Network Thesis

10
What are the types of LAN cables used? What is a cross cable? Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed. Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate. 2) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable? The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable. The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal. 7) What is IPCONFIG command? Why it is used? IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer. 11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express? PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.\ 12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers. 13) What is RIS? What is Imaging/ghosting? RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD

description

Contains descriptions, definitions and major topics related to computer and internet networks ...

Transcript of Network Thesis

What are the types of LAN cables used? What is a cross cable?Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate. 2) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable.The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.

7) What is IPCONFIG command? Why it is used?IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.\

12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.

13) What is RIS? What is Imaging/ghosting?RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.

Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?Update the network card driver.

What is the difference between a switch and a hub?Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.What is NIC?A network card, network adapter or NIC (network interface controller) is a piece of computer hardware designed to allow computers to communicate over a computer networkWhat is VPN and how to configure it?How to create a new VPN connection1. ClickStart, clickControl Panel, clickNetwork and Internet Connections, and then clickNetwork Connections.2. ClickCreate a new connection, and then clickNext.3. ClickConnect to the network at my workplace, and then clickNext.4. ClickVirtual Private Network connection, and then clickNext.5. Type a descriptive name for your company, and then clickNext.6. ClickDo not dial the initial connection, and then clickNext.7. Type the host name or IP address of the computer where you are connecting, and then clickNext.8. Use one of the following methods: ClickAnyone's useif you want to share the connection with all users. ClickMy use onlyif you do not want to share the connection.9. ClickNext, and then clickFinish.NoteThis method works when you are connected to the Internet only.How to modify an existing dial-up connectionYou may have to modify some of the parameters in your dial-up connection to successfully connect to the Internet. To make these modifications, follow these steps:1. To open an existing connection, clickStart, clickControl Panel, clickNetwork and Internet Connections, and then clickNetwork Connections.2. Click the connection, and then clickChange settings of this connection. On theGeneraltab, you can change the server name or IP address. On theNetworkingtab, you can change the type of secure protocol. On theAdvancedtab, you can enable Internet Connection Firewall protection to prevent access to your computer from the Internet.

To do this, select theProtect my computer and network by limiting and preventing access to this computer from the Internetcheck box.

NoteWhen you enable Internet Connection Firewall protection to prevent access to your computer from the Internet, you may also create problems with the connection to your server. After you enable Internet Connection Firewall protection, verify that the connection to your server is still working.

A firewall is designed to help protect your computer from attack by malicious users or by malicious software such as viruses that use unsolicited incoming network traffic to attack your computer. If the connection to your server is working and you decide to disable your firewall, you must disconnect your computer from all networks including the Internet.

What is NIC?A network card, network adapter or NIC (network interface controller) is a piece of computer hardware designed to allow computers to communicate over a computer networkLAN and WANA local area network is a computer network covering a small geographic area, like a home, office, or group of buildingsWide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links

Explain hidden shares. How do they work?idden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list.

What is MAC address?It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the network adapter card and it is unique.

How we will configure ADS?Start ==> RUN ==> DCPROMO

What are the difference between DOMAIN and WORKGROUP?Workgroup:-(i)Every PC is responsible for its security own.(ii)No centralize administration(iii)Main aim to save hardware recourse(iv)Best suite in school, training institute, cyber cafDomain: -(i)Server is responsible for data safety.(ii)Centralize administration(iii)Main aim is to secure data(iv)Best suite in company environments

What is map drive?A special feature that will map network resource to my computer.

What is the full form of Internet?International Networking

Which are the bootable files of 98 and XP ?In windows98 it is command.comIn XP it is NTLDR

What is full form of C.M.O.S ?Complementary metal oxide semiconductor

What is TCP/IP?It is combination of two protocols TCP and IP. It is used for reliable data transfer.

What are the difference between hub and switch?Hubis a layer 1 device. It will out the signal from all of its port except the one from where its insert. It is unable to detect the collision. It works on single collision and single broadcast domain.Switchis layer 2 device. It maintains a CAM table that store the MAC address of devices attached on its port. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain.

Which cable is used in LAN?Generally coaxial and TP media is used in LAN networking.

What are Difference between STP and UTP?STP cableis mostly used by IBM; it has an extra cover over each pair.UTP cableis used in star topology. It has a single cover over all pair.Full form of ping.PING stand forPacket Internet Grouper

What is anonymous FTP and why would you use it?Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.

When were OSI model developed and why its standard called 802.XX and so on?OSI model was developed in February1980 that why these also known as 802.XX Standard (Notice 80 means ==> 1980, 2means ==> February)

Where do we use cross and standard cable?Computer to computer ==> crossSwitch/hub to switch/hub ==>crossComputer to switch/hub ==>standard

How many pins do serial ports have?In computer it's known as com port and could be available in 9pin or 25 pin. On router it have 60 pins.

How will check ip address on 98?Start ==> Run ==> command ==> winipcfg

What is private IP?Three ranges of IP addresses have been reserved for private address and they are not valid for use on the Internet. If you want to access internet with these address you must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP address range, you can use IP addresses from any of the following classes:Class A 10.0.0.0 10.255.255.255Class B 172.16.0.0 172.31.255.255Class C 192.168.0.0 192.168.255.255

What is public IP address?A public IP address is an address leased from an ISP that allows or enables direct Internet communication

What are the differences between static ip addressing and dynamic ip addressing?With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic addressing, the IP address can change periodically and is managed by a centralized network service

What do you need to do that your browser will point URL www.example.com to the internal IP address 127.99.11.01?Make changes in the hosts file in C:\WINDOWS\system32\drivers\etcThe Hosts file is looked at first before going out to the DNS (Domain Name Service) servers. you have to put the following on new lines at the end of hosts file:127.99.11.01 example.com127.99.11.01 www.example.com

How will you add a client to server? /Hows the client join a domain?What are the client configurations?On ServerConfigure ADS (for example its configured with xyz.com)On ClientLog in form local administrator accountMy Computer ==> Properties ==> Computer Name ==> Change==>Domain ==>xyz.com ==> username Administrator (of xyz.com)Password xxxxxxxxxxx (of admin of xyz.com)Welcome to xyz.com ==> Restart the computer

ISO stand for?International standard organization

OSI stand for?Open System Interconnection

How many types of topology are available?Apoint-to-point topologyhas a single connection between two devices.In astar topology,a central device has many point-to-point connections to other devices.Abus topologyuses a single connection or wire to connect all devices.In aring topology,device one connects to device two, device two connects to device three, and so on to the last device, which connects back to device one.

How will you remove this error ntldr missing press any key to reboot the system ?Reboot the system with XP, ( apply also on server2003,) cdOn setup screen press to R to repair the windowNow provide the administrator passwordC:\>cd f:( your cd drive latter, f is taken as the example )f:\>cd i386f:\>copy ntldr c:\f:\>exitreboot the system

Why do we do networking?For data sharingTo accumulate hardware resource

What are the benefits of networking?There are lots of advantages from build up a network, but the three big facts are-File SharingFrom sharing files you can view, modify, and copy files stored on a different computer on the network just as easily as if they were stored on your computer.Resource SharingResources such as printers, fax machines, Storage Devices (HDD, FDD and CD Drives), Webcam, Scanners, Modem and many more devices can be shared.Program SharingJust as you can share files on a network, you can often also share program on a network. For example, if you have the right type of software license, you can have a shared copy of Microsoft Office, or some other program, and keep it on the network server, from where it is also run

What is network?A network is basically all of the components (hardware and software) involved in connecting computers across small and large distances.

What is networking?A process that is describes how the network will connect.

What is topology?A topology defines how the devices are connected. Further it is divided in physical and logical topology.

What are the differences between FAT and NTFS ?FATDoesn't provide local security Provide local securityDoesn't provide disk quota Provide disk quotaDoesn't provide file compression Provide file compressionDoesn't provide other security feature Provide other security feature

What's the major difference between FAT and NTFS on a local machine?FAT and FAT32 provide no security over locally logged-on users. Only native NTFS provides extensive permission control on both remote and local files.

What is MAC address ?The address for a device as it is identified at theMedia Access Control (MAC)layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique

What is RAID?A method for providing fault tolerance by using multiple hard disk drives.

Describe Various Network TypeLocal Area NetworksLocal area networks (LANs) are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment.Wide Area NetworksWide area networks (WANs) are used to connect LANs together. Typically, WANs are used when the LANs that must be connected are separated by a large distance.Metropolitan Area NetworksA metropolitan area network (MAN) is a hybrid between a LAN and a WAN.Content Networks Content networks(CNs) were developed to ease users access to Internet resources. Companies deploy basically two types of CNs:1.Caching downloaded Internet information2.Distributing Internet traffic loads across multiple serversStorage Area NetworksStorage area networks (SANs) provide a high-speed infrastructure to move data between storage devices and file servers.AdvantagePerformance is fast.Availability is high because of the redundancy features available.Distances can span up to 10 kilometers.Management is easy because of the centralization of data resources.Overhead is low (uses a thin protocol).Disadvantage of SANs is their cost.IntranetAn intranet is basically a network that is local to a company. In other words, users from within this company can find all of their resources without having to go outside of the company. An intranet can include LANs, private WANs and MANs,ExtranetAn extranet is an extended intranet, where certain internal services are made available to known external users or external business partners at remote locations.InternetAn internet is used when unknown external users need to access internal resources in your network. In other words, your company might have a web site that sells various products, and you want any external user to be able to access this service.VPNA virtual private network (VPN) is a special type of secured network. A VPN is used to provide a secure connection across a public network, such as an internet. Extranets typically use a VPN to provide a secure connection between a company and its known external users or offices.Authenticationis provided to validate the identities of the two peers.Confidentialityprovides encryption of the data to keep it private from prying eyes.Integrityis used to ensure that the data sent between the two devices or sites has not been tampered with.