hos file (1)
-
Upload
yadwinder-singh -
Category
Documents
-
view
226 -
download
0
Transcript of hos file (1)
-
8/2/2019 hos file (1)
1/38
DEFINITIONS
HTTP
Hyper Text Transfer Protocol, the underlying protocol used by the World. HTTP
defines how messages are formatted and transmitted, and what actions Web
servers and browsers should take in response to various commands. For example,
when you enter a URL in your browser, this actually sends an HTTP command to
the Web server directing it to fetch and transmit the requested Web page.
The other main standard that controls how the World Wide Web works is HTML,
which covers how Web pages are formatted and displayed.
HTTP is called astatelessprotocol because each command is executed
independently, without any knowledge of the commands that came before it. This
is the main reason that it is difficult to implement Web sites that react intelligently
to user input. This shortcoming of HTTP is being addressed in a number of new
technologies, including ActiveX, Java, JavaScript and cookies.
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a combination ofHypertext
Transfer Protocol (HTTP) with SSL/TLS protocol. It provides encrypted
communication and secure identification of a networkweb server. HTTPSconnections are often used for payment transactions on the World Wide Web and
for sensitive transactions in corporate information systems.
HTTPS is a URI scheme which has identical syntax to the standard HTTP scheme,
aside from its scheme token. However, HTTPS signals the browser to use an added
encryption layer of SSL/TLS to protect the traffic. SSL is especially suited for
HTTP since it can provide some protection even if only one side of the
communication is authenticated.
FTP
File Transfer Protocol is a standard network protocol used to transfer files from
one host to another host over a TCP-based network, such as the Internet. It is often
used to upload web pages and other documents from a private development
http://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/B/browser.htmlhttp://www.webopedia.com/TERM/U/URL.htmlhttp://www.webopedia.com/TERM/W/web_page.htmlhttp://www.webopedia.com/TERM/H/HTML.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/W/web_site.htmlhttp://www.webopedia.com/TERM/A/ActiveX.htmlhttp://www.webopedia.com/TERM/J/Java.htmlhttp://www.webopedia.com/TERM/J/JavaScript.htmlhttp://www.webopedia.com/TERM/C/cookie.htmlhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/URI_schemehttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/URI_schemehttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://www.webopedia.com/TERM/C/cookie.htmlhttp://www.webopedia.com/TERM/J/JavaScript.htmlhttp://www.webopedia.com/TERM/J/Java.htmlhttp://www.webopedia.com/TERM/A/ActiveX.htmlhttp://www.webopedia.com/TERM/W/web_site.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/H/HTML.htmlhttp://www.webopedia.com/TERM/W/web_page.htmlhttp://www.webopedia.com/TERM/U/URL.htmlhttp://www.webopedia.com/TERM/B/browser.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.html -
8/2/2019 hos file (1)
2/38
machine to a public web-hosting server. FTP is built on a client-server architecture
and uses separate control and data connections between the client and the
server. FTP users may authenticate themselves using a clear-text sign-in protocol,
normally in the form of a username and password, but can connect anonymously if
the server is configured to allow it. For secure transmission that hides yourusername and password, as well as encrypts the content, you can try using a client
that uses SSH File Transfer Protocol.
SFTP
SFTP (Secure file transfer protocol) is part of the SSH protocol suite. SFTP is not
the same as FTP; SFTP is a modern, encrypted protocol and FTP is an old,
unencrypted protocol. We do not support FTP. SFTP uses SSH to transfer files.
Unlike standard FTP, it encrypts both commands and data, preventing passwords
and sensitive information from being transmitted in the clear over the network. It is
functionally similar to FTP, but because it uses a different protocol, you can't use a
standard FTP client to talk to an SFTP server, nor can you connect to an FTP
server with a client that supports only SFTP. You can use SFTP with a graphical
SFTP client or at the command line.
SSHSecure Shell (SSH) is a network protocol for secure data communication, remote
shell services or command execution and other secure network services between
two networked computers that it connects via a secure channel over an insecure
network: a server and a client (running SSH server and SSH client programs,
respectively). The protocol specification distinguishes two major versions that are
referred to as SSH-1 and SSH-2.
The best-known application of the protocol is for access to shell accounts on Unix-
like operating systems. It was designed as a replacement for Telnet andother insecure remote shell protocols such as the Berkeley rsh and rexec protocols,
which send information, notably passwords, in plaintext, rendering them
susceptible to interception and disclosure using packet analysis. The encryption
used by SSH is intended to provide confidentiality and integrity of data over an
unsecured network, such as the Internet.
http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Remote_Shellhttp://en.wikipedia.org/wiki/Remote_Process_Executionhttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Remote_Process_Executionhttp://en.wikipedia.org/wiki/Remote_Shellhttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/Network_protocol -
8/2/2019 hos file (1)
3/38
BOOTP
In computer networking, the Bootstrap Protocol, or BOOTP, is a network protocol
used by a network client to obtain an IP address from a configuration server. The
BOOTP protocol was originally defined in RFC 951.
BOOTP is usually used during the bootstrap process when a computer is starting
up. Its configuration server assigns an IP address to each client from a pool of
addresses. It uses the User Datagram Protocol (UDP) as a transport on IPv4
networks only.
Historically, BOOTP has also been used for Unix-like diskless workstations to
obtain the network location of their boot image in addition to an IP address, and
also by enterprises to roll out a pre-configured client (e.g., Windows) installation tonewly installed PCs.
Originally requiring the use of a boot floppy disk to establish the initial network
connection, manufacturers of network cards later embedded the protocol in the
BIOS of the interface cards as well as system boards with on-board network
adapters, thus allowing direct network booting.
POP
In computing, the Post Office Protocol is an application-layer Internet
standard protocol used by local e-mail clients to retrieve e-mail from a remote
server over a TCP/IP connection. POP and IMAP are the two most
prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-
mail clients and servers support both. The POP protocol has been developed
through several versions, with version 3 (POP3) being the current standard. Like
IMAP, POP3 is supported by most webmail services such
as Hotmail, Gmail and Yahoo! Mail.
SMTP
Simple Mail Transfer Protocol is an Internet standard for electronic mail
transmission across Internet Protocol networks. SMTP is specified for outgoing
mail transport and uses TCP port 25. The protocol for new submissions is
-
8/2/2019 hos file (1)
4/38
effectively the same as SMTP, but it uses port 587 instead. SMTP connections
secured by SSL are known by the shorthand SMTPS. While electronic mail
servers and other mail transfer agents use SMTP to send and receive mail
messages, user-level client mail applications typically only use SMTP for sending
messages to a mail server for relaying. For receiving messages, client applicationsusually use either the Post Office Protocol (POP) or the Internet Message Access
Protocol (IMAP) or a proprietary system (such as Microsoft Exchange orDomino)
to access their mail box accounts on a mail server.
MICROSOFT EXCHANGE SERVER
Microsoft Exchange Server is the server side of a client
server, collaborative application product developed by Microsoft. It is part of the
Microsoft Servers line of server products and is used by enterprises using
Microsoft infrastructure products. Exchange's major features consist of electronic
mail, calendaring, contacts and tasks; that work with Microsoft Outlook on PC and
Mac, wireless synchronization of email, calendar, contacts with major mobile
devices and browser-based access to information; and support for data storage.
ROUTING PROTOCOLS
A routing protocol is a protocol that specifies how routers communicate with each
other, disseminating information that enables them to select routes between any
two nodes on a computer network, the choice of the route being done by routing
algorithms. Each router has a prior knowledge only of networks attached to it
directly. A routing protocol shares this information first among immediate
neighbours, and then throughout the network. This way, routers gain knowledge of
the topology of the network. The term routing protocol may refer specifically to
one operating at layer three of the OSI model, which similarly disseminates
topology information between routers.
ROUTED PROTOCOLS
Routed Protocols are nothing more than data being transported across the
networks. Routed protocols include:
http://en.wikipedia.org/wiki/Protocol_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Protocol_(computing) -
8/2/2019 hos file (1)
5/38
Internet protocol Telnet Remote Procedure call SNMP SMTP Novell IPX Open Standards Institute Networking protocol DECnet Appletalk Xerox Network Systems.
REMOTE DESKTOP PROTOCOL
Remote Desktop Protocol is a proprietary protocol developed by Microsoft, which
provides a user with a graphical interface to another computer. Clients exist for
most versions ofMicrosoft Windows (including Windows
Mobile), Linux, Unix, Mac OS X, Android, and other modern operating systems.
By default the server listens on TCP port 3389.Microsoft currently refers to their
official RDP server software as Remote Desktop Services, formerly "Terminal
Services". Their official client software is currently referred to as Remote Desktop
Connection, formerly "Terminal Services Client".
IPV4
Internet Protocol version 4 is the fourth revision in the development of the Internet
Protocol and the first version of the protocol to be widely deployed. Together
with IPv6, it is at the core of standards-based internetworking methods of
the Internet. IPv4 is still by far the most widely deployed InternetLayer protocol.IPv4 is a connectionless protocol for use on packet-switched Link
Layer networks (e.g., Ethernet). It operates on a best effort delivery model, in that
it does not guarantee delivery, nor does it assure proper sequencing or avoidance of
duplicate delivery. These aspects, including data integrity, are addressed by
http://en.wikipedia.org/wiki/Proprietary_protocolhttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Linuxhttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Android_(operating_system)http://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Computer_port_(software)http://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Packet-switchedhttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Packet-switchedhttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Computer_port_(software)http://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Android_(operating_system)http://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Linuxhttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Proprietary_protocol -
8/2/2019 hos file (1)
6/38
an upper layer transport protocol, such as the Transmission Control
Protocol (TCP).
IPV6Internet Protocol version 6 is a version of the Internet Protocol (IP) intended to
succeed IPv4, which is the protocol currently used to direct almost
all Internet traffic. The Internet operates by transferring data between hosts
in packets that are routed across networks as specified by routing protocols. These
packets require an addressing scheme, such as IPv4 or IPv6, to specify their source
and destination addresses. Each host, computer or other device on the Internet
requires an IP address in order to communicate. The growth of the Internet has
created a need for more addresses than are possible with IMAC Address
A Media Access Control address is a unique identifier assigned to network
interfaces for communications on the physical network segment. MAC addresses
are used for numerous network technologies and most IEEE 802 network
technologies, including Ethernet. Logically, MAC addresses are used in the Media
Access Control protocol sub-layer of the OSI reference model.MAC addresses are
most often assigned by the manufacturer of a network interface card and are stored
in its hardware, the card's read-only memory, or some other firmware mechanism.
If assigned by the manufacturer, a MAC address usually encodes the
manufacturer's registered identification number and may be referred to as
the burned-in address. It may also be known as an Ethernet hardware
address, hardware address or physical address. A network node may have multiple
NICs and will then have one unique MAC address per NIC.
SUBNET MASKA mask used to determine what subnet an IP address belongs to. An IP address has
two components, the network address and the host address. Subnetting enables the
network administrator to further divide the host part of the address into two or
more subnets. In this case, a part of the host address is reserved to identify the
particular subnet. This is easier to see if we show the IP address in binary format.
http://en.wikipedia.org/wiki/Upper_layer_protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPv4http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Packet_(information_technology)http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/OSI_reference_modelhttp://en.wikipedia.org/wiki/Network_nodehttp://en.wikipedia.org/wiki/Network_nodehttp://en.wikipedia.org/wiki/OSI_reference_modelhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Packet_(information_technology)http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IPv4http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Upper_layer_protocol -
8/2/2019 hos file (1)
7/38
GATEWAY
A gateway is a network point that acts as an entrance to another network. On
the Internet, a node or stopping point node or a host node. Both the computers ofInternet users and the computers that serve pages to users are host nodes, while the
nodes that connect the networks in between are gateways. For example, the
computers that control traffic between company networks or the computers used
by internet service providers to connect users to the internet are gateway nodes. In
the network for an enterprise, a computer server acting as a gateway node is often
also acting as a proxy server and a firewall server. A gateway is often associated
with both a router, which knows where to direct a given packet of data that arrives
at the gateway, and a switch, which furnishes the actual path in and out of the
gateway for a given packet.
BRIDGE
In telecommunication network, a bridge is a product that connects a local area
network to another local area network that uses the same protocol. You can
envision a bridge as being a device that decides whether a message from you to
someone else is going to the local area network in your building or to someone on
the local area network in the building across the street. A bridge examines each
message on a LAN, "passing" those known to be within the same LAN, and
forwarding those known to be on the other interconnected LAN. In bridging
networks, computer or node addresses have no specific relationship to location. For
this reason, messages are sent out to every address on the network and accepted
only by the intended destination node. Bridges learn which addresses are on which
network and develop a learning table so that subsequent messages can be
forwarded to the right network.
ROUTER
A router is a device that forwards data packets between computer networks,
creating an overlay internetwork. A router is connected to two or more data lines
from different networks. When a data packet comes in on one of the lines, the
http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_network -
8/2/2019 hos file (1)
8/38
router reads the address information in the packet to determine its ultimate
destination. Then, using information in its routing table or routing policy, it directs
the packet to the next network on its journey. Routers perform the "traffic
directing" functions on the Internet. A data packet is typically forwarded from one
router to another through the networks that constitute the internetwork until it getsto its destination node. The most familiar type of routers are home and small office
routers that simply pass data, such as web pages and email, between the home
computers and the owner's cable or DSL modem, which connects to the Internet
through an ISP.
SWITCH
A network switch or switching hub is a computer networking device thatconnects network segments or network devices. The term commonly refers to a
multi-port network bridge that processes and routes data at the data link
layer (layer 2) of the OSI model. Switches that additionally process data at the
network layer (layer 3) and above are often referred to as layer-3
switches or multilayer switches. The first Ethernet switch was introduced
by Kalpana in 1990
ETHERNET
Ethernet is a family ofcomputer networking technologies for local area
networks (LANs) commercially introduced in 1980. Standardized in IEEE 802.3,
Ethernet has largely replaced competing wired LAN technologies. Systems
communicating over Ethernet divide a stream of data into individual packets
called frames. Each frame contains source and destination addresses and error-
checking data so that damaged data can be detected and re-transmitted.
DHCP
The Dynamic Host Configuration Protocol is a network configuration protocol for
hosts on Internet Protocol networks. Computers that are connected to IP networks
must be configured before they can communicate with other hosts. The most
essential information needed is an IP address, and a default route and routing
http://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Cable_modemhttp://en.wikipedia.org/wiki/DSL_modemhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_devicehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Kalpana_(company)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Frame_(networking)http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Frame_(networking)http://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Kalpana_(company)http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/DSL_modemhttp://en.wikipedia.org/wiki/Cable_modemhttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_table -
8/2/2019 hos file (1)
9/38
prefix. DHCP eliminates the manual task by a network administrator. It also
provides a central database of devices that are connected to the network and
eliminates duplicate resource assignments. In addition to IP addresses, DHCP also
provides other configuration information, particularly the IP addresses of
local Domain Name Server, network boot servers, or other service hosts.
TCP/IP Protocol
TCP/IP is the communication protocol for the internet. TCP/IP defines the rule
computers must follow to communicate with each other over the internet. TCP/IP
(Transmission Control Protocol/Internet Protocol) is the basic communication
language or protocol of the Internet. It can also be used as a communications
protocol in a private network (either an intranet or an extranet). When you are setup with direct access to the Internet, your computer is provided with a copy of the
TCP/IP program just as every other computer that you may send messages to or get
information from also has a copy of TCP/IP.
IPX/SPX
IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange.
IPX and SPX are networking protocols used primarily on networks usingthe Novell NetWare operating systems. IPX and SPX are derived from Xerox
Network Systems' IDP and SPP protocols, respectively. IPX is a network
layer protocol (layer 3 of the OSI Model), while SPX is a transport layer protocol
(layer 4 of the OSI Model). The SPX layer sits on top of the IPX layer and
provides connection-oriented services between two nodes on the network. SPX is
used primarily by client/server applications.
IPX and SPX both provide connection services similar to TCP/IP, with the IPX
protocol having similarities to IP, and SPX having similarities to TCP. IPX/SPX
was primarily designed for local area networks (LANs).
http://en.wikipedia.org/wiki/Xerox_Network_Systemshttp://en.wikipedia.org/wiki/Xerox_Network_Systemshttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/OSI_Modelhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/Client/serverhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/Client/serverhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/OSI_Modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Xerox_Network_Systemshttp://en.wikipedia.org/wiki/Xerox_Network_Systems -
8/2/2019 hos file (1)
10/38
WINS
Windows Internet Name Services Microsoft' implementation of NetBIOS Name
Service, a name server and service for NetBIOS computer names. Effectively
WINS is to NetBIOS names what DNS is to domain namesa central mapping
of host names to network addresses. Like DNS it is broken into two parts, a Server
Service and a TCP/IP Client component which manages the client's registration
and renewal of names, and takes care of queries.
TCP/IP Model
The TCP/IP model is a descriptive framework for computer network
protocols created in the 1970s by DARPA, an agency of the United States
Department of Defense. The name derives from the two most important protocolsof the networking protocol suite, the Transmission Control Protocol (TCP) and
the Internet Protocol (IP). The model evolved from the operational principles of
the ARPANET, which was an early wide area network and a predecessor of
the Internet. The TCP/IP model is formalized in the Internet protocol suite and is
sometimes called the Internet model or the DoD model.
The TCP/IP model describes a set of general design guidelines and
implementations of specific networking protocols to enable computers to
communicate over a network. TCP/IP provides end-to-end connectivity specifying
how data should be formatted, addressed, transmitted, routed and received at the
destination. Protocols exist for a variety of different types of communication
services between computers.
OSI
The Open Systems Interconnection model is a product of the Open Systems
Interconnection effort at the International Organization for Standardization. It is aprescription of characterizing and standardizing the functions of a communications
system in terms ofabstraction layers. Similar communication functions are
grouped into logical layers. A layer serves the layer above it and is served by the
layer below it. For example, a layer that provides error-free communications across
a network provides the path needed by applications above it, while it calls the next
http://en.wikipedia.org/wiki/Open_Systems_Interconnectionhttp://en.wikipedia.org/wiki/Open_Systems_Interconnectionhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/Abstraction_layerhttp://en.wikipedia.org/wiki/Abstraction_layerhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/Open_Systems_Interconnectionhttp://en.wikipedia.org/wiki/Open_Systems_Interconnection -
8/2/2019 hos file (1)
11/38
lower layer to send and receive packets that make up the contents of that path. Two
instances at one layer are connected by a horizontal connection on that layer.
ODBCIn computing, ODBC is a standard C programming language interface for
accessing database management systems . The designers of ODBC aimed to make
it independent of database systems and operating systems. An application can use
ODBC to query data from a DBMS, regardless of the operating system or DBMS it
uses. ODBC accomplishes DBMS independence by using an ODBC driver as a
translation layer between the application and the DBMS. The application uses
ODBC functions through an ODBC driver manager with which it is linked, and the
driver passes the query to the DBMS.
ADODB
ADODB is a database abstraction library for PHP and Python based on the same
concept as Microsoft's ActiveX Data Objects. It allows developers to write
applications in a fairly consistent way regardless of the underlying database system
storing the information. The advantage is that the database system can be changed
without re-writing every call to it in the application.
JDBC
JDBC is a Java-based data access technology from Sun Microsystems, Inc.. It is
not an acronym as it is unofficially referred to as Java Database Connectivity. This
technology is an API for the Java programming language that defines how a client
may access a database. It provides methods for querying and updating data in a
database. JDBC is oriented towards relational databases. A JDBC-to-ODBC bridge
enables connections to any ODBC-accessible data source in the JVM host
environment.
SQL
SQL stands for Structured Query Language. SQL lets you access and manipulate
databases. SQL is an ANSI (American National Standards Institute) standard.SQL
http://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/C_(programming_language)http://en.wikipedia.org/wiki/Database_management_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Database_management_systemhttp://en.wikipedia.org/wiki/C_(programming_language)http://en.wikipedia.org/wiki/Computing -
8/2/2019 hos file (1)
12/38
can execute queries against a database. SQL can retrieve data from a database.
SQL can insert records in a database. SQL can update records in a database. SQL
can delete records from a database. SQL can create new databases. SQL can create
new tables in a database. SQL can create stored procedures in a database. SQL can
create views in a database. SQL can set permissions on tables, procedures, andviews.
LAN
A local area network is a computer networkthat interconnects computers in a
limited area such as a home, school, computer laboratory, or office building. The
defining characteristics of LANs, in contrast to wide area networks, include their
usually higher data-transfer rates, smaller geographic area, and lack of a needfor leased telecommunication lines. ARCNET, Token Ring and other technology
standards have been used in the past, but Ethernet over twisted pair cabling,
and Wi-Fi are the two most common technologies currently used to build LANs.
WLAN
A wireless local area network links two or more devices using some wireless
distribution method, and usually providing a connection through an access point to
the wider internet. This gives users the mobility to move around within a local
coverage area and still be connected to the network. Most modern WLANs are
based on IEEE 802.11 standards, marketed under the Wi-Fi brand name. Wireless
LANs have become popular in the home due to ease of installation, and in
commercial complexes offering wireless access to their customers, often for free.
VLAN
A virtual local area network, virtual LAN or VLAN, is a group of hosts with a
common set of requirements, which communicate as if they were attached to the
same broadcast domain, regardless of their physical location. A VLAN has the
same attributes as a physical local area network, but it allows for end stations to be
grouped together even if they are not located on the same network switch. VLAN
membership can be configured through software instead of physically relocating
http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Leased_linehttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Token_Ringhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Broadcast_domainhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Broadcast_domainhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_Ringhttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Leased_linehttp://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Computer_network -
8/2/2019 hos file (1)
13/38
devices or connections. To physically replicate the functions of a VLAN, it would
be necessary to install a separate, parallel collection of network cables and
equipment which are kept separate from the primary network. However, unlike a
physically separate network, VLANs must share bandwidth; two separate one-
gigabit VLANs using a single one-gigabit interconnection can suffer both reducedthroughput and congestion.
EMAIL SPOOFING
Email spoofing is email activity in which the sender address and other parts of the
email header are altered to appear as though the email originated from a different
source. Because core SMTP doesn't provide any authentication, it is easy to
impersonate and forge emails. Although there are legitimate uses, these techniquesare also commonly used in spam and phishing emails to hide the origin of the
email message.
By changing certain properties of the email, such as the From, Return-
Path and Reply-To fields, ill-intentioned users can make the email appear to be
from someone other than the actual sender. The result is that, although the email
appears to come from the address indicated in the from field, it actually comes
from another source.
PHISHING
Phishing is a way of attempting to acquire information such as
usernames, passwords, and credit card details by masquerading as a trustworthy
entity in an electronic communication. Communications purporting to be from
popular social web sites, auction sites, online payment processors or IT
administrators are commonly used to lure the unsuspecting public. Phishing is
typically carried out by e-mail spoofing or instant messaging, and it often directs
users to enter details at a fake website whose look and feel are almost identical to
the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and
exploits the poor usability of current web security technologies. Attempts to deal
http://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Email_spamhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Email_spamhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Email -
8/2/2019 hos file (1)
14/38
with the growing number of reported phishing incidents include legislation, user
training, public awareness, and technical security measures.
NTFSNew Technology File System is the standard file system ofWindows NT,
including Windows 2000, Windows XP, and all their successors to date. NTFS
supersedes the FAT file system as the preferred file system for
Microsofts Windows operating systems. NTFS has several improvements over
FAT and High Performance File System, such as improved support for metadata,
and the use of advanced data structures to improve performance, reliability, and
disk space utilization, plus additional extensions, such as security access control
lists and file system journaling.
FAT 8
Designed and coded by Marc McDonald, Microsoft Stand-alone Disk
BASIC introduced the FAT in 1977 with 8-bit table elements, produced for NCR's
8-bit 8080file system. The FAT, born during one of a series of discussions between
McDonald and Bill Gates, was used in a stand-alone version of Microsoft BASIC
for the 8086 chip in 1979 and eventually in the M-DOS operating system. The
Microsoft Disk BASIC version supported three FATs.
FAT 16
In 1984, IBM released the PC AT, which featured a 20 MB hard disk. Microsoft
introduced MS-DOS 3.0 in parallel. Cluster addresses were increased to 16-bit,
allowing for up to 65,524 clusters per volume, and consequently much greater file
system sizes, at least in theory. However, the maximum possible number of sectors
and the maximum (partition, rather than disk) size of 32 MB did not change.
Therefore, although cluster addresses were 16 bits, this format was not what today
is commonly understood as FAT16.
With the initial implementation of FAT16 not actually providing for larger
partition sizes than FAT12, the early benefit of FAT16 was to enable the use of
http://en.wikipedia.org/wiki/File_systemhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Windows_2000http://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/File_Allocation_Tablehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/High_Performance_File_Systemhttp://en.wikipedia.org/wiki/Metadata_(computing)http://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Metadata_(computing)http://en.wikipedia.org/wiki/High_Performance_File_Systemhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/File_Allocation_Tablehttp://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/Windows_2000http://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/File_system -
8/2/2019 hos file (1)
15/38
smaller clusters, making disk usage more efficient, particularly for files several
hundred bytes in size, which were far more common at the time.
FAT 32In order to overcome the size limit of FAT16, while at the same time allowing
DOS real mode code to handle the format, and without reducing
available conventional memory unnecessarily, Microsoft expanded the cluster size
yet again, calling the new revision FAT32.
Cluster values are represented by 32-bit numbers, of which 28 bits are used to
hold the cluster number. The boot sector uses a 32-bit field for the sector count,
limiting the FAT32 volume size to 2 TB for sector size of 512 bytes and 16 TB for
sector size of 4,096 bytes.
FAT32 was introduced with MS-DOS 7.1 / Windows 95 OSR2 in 1996, although
reformatting was needed to use it, and DriveSpace 3 (the version that came with
Windows 95 OSR2 and Windows 98) never supported it. Windows 98 introduced a
utility to convert existing hard disks from FAT16 to FAT32 without loss of data. In
the Windows NT line, native support for FAT32 arrived in Windows 2000.
INTERNAL VS EXTERNAL MODEM
A modem that resides in a self-contained box outside the computer system .
Contrast with an internal modem, which resides on a printed circuit board inserted
into the computer.
External modems tend to be slightly more expensive than internal modems. Many
experts consider them superior because they contain lights that indicate how the
modem is functioning. In addition, they can easily be moved from one computer to
another. However, they do use up one COM port.
http://www.webopedia.com/TERM/I/internal_modem.htmlhttp://www.webopedia.com/TERM/I/internal_modem.html -
8/2/2019 hos file (1)
16/38
WHAT ARE THE STEPS OF JOINING A DOMAIN WITHTHE WORKSTATION?
Steps To join a domain:
These instructions assume you have a local administrator account on the
workstation, you must create one or have the existing user of the machine create
one for you.
You should not use the same administrator account and password for every single
workstation in the faculty; however it is advised that you use a common
administrator password for groups of local machines i.e. for a single laboratory or a
group of related staff machines. This will enable administration of these sets of
machines to be delegated to appropriate IT staff without giving them administrator
access to all of the machines in the faculty and in the event of a compromise limit
the impact this has overall.
1. Log onto the workstation with a local administrator account, select the logon to
workstation only option if the novell netware client is installed.
2. Right click My Computer and select properties.
-
8/2/2019 hos file (1)
17/38
3. Select change to rename the computer or join the domain.
4. Change the computer name (the name should conform to the clip4 naming
convention),goto step 7 if already done.
-
8/2/2019 hos file (1)
18/38
5. Allow the changes to come into effect, by clicking ok in the following dialoguebox.
6. Restart the workstation by clicking yes.
7. Repeat steps 1 to 3, Select Member of a Domain, and enter the domain name i.e.
ds.man.ac.uk.
In the subsequent box enter the name of an authorised faculty/school support staff
member or other network account to join this computer to the domain.
-
8/2/2019 hos file (1)
19/38
8. When the account has successfully validated and the computer has been added,
you will see the Domain Welcome message.
9. Allow the changes to come into effect, by clicking ok in the following dialogue
box.
10. Restart the workstation by clicking yes.
-
8/2/2019 hos file (1)
20/38
WHAT IS IP ADRESS? EXPLAIN ALONG WITH ITSCLASSES.
An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses theInternet Protocol for communication. An IP address serves two principal functions:
host or network interface identification and location addressing. Its role has been
characterized as follows: "A name indicates what we seek. An address indicates
where it is. A route indicates how to get there."
The designers of the Internet Protocol defined an IP address as a 32-bit number and
this system, known as Internet Protocol Version 4 (IPv4), is still in use today.
However, due to the enormous growth of the Internet and the predicted depletion
of available addresses, a new addressing system (IPv6), using 128 bits for theaddress, was developed in 1995, standardized as RFC 2460 in 1998, and
its deployment has been ongoing since the mid-2000s.
IP addresses are binary numbers, but they are usually stored in text files and
displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and
2001:db8:0:1234:0:567:8:1 (for IPv6).
The Internet Assigned Numbers Authority (IANA) manages the IP address space
allocations globally and delegates five regional Internet registries (RIRs) to
allocate IP address blocks to local Internet registries (Internet service providers)
and other entities.
Classes Of Internet Protocol Addresses..
Class A - large organizations , governments Class B - medium sized organizations Class C - small organizations Class D - Multicasting Class E - Research
-
8/2/2019 hos file (1)
21/38
Class1
st
OctetDecimal
Range
1st
Octet
High
Order
Bits
Network/Host
ID
(N=Network,
H=Host)
Default
Subnet Mask
Numberof
Networks
Hosts per
Network
(Usable
Addresses)
A 1126* 0 N.H.H.H 255.0.0.0126 (2
7
2)
16,777,214
(224
2)
B128
191
10 N.N.H.H 255.255.0.016,382
(2
14
2)
65,534
(2
16
2)
C192
223110 N.N.N.H 255.255.255.0
2,097,150
(221
2)254 (2
82)
D224
2391110 Reserved for Multicasting
E240
254
1111 Experimental; used for research
Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is
reserved for loopback and diagnostic functions.
Private IP Addresses
Class Private Networks Subnet Mask Address Range
A 10.0.0.0 255.0.0.0 10.0.0.0 - 10.255.255.255
B 172.16.0.0 - 172.31.0.0 255.240.0.0 172.16.0.0 - 172.31.255.255
C 192.168.0.0 255.255.0.0 192.168.0.0 - 192.168.255.255
-
8/2/2019 hos file (1)
22/38
WHAT ARE THE STEPS TO INSTALL NT SERVER? Phase 0: Command line Installation Phase 1: Gathering Information Phase 2: Installing Network components Phase 3: Finishing Setup
PHASE 0:Command Line Installation
Step 1: System will Load the necessary files at the startup of setup:
Step 2: Setup will be started
-
8/2/2019 hos file (1)
23/38
Step 3: Setup will ask for any Additional device
Step 4: Setup will show the End User License Agreement
-
8/2/2019 hos file (1)
24/38
Step 5: Press F8 to accept the license agreement
Step 6: To create the Partition press C and create the partition
Step 7: choose MB to give the space to on of the disk
-
8/2/2019 hos file (1)
25/38
Step 8: choose the file system to format the disk
-
8/2/2019 hos file (1)
26/38
Step 9: After that formatting will start in few seconds
Step 10: Specify the root folder
-
8/2/2019 hos file (1)
27/38
Step 11: After this setup will copy the necessary files and reboot the system
PHASE 1: Gathering Information
Step 1: Give name and Organization to work further
-
8/2/2019 hos file (1)
28/38
Step 2: After that it will ask for the product key or registration key
Step 3: After that give the license mode either per seat or per server
-
8/2/2019 hos file (1)
29/38
Step 4: It will ask for the name of computer
Step 5: It will show the server type we have to select the one
-
8/2/2019 hos file (1)
30/38
Phase 2: Installing Components
Step 1: Show the connection type
-
8/2/2019 hos file (1)
31/38
Step 2: Network Protocols
Step 3: Installing various protocols
-
8/2/2019 hos file (1)
32/38
PHASE 3: Finishing Setup
-
8/2/2019 hos file (1)
33/38
Login and see the welcome screen
-
8/2/2019 hos file (1)
34/38
Steps to Create User
Step 1: click on start after that click on programs Step 2: After that click on administrative tools and user manager for
domain Step 3: User Manager Screen will open Step 4: Click on User and New user Step 5: Click on Add so that the user will be added to provide policies
Click on Groups to add the user to a group
Step 6: To provide the time, click on HoursSteps to Create Group
Step 1: click on start after that click on programs Step 2: After that click on administrative tools and user manager for
domain
Step 3: User Manager Screen will open Click on New Local Group Step 4: click on Add to add this group to an existing group
-
8/2/2019 hos file (1)
35/38
DIFFERENCE BETWEEN WINDOW XP AND WINDOW 7?The following are the some differences between Window XP and Window 7:
1. One of the major differences between both the operating system is UserAccess Control. Where Windows XP doesn't have any UAC on other side
Windows 7 enables the UAC feature which was introduced in Windows
Vista.
2. Windows 7 supports DirectX 11 where Windows XP supports Directx 9.
3. One major difference is regarding the graphics, where Windows XP lacksthem on other hand Windows 7 is known for its visual appearance.
4. There is a difference in speed of both the operating system where Windows7 boots quicker than Windows XP
5. Networking features like Direct access and VPN reconnect which were notavailable in Windows XP but are introduced in Windows 7 also adds a pointto this list of differences between Windows XP and Windows 7.
-
8/2/2019 hos file (1)
36/38
DIFFERENTIATE BETWEEN DOMAIN AND WORKGROUP?S.N Domain Workgroup
1. A domain is a logical grouping of
one or more computers that allow
them to be managed as a single unit.
A workgroup is a collection of
computers which are logically grouped
together for a common purpose.
2. Centralized administration. Decentralized administration.
3. Complex and difficult to install. Simple and easy to install.
4. Costly and difficult to setup. Cheap and easy to setup.
5. All the computers in the domain has
same account database i.e. directory
database.
Each computer has its own accounts
database.
6. Every computer in it has same
security policy.
Each computer has its own security
policy.
7. When you log on to machine in adomain, you are logging on to the
server machine.
When you logon to a machine in aworkgroup, you are logging onto that
specific machine.
8. Only windows NT server machine
supports domain.
Both windows 95 and NT workstations
support workgroups.
9. Suitable for large organizations. Suitable for small organizations.
10. Logon process is somewhat more
complicated for a domain because
logon information must pass to the
domain controller and back again.
Logon process is easy as compared to
domain.
-
8/2/2019 hos file (1)
37/38
11. Structure of domain:- Structure of workgroup:-
12. Unauthorized users cannot gain
access, as there are no lope holes inthe systems.
Unauthorized users could gain access
as there are number of loop holespresent.
13. Login Procedure in domain: - Login Procedure in workgroup: -
14. Single user logon provides network-
wide resource access.
This thing is not their in it.
-
8/2/2019 hos file (1)
38/38
15. Efficient for networks that have
many computers.
Inefficient for networks that have many
computers.
16. Microsoft recommends that a
workgroup consist of more than 100computers.
Microsoft recommends that a
workgroup consist of less than 10computers.