOLOGY IS USED TO CONNECT VARIOUS SIDES IN A N/W TO ESTABLISH MULTIPLE LINKS AND USED WAN N/W