hos file (1)

download hos file (1)

of 38

Transcript of hos file (1)

  • 8/2/2019 hos file (1)

    1/38

    DEFINITIONS

    HTTP

    Hyper Text Transfer Protocol, the underlying protocol used by the World. HTTP

    defines how messages are formatted and transmitted, and what actions Web

    servers and browsers should take in response to various commands. For example,

    when you enter a URL in your browser, this actually sends an HTTP command to

    the Web server directing it to fetch and transmit the requested Web page.

    The other main standard that controls how the World Wide Web works is HTML,

    which covers how Web pages are formatted and displayed.

    HTTP is called astatelessprotocol because each command is executed

    independently, without any knowledge of the commands that came before it. This

    is the main reason that it is difficult to implement Web sites that react intelligently

    to user input. This shortcoming of HTTP is being addressed in a number of new

    technologies, including ActiveX, Java, JavaScript and cookies.

    HTTPS

    Hypertext Transfer Protocol Secure (HTTPS) is a combination ofHypertext

    Transfer Protocol (HTTP) with SSL/TLS protocol. It provides encrypted

    communication and secure identification of a networkweb server. HTTPSconnections are often used for payment transactions on the World Wide Web and

    for sensitive transactions in corporate information systems.

    HTTPS is a URI scheme which has identical syntax to the standard HTTP scheme,

    aside from its scheme token. However, HTTPS signals the browser to use an added

    encryption layer of SSL/TLS to protect the traffic. SSL is especially suited for

    HTTP since it can provide some protection even if only one side of the

    communication is authenticated.

    FTP

    File Transfer Protocol is a standard network protocol used to transfer files from

    one host to another host over a TCP-based network, such as the Internet. It is often

    used to upload web pages and other documents from a private development

    http://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/B/browser.htmlhttp://www.webopedia.com/TERM/U/URL.htmlhttp://www.webopedia.com/TERM/W/web_page.htmlhttp://www.webopedia.com/TERM/H/HTML.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/W/web_site.htmlhttp://www.webopedia.com/TERM/A/ActiveX.htmlhttp://www.webopedia.com/TERM/J/Java.htmlhttp://www.webopedia.com/TERM/J/JavaScript.htmlhttp://www.webopedia.com/TERM/C/cookie.htmlhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/URI_schemehttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/URI_schemehttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Web_serverhttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://www.webopedia.com/TERM/C/cookie.htmlhttp://www.webopedia.com/TERM/J/JavaScript.htmlhttp://www.webopedia.com/TERM/J/Java.htmlhttp://www.webopedia.com/TERM/A/ActiveX.htmlhttp://www.webopedia.com/TERM/W/web_site.htmlhttp://www.webopedia.com/TERM/S/stateless.htmlhttp://www.webopedia.com/TERM/H/HTML.htmlhttp://www.webopedia.com/TERM/W/web_page.htmlhttp://www.webopedia.com/TERM/U/URL.htmlhttp://www.webopedia.com/TERM/B/browser.htmlhttp://www.webopedia.com/TERM/W/Web_server.htmlhttp://www.webopedia.com/TERM/W/Web_server.html
  • 8/2/2019 hos file (1)

    2/38

    machine to a public web-hosting server. FTP is built on a client-server architecture

    and uses separate control and data connections between the client and the

    server. FTP users may authenticate themselves using a clear-text sign-in protocol,

    normally in the form of a username and password, but can connect anonymously if

    the server is configured to allow it. For secure transmission that hides yourusername and password, as well as encrypts the content, you can try using a client

    that uses SSH File Transfer Protocol.

    SFTP

    SFTP (Secure file transfer protocol) is part of the SSH protocol suite. SFTP is not

    the same as FTP; SFTP is a modern, encrypted protocol and FTP is an old,

    unencrypted protocol. We do not support FTP. SFTP uses SSH to transfer files.

    Unlike standard FTP, it encrypts both commands and data, preventing passwords

    and sensitive information from being transmitted in the clear over the network. It is

    functionally similar to FTP, but because it uses a different protocol, you can't use a

    standard FTP client to talk to an SFTP server, nor can you connect to an FTP

    server with a client that supports only SFTP. You can use SFTP with a graphical

    SFTP client or at the command line.

    SSHSecure Shell (SSH) is a network protocol for secure data communication, remote

    shell services or command execution and other secure network services between

    two networked computers that it connects via a secure channel over an insecure

    network: a server and a client (running SSH server and SSH client programs,

    respectively). The protocol specification distinguishes two major versions that are

    referred to as SSH-1 and SSH-2.

    The best-known application of the protocol is for access to shell accounts on Unix-

    like operating systems. It was designed as a replacement for Telnet andother insecure remote shell protocols such as the Berkeley rsh and rexec protocols,

    which send information, notably passwords, in plaintext, rendering them

    susceptible to interception and disclosure using packet analysis. The encryption

    used by SSH is intended to provide confidentiality and integrity of data over an

    unsecured network, such as the Internet.

    http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Remote_Shellhttp://en.wikipedia.org/wiki/Remote_Process_Executionhttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Packet_analyzerhttp://en.wikipedia.org/wiki/Plaintexthttp://en.wikipedia.org/wiki/Passwordhttp://en.wikipedia.org/wiki/Remote_Process_Executionhttp://en.wikipedia.org/wiki/Remote_Shellhttp://en.wikipedia.org/wiki/Shell_(computing)http://en.wikipedia.org/wiki/Computer_securityhttp://en.wikipedia.org/wiki/Telnethttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Unix-likehttp://en.wikipedia.org/wiki/Shell_accounthttp://en.wikipedia.org/wiki/SSH_clienthttp://en.wikipedia.org/wiki/SSH_serverhttp://en.wikipedia.org/wiki/Secure_channelhttp://en.wikipedia.org/wiki/Network_protocol
  • 8/2/2019 hos file (1)

    3/38

    BOOTP

    In computer networking, the Bootstrap Protocol, or BOOTP, is a network protocol

    used by a network client to obtain an IP address from a configuration server. The

    BOOTP protocol was originally defined in RFC 951.

    BOOTP is usually used during the bootstrap process when a computer is starting

    up. Its configuration server assigns an IP address to each client from a pool of

    addresses. It uses the User Datagram Protocol (UDP) as a transport on IPv4

    networks only.

    Historically, BOOTP has also been used for Unix-like diskless workstations to

    obtain the network location of their boot image in addition to an IP address, and

    also by enterprises to roll out a pre-configured client (e.g., Windows) installation tonewly installed PCs.

    Originally requiring the use of a boot floppy disk to establish the initial network

    connection, manufacturers of network cards later embedded the protocol in the

    BIOS of the interface cards as well as system boards with on-board network

    adapters, thus allowing direct network booting.

    POP

    In computing, the Post Office Protocol is an application-layer Internet

    standard protocol used by local e-mail clients to retrieve e-mail from a remote

    server over a TCP/IP connection. POP and IMAP are the two most

    prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-

    mail clients and servers support both. The POP protocol has been developed

    through several versions, with version 3 (POP3) being the current standard. Like

    IMAP, POP3 is supported by most webmail services such

    as Hotmail, Gmail and Yahoo! Mail.

    SMTP

    Simple Mail Transfer Protocol is an Internet standard for electronic mail

    transmission across Internet Protocol networks. SMTP is specified for outgoing

    mail transport and uses TCP port 25. The protocol for new submissions is

  • 8/2/2019 hos file (1)

    4/38

    effectively the same as SMTP, but it uses port 587 instead. SMTP connections

    secured by SSL are known by the shorthand SMTPS. While electronic mail

    servers and other mail transfer agents use SMTP to send and receive mail

    messages, user-level client mail applications typically only use SMTP for sending

    messages to a mail server for relaying. For receiving messages, client applicationsusually use either the Post Office Protocol (POP) or the Internet Message Access

    Protocol (IMAP) or a proprietary system (such as Microsoft Exchange orDomino)

    to access their mail box accounts on a mail server.

    MICROSOFT EXCHANGE SERVER

    Microsoft Exchange Server is the server side of a client

    server, collaborative application product developed by Microsoft. It is part of the

    Microsoft Servers line of server products and is used by enterprises using

    Microsoft infrastructure products. Exchange's major features consist of electronic

    mail, calendaring, contacts and tasks; that work with Microsoft Outlook on PC and

    Mac, wireless synchronization of email, calendar, contacts with major mobile

    devices and browser-based access to information; and support for data storage.

    ROUTING PROTOCOLS

    A routing protocol is a protocol that specifies how routers communicate with each

    other, disseminating information that enables them to select routes between any

    two nodes on a computer network, the choice of the route being done by routing

    algorithms. Each router has a prior knowledge only of networks attached to it

    directly. A routing protocol shares this information first among immediate

    neighbours, and then throughout the network. This way, routers gain knowledge of

    the topology of the network. The term routing protocol may refer specifically to

    one operating at layer three of the OSI model, which similarly disseminates

    topology information between routers.

    ROUTED PROTOCOLS

    Routed Protocols are nothing more than data being transported across the

    networks. Routed protocols include:

    http://en.wikipedia.org/wiki/Protocol_(computing)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Router_(computing)http://en.wikipedia.org/wiki/Protocol_(computing)
  • 8/2/2019 hos file (1)

    5/38

    Internet protocol Telnet Remote Procedure call SNMP SMTP Novell IPX Open Standards Institute Networking protocol DECnet Appletalk Xerox Network Systems.

    REMOTE DESKTOP PROTOCOL

    Remote Desktop Protocol is a proprietary protocol developed by Microsoft, which

    provides a user with a graphical interface to another computer. Clients exist for

    most versions ofMicrosoft Windows (including Windows

    Mobile), Linux, Unix, Mac OS X, Android, and other modern operating systems.

    By default the server listens on TCP port 3389.Microsoft currently refers to their

    official RDP server software as Remote Desktop Services, formerly "Terminal

    Services". Their official client software is currently referred to as Remote Desktop

    Connection, formerly "Terminal Services Client".

    IPV4

    Internet Protocol version 4 is the fourth revision in the development of the Internet

    Protocol and the first version of the protocol to be widely deployed. Together

    with IPv6, it is at the core of standards-based internetworking methods of

    the Internet. IPv4 is still by far the most widely deployed InternetLayer protocol.IPv4 is a connectionless protocol for use on packet-switched Link

    Layer networks (e.g., Ethernet). It operates on a best effort delivery model, in that

    it does not guarantee delivery, nor does it assure proper sequencing or avoidance of

    duplicate delivery. These aspects, including data integrity, are addressed by

    http://en.wikipedia.org/wiki/Proprietary_protocolhttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Linuxhttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Android_(operating_system)http://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Computer_port_(software)http://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Packet-switchedhttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Best_effort_deliveryhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Link_Layerhttp://en.wikipedia.org/wiki/Packet-switchedhttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Internet_Layerhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IPv6http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Remote_Desktop_Services#Remote_Desktop_Connectionhttp://en.wikipedia.org/wiki/Remote_Desktop_Serviceshttp://en.wikipedia.org/wiki/Computer_port_(software)http://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Android_(operating_system)http://en.wikipedia.org/wiki/Mac_OS_Xhttp://en.wikipedia.org/wiki/Unixhttp://en.wikipedia.org/wiki/Linuxhttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Windows_Mobilehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Proprietary_protocol
  • 8/2/2019 hos file (1)

    6/38

    an upper layer transport protocol, such as the Transmission Control

    Protocol (TCP).

    IPV6Internet Protocol version 6 is a version of the Internet Protocol (IP) intended to

    succeed IPv4, which is the protocol currently used to direct almost

    all Internet traffic. The Internet operates by transferring data between hosts

    in packets that are routed across networks as specified by routing protocols. These

    packets require an addressing scheme, such as IPv4 or IPv6, to specify their source

    and destination addresses. Each host, computer or other device on the Internet

    requires an IP address in order to communicate. The growth of the Internet has

    created a need for more addresses than are possible with IMAC Address

    A Media Access Control address is a unique identifier assigned to network

    interfaces for communications on the physical network segment. MAC addresses

    are used for numerous network technologies and most IEEE 802 network

    technologies, including Ethernet. Logically, MAC addresses are used in the Media

    Access Control protocol sub-layer of the OSI reference model.MAC addresses are

    most often assigned by the manufacturer of a network interface card and are stored

    in its hardware, the card's read-only memory, or some other firmware mechanism.

    If assigned by the manufacturer, a MAC address usually encodes the

    manufacturer's registered identification number and may be referred to as

    the burned-in address. It may also be known as an Ethernet hardware

    address, hardware address or physical address. A network node may have multiple

    NICs and will then have one unique MAC address per NIC.

    SUBNET MASKA mask used to determine what subnet an IP address belongs to. An IP address has

    two components, the network address and the host address. Subnetting enables the

    network administrator to further divide the host part of the address into two or

    more subnets. In this case, a part of the host address is reserved to identify the

    particular subnet. This is easier to see if we show the IP address in binary format.

    http://en.wikipedia.org/wiki/Upper_layer_protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPv4http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Packet_(information_technology)http://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/OSI_reference_modelhttp://en.wikipedia.org/wiki/Network_nodehttp://en.wikipedia.org/wiki/Network_nodehttp://en.wikipedia.org/wiki/OSI_reference_modelhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Packet_(information_technology)http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/IPv4http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Upper_layer_protocol
  • 8/2/2019 hos file (1)

    7/38

    GATEWAY

    A gateway is a network point that acts as an entrance to another network. On

    the Internet, a node or stopping point node or a host node. Both the computers ofInternet users and the computers that serve pages to users are host nodes, while the

    nodes that connect the networks in between are gateways. For example, the

    computers that control traffic between company networks or the computers used

    by internet service providers to connect users to the internet are gateway nodes. In

    the network for an enterprise, a computer server acting as a gateway node is often

    also acting as a proxy server and a firewall server. A gateway is often associated

    with both a router, which knows where to direct a given packet of data that arrives

    at the gateway, and a switch, which furnishes the actual path in and out of the

    gateway for a given packet.

    BRIDGE

    In telecommunication network, a bridge is a product that connects a local area

    network to another local area network that uses the same protocol. You can

    envision a bridge as being a device that decides whether a message from you to

    someone else is going to the local area network in your building or to someone on

    the local area network in the building across the street. A bridge examines each

    message on a LAN, "passing" those known to be within the same LAN, and

    forwarding those known to be on the other interconnected LAN. In bridging

    networks, computer or node addresses have no specific relationship to location. For

    this reason, messages are sent out to every address on the network and accepted

    only by the intended destination node. Bridges learn which addresses are on which

    network and develop a learning table so that subsequent messages can be

    forwarded to the right network.

    ROUTER

    A router is a device that forwards data packets between computer networks,

    creating an overlay internetwork. A router is connected to two or more data lines

    from different networks. When a data packet comes in on one of the lines, the

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Internetworkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Proxy_serverhttp://en.wikipedia.org/wiki/Computer_serverhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_network
  • 8/2/2019 hos file (1)

    8/38

    router reads the address information in the packet to determine its ultimate

    destination. Then, using information in its routing table or routing policy, it directs

    the packet to the next network on its journey. Routers perform the "traffic

    directing" functions on the Internet. A data packet is typically forwarded from one

    router to another through the networks that constitute the internetwork until it getsto its destination node. The most familiar type of routers are home and small office

    routers that simply pass data, such as web pages and email, between the home

    computers and the owner's cable or DSL modem, which connects to the Internet

    through an ISP.

    SWITCH

    A network switch or switching hub is a computer networking device thatconnects network segments or network devices. The term commonly refers to a

    multi-port network bridge that processes and routes data at the data link

    layer (layer 2) of the OSI model. Switches that additionally process data at the

    network layer (layer 3) and above are often referred to as layer-3

    switches or multilayer switches. The first Ethernet switch was introduced

    by Kalpana in 1990

    ETHERNET

    Ethernet is a family ofcomputer networking technologies for local area

    networks (LANs) commercially introduced in 1980. Standardized in IEEE 802.3,

    Ethernet has largely replaced competing wired LAN technologies. Systems

    communicating over Ethernet divide a stream of data into individual packets

    called frames. Each frame contains source and destination addresses and error-

    checking data so that damaged data can be detected and re-transmitted.

    DHCP

    The Dynamic Host Configuration Protocol is a network configuration protocol for

    hosts on Internet Protocol networks. Computers that are connected to IP networks

    must be configured before they can communicate with other hosts. The most

    essential information needed is an IP address, and a default route and routing

    http://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Cable_modemhttp://en.wikipedia.org/wiki/DSL_modemhttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_devicehttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Kalpana_(company)http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Frame_(networking)http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Frame_(networking)http://en.wikipedia.org/wiki/IEEE_802.3http://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Kalpana_(company)http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/DSL_modemhttp://en.wikipedia.org/wiki/Cable_modemhttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Home_routerhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Routing_policyhttp://en.wikipedia.org/wiki/Routing_table
  • 8/2/2019 hos file (1)

    9/38

    prefix. DHCP eliminates the manual task by a network administrator. It also

    provides a central database of devices that are connected to the network and

    eliminates duplicate resource assignments. In addition to IP addresses, DHCP also

    provides other configuration information, particularly the IP addresses of

    local Domain Name Server, network boot servers, or other service hosts.

    TCP/IP Protocol

    TCP/IP is the communication protocol for the internet. TCP/IP defines the rule

    computers must follow to communicate with each other over the internet. TCP/IP

    (Transmission Control Protocol/Internet Protocol) is the basic communication

    language or protocol of the Internet. It can also be used as a communications

    protocol in a private network (either an intranet or an extranet). When you are setup with direct access to the Internet, your computer is provided with a copy of the

    TCP/IP program just as every other computer that you may send messages to or get

    information from also has a copy of TCP/IP.

    IPX/SPX

    IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange.

    IPX and SPX are networking protocols used primarily on networks usingthe Novell NetWare operating systems. IPX and SPX are derived from Xerox

    Network Systems' IDP and SPP protocols, respectively. IPX is a network

    layer protocol (layer 3 of the OSI Model), while SPX is a transport layer protocol

    (layer 4 of the OSI Model). The SPX layer sits on top of the IPX layer and

    provides connection-oriented services between two nodes on the network. SPX is

    used primarily by client/server applications.

    IPX and SPX both provide connection services similar to TCP/IP, with the IPX

    protocol having similarities to IP, and SPX having similarities to TCP. IPX/SPX

    was primarily designed for local area networks (LANs).

    http://en.wikipedia.org/wiki/Xerox_Network_Systemshttp://en.wikipedia.org/wiki/Xerox_Network_Systemshttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/OSI_Modelhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/Client/serverhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Transmission_Control_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/Client/serverhttp://en.wikipedia.org/wiki/Transport_layerhttp://en.wikipedia.org/wiki/OSI_Modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Xerox_Network_Systemshttp://en.wikipedia.org/wiki/Xerox_Network_Systems
  • 8/2/2019 hos file (1)

    10/38

    WINS

    Windows Internet Name Services Microsoft' implementation of NetBIOS Name

    Service, a name server and service for NetBIOS computer names. Effectively

    WINS is to NetBIOS names what DNS is to domain namesa central mapping

    of host names to network addresses. Like DNS it is broken into two parts, a Server

    Service and a TCP/IP Client component which manages the client's registration

    and renewal of names, and takes care of queries.

    TCP/IP Model

    The TCP/IP model is a descriptive framework for computer network

    protocols created in the 1970s by DARPA, an agency of the United States

    Department of Defense. The name derives from the two most important protocolsof the networking protocol suite, the Transmission Control Protocol (TCP) and

    the Internet Protocol (IP). The model evolved from the operational principles of

    the ARPANET, which was an early wide area network and a predecessor of

    the Internet. The TCP/IP model is formalized in the Internet protocol suite and is

    sometimes called the Internet model or the DoD model.

    The TCP/IP model describes a set of general design guidelines and

    implementations of specific networking protocols to enable computers to

    communicate over a network. TCP/IP provides end-to-end connectivity specifying

    how data should be formatted, addressed, transmitted, routed and received at the

    destination. Protocols exist for a variety of different types of communication

    services between computers.

    OSI

    The Open Systems Interconnection model is a product of the Open Systems

    Interconnection effort at the International Organization for Standardization. It is aprescription of characterizing and standardizing the functions of a communications

    system in terms ofabstraction layers. Similar communication functions are

    grouped into logical layers. A layer serves the layer above it and is served by the

    layer below it. For example, a layer that provides error-free communications across

    a network provides the path needed by applications above it, while it calls the next

    http://en.wikipedia.org/wiki/Open_Systems_Interconnectionhttp://en.wikipedia.org/wiki/Open_Systems_Interconnectionhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/Abstraction_layerhttp://en.wikipedia.org/wiki/Abstraction_layerhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/Communications_systemhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/Open_Systems_Interconnectionhttp://en.wikipedia.org/wiki/Open_Systems_Interconnection
  • 8/2/2019 hos file (1)

    11/38

    lower layer to send and receive packets that make up the contents of that path. Two

    instances at one layer are connected by a horizontal connection on that layer.

    ODBCIn computing, ODBC is a standard C programming language interface for

    accessing database management systems . The designers of ODBC aimed to make

    it independent of database systems and operating systems. An application can use

    ODBC to query data from a DBMS, regardless of the operating system or DBMS it

    uses. ODBC accomplishes DBMS independence by using an ODBC driver as a

    translation layer between the application and the DBMS. The application uses

    ODBC functions through an ODBC driver manager with which it is linked, and the

    driver passes the query to the DBMS.

    ADODB

    ADODB is a database abstraction library for PHP and Python based on the same

    concept as Microsoft's ActiveX Data Objects. It allows developers to write

    applications in a fairly consistent way regardless of the underlying database system

    storing the information. The advantage is that the database system can be changed

    without re-writing every call to it in the application.

    JDBC

    JDBC is a Java-based data access technology from Sun Microsystems, Inc.. It is

    not an acronym as it is unofficially referred to as Java Database Connectivity. This

    technology is an API for the Java programming language that defines how a client

    may access a database. It provides methods for querying and updating data in a

    database. JDBC is oriented towards relational databases. A JDBC-to-ODBC bridge

    enables connections to any ODBC-accessible data source in the JVM host

    environment.

    SQL

    SQL stands for Structured Query Language. SQL lets you access and manipulate

    databases. SQL is an ANSI (American National Standards Institute) standard.SQL

    http://en.wikipedia.org/wiki/Computinghttp://en.wikipedia.org/wiki/C_(programming_language)http://en.wikipedia.org/wiki/Database_management_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Database_management_systemhttp://en.wikipedia.org/wiki/C_(programming_language)http://en.wikipedia.org/wiki/Computing
  • 8/2/2019 hos file (1)

    12/38

    can execute queries against a database. SQL can retrieve data from a database.

    SQL can insert records in a database. SQL can update records in a database. SQL

    can delete records from a database. SQL can create new databases. SQL can create

    new tables in a database. SQL can create stored procedures in a database. SQL can

    create views in a database. SQL can set permissions on tables, procedures, andviews.

    LAN

    A local area network is a computer networkthat interconnects computers in a

    limited area such as a home, school, computer laboratory, or office building. The

    defining characteristics of LANs, in contrast to wide area networks, include their

    usually higher data-transfer rates, smaller geographic area, and lack of a needfor leased telecommunication lines. ARCNET, Token Ring and other technology

    standards have been used in the past, but Ethernet over twisted pair cabling,

    and Wi-Fi are the two most common technologies currently used to build LANs.

    WLAN

    A wireless local area network links two or more devices using some wireless

    distribution method, and usually providing a connection through an access point to

    the wider internet. This gives users the mobility to move around within a local

    coverage area and still be connected to the network. Most modern WLANs are

    based on IEEE 802.11 standards, marketed under the Wi-Fi brand name. Wireless

    LANs have become popular in the home due to ease of installation, and in

    commercial complexes offering wireless access to their customers, often for free.

    VLAN

    A virtual local area network, virtual LAN or VLAN, is a group of hosts with a

    common set of requirements, which communicate as if they were attached to the

    same broadcast domain, regardless of their physical location. A VLAN has the

    same attributes as a physical local area network, but it allows for end stations to be

    grouped together even if they are not located on the same network switch. VLAN

    membership can be configured through software instead of physically relocating

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Leased_linehttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Token_Ringhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Broadcast_domainhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Broadcast_domainhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Twisted_pairhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_Ringhttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Leased_linehttp://en.wikipedia.org/wiki/Bit_ratehttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Computer_network
  • 8/2/2019 hos file (1)

    13/38

    devices or connections. To physically replicate the functions of a VLAN, it would

    be necessary to install a separate, parallel collection of network cables and

    equipment which are kept separate from the primary network. However, unlike a

    physically separate network, VLANs must share bandwidth; two separate one-

    gigabit VLANs using a single one-gigabit interconnection can suffer both reducedthroughput and congestion.

    EMAIL SPOOFING

    Email spoofing is email activity in which the sender address and other parts of the

    email header are altered to appear as though the email originated from a different

    source. Because core SMTP doesn't provide any authentication, it is easy to

    impersonate and forge emails. Although there are legitimate uses, these techniquesare also commonly used in spam and phishing emails to hide the origin of the

    email message.

    By changing certain properties of the email, such as the From, Return-

    Path and Reply-To fields, ill-intentioned users can make the email appear to be

    from someone other than the actual sender. The result is that, although the email

    appears to come from the address indicated in the from field, it actually comes

    from another source.

    PHISHING

    Phishing is a way of attempting to acquire information such as

    usernames, passwords, and credit card details by masquerading as a trustworthy

    entity in an electronic communication. Communications purporting to be from

    popular social web sites, auction sites, online payment processors or IT

    administrators are commonly used to lure the unsuspecting public. Phishing is

    typically carried out by e-mail spoofing or instant messaging, and it often directs

    users to enter details at a fake website whose look and feel are almost identical to

    the legitimate one.

    Phishing is an example of social engineering techniques used to deceive users, and

    exploits the poor usability of current web security technologies. Attempts to deal

    http://en.wikipedia.org/wiki/Emailhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Email_spamhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Return-Pathhttp://en.wikipedia.org/wiki/Phishinghttp://en.wikipedia.org/wiki/Email_spamhttp://en.wikipedia.org/wiki/Authenticationhttp://en.wikipedia.org/wiki/Email
  • 8/2/2019 hos file (1)

    14/38

    with the growing number of reported phishing incidents include legislation, user

    training, public awareness, and technical security measures.

    NTFSNew Technology File System is the standard file system ofWindows NT,

    including Windows 2000, Windows XP, and all their successors to date. NTFS

    supersedes the FAT file system as the preferred file system for

    Microsofts Windows operating systems. NTFS has several improvements over

    FAT and High Performance File System, such as improved support for metadata,

    and the use of advanced data structures to improve performance, reliability, and

    disk space utilization, plus additional extensions, such as security access control

    lists and file system journaling.

    FAT 8

    Designed and coded by Marc McDonald, Microsoft Stand-alone Disk

    BASIC introduced the FAT in 1977 with 8-bit table elements, produced for NCR's

    8-bit 8080file system. The FAT, born during one of a series of discussions between

    McDonald and Bill Gates, was used in a stand-alone version of Microsoft BASIC

    for the 8086 chip in 1979 and eventually in the M-DOS operating system. The

    Microsoft Disk BASIC version supported three FATs.

    FAT 16

    In 1984, IBM released the PC AT, which featured a 20 MB hard disk. Microsoft

    introduced MS-DOS 3.0 in parallel. Cluster addresses were increased to 16-bit,

    allowing for up to 65,524 clusters per volume, and consequently much greater file

    system sizes, at least in theory. However, the maximum possible number of sectors

    and the maximum (partition, rather than disk) size of 32 MB did not change.

    Therefore, although cluster addresses were 16 bits, this format was not what today

    is commonly understood as FAT16.

    With the initial implementation of FAT16 not actually providing for larger

    partition sizes than FAT12, the early benefit of FAT16 was to enable the use of

    http://en.wikipedia.org/wiki/File_systemhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Windows_2000http://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/File_Allocation_Tablehttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/High_Performance_File_Systemhttp://en.wikipedia.org/wiki/Metadata_(computing)http://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Journaling_file_systemhttp://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Metadata_(computing)http://en.wikipedia.org/wiki/High_Performance_File_Systemhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/File_Allocation_Tablehttp://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/Windows_2000http://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/File_system
  • 8/2/2019 hos file (1)

    15/38

    smaller clusters, making disk usage more efficient, particularly for files several

    hundred bytes in size, which were far more common at the time.

    FAT 32In order to overcome the size limit of FAT16, while at the same time allowing

    DOS real mode code to handle the format, and without reducing

    available conventional memory unnecessarily, Microsoft expanded the cluster size

    yet again, calling the new revision FAT32.

    Cluster values are represented by 32-bit numbers, of which 28 bits are used to

    hold the cluster number. The boot sector uses a 32-bit field for the sector count,

    limiting the FAT32 volume size to 2 TB for sector size of 512 bytes and 16 TB for

    sector size of 4,096 bytes.

    FAT32 was introduced with MS-DOS 7.1 / Windows 95 OSR2 in 1996, although

    reformatting was needed to use it, and DriveSpace 3 (the version that came with

    Windows 95 OSR2 and Windows 98) never supported it. Windows 98 introduced a

    utility to convert existing hard disks from FAT16 to FAT32 without loss of data. In

    the Windows NT line, native support for FAT32 arrived in Windows 2000.

    INTERNAL VS EXTERNAL MODEM

    A modem that resides in a self-contained box outside the computer system .

    Contrast with an internal modem, which resides on a printed circuit board inserted

    into the computer.

    External modems tend to be slightly more expensive than internal modems. Many

    experts consider them superior because they contain lights that indicate how the

    modem is functioning. In addition, they can easily be moved from one computer to

    another. However, they do use up one COM port.

    http://www.webopedia.com/TERM/I/internal_modem.htmlhttp://www.webopedia.com/TERM/I/internal_modem.html
  • 8/2/2019 hos file (1)

    16/38

    WHAT ARE THE STEPS OF JOINING A DOMAIN WITHTHE WORKSTATION?

    Steps To join a domain:

    These instructions assume you have a local administrator account on the

    workstation, you must create one or have the existing user of the machine create

    one for you.

    You should not use the same administrator account and password for every single

    workstation in the faculty; however it is advised that you use a common

    administrator password for groups of local machines i.e. for a single laboratory or a

    group of related staff machines. This will enable administration of these sets of

    machines to be delegated to appropriate IT staff without giving them administrator

    access to all of the machines in the faculty and in the event of a compromise limit

    the impact this has overall.

    1. Log onto the workstation with a local administrator account, select the logon to

    workstation only option if the novell netware client is installed.

    2. Right click My Computer and select properties.

  • 8/2/2019 hos file (1)

    17/38

    3. Select change to rename the computer or join the domain.

    4. Change the computer name (the name should conform to the clip4 naming

    convention),goto step 7 if already done.

  • 8/2/2019 hos file (1)

    18/38

    5. Allow the changes to come into effect, by clicking ok in the following dialoguebox.

    6. Restart the workstation by clicking yes.

    7. Repeat steps 1 to 3, Select Member of a Domain, and enter the domain name i.e.

    ds.man.ac.uk.

    In the subsequent box enter the name of an authorised faculty/school support staff

    member or other network account to join this computer to the domain.

  • 8/2/2019 hos file (1)

    19/38

    8. When the account has successfully validated and the computer has been added,

    you will see the Domain Welcome message.

    9. Allow the changes to come into effect, by clicking ok in the following dialogue

    box.

    10. Restart the workstation by clicking yes.

  • 8/2/2019 hos file (1)

    20/38

    WHAT IS IP ADRESS? EXPLAIN ALONG WITH ITSCLASSES.

    An Internet Protocol address (IP address) is a numerical label assigned to each

    device (e.g., computer, printer) participating in a computer network that uses theInternet Protocol for communication. An IP address serves two principal functions:

    host or network interface identification and location addressing. Its role has been

    characterized as follows: "A name indicates what we seek. An address indicates

    where it is. A route indicates how to get there."

    The designers of the Internet Protocol defined an IP address as a 32-bit number and

    this system, known as Internet Protocol Version 4 (IPv4), is still in use today.

    However, due to the enormous growth of the Internet and the predicted depletion

    of available addresses, a new addressing system (IPv6), using 128 bits for theaddress, was developed in 1995, standardized as RFC 2460 in 1998, and

    its deployment has been ongoing since the mid-2000s.

    IP addresses are binary numbers, but they are usually stored in text files and

    displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and

    2001:db8:0:1234:0:567:8:1 (for IPv6).

    The Internet Assigned Numbers Authority (IANA) manages the IP address space

    allocations globally and delegates five regional Internet registries (RIRs) to

    allocate IP address blocks to local Internet registries (Internet service providers)

    and other entities.

    Classes Of Internet Protocol Addresses..

    Class A - large organizations , governments Class B - medium sized organizations Class C - small organizations Class D - Multicasting Class E - Research

  • 8/2/2019 hos file (1)

    21/38

    Class1

    st

    OctetDecimal

    Range

    1st

    Octet

    High

    Order

    Bits

    Network/Host

    ID

    (N=Network,

    H=Host)

    Default

    Subnet Mask

    Numberof

    Networks

    Hosts per

    Network

    (Usable

    Addresses)

    A 1126* 0 N.H.H.H 255.0.0.0126 (2

    7

    2)

    16,777,214

    (224

    2)

    B128

    191

    10 N.N.H.H 255.255.0.016,382

    (2

    14

    2)

    65,534

    (2

    16

    2)

    C192

    223110 N.N.N.H 255.255.255.0

    2,097,150

    (221

    2)254 (2

    82)

    D224

    2391110 Reserved for Multicasting

    E240

    254

    1111 Experimental; used for research

    Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is

    reserved for loopback and diagnostic functions.

    Private IP Addresses

    Class Private Networks Subnet Mask Address Range

    A 10.0.0.0 255.0.0.0 10.0.0.0 - 10.255.255.255

    B 172.16.0.0 - 172.31.0.0 255.240.0.0 172.16.0.0 - 172.31.255.255

    C 192.168.0.0 255.255.0.0 192.168.0.0 - 192.168.255.255

  • 8/2/2019 hos file (1)

    22/38

    WHAT ARE THE STEPS TO INSTALL NT SERVER? Phase 0: Command line Installation Phase 1: Gathering Information Phase 2: Installing Network components Phase 3: Finishing Setup

    PHASE 0:Command Line Installation

    Step 1: System will Load the necessary files at the startup of setup:

    Step 2: Setup will be started

  • 8/2/2019 hos file (1)

    23/38

    Step 3: Setup will ask for any Additional device

    Step 4: Setup will show the End User License Agreement

  • 8/2/2019 hos file (1)

    24/38

    Step 5: Press F8 to accept the license agreement

    Step 6: To create the Partition press C and create the partition

    Step 7: choose MB to give the space to on of the disk

  • 8/2/2019 hos file (1)

    25/38

    Step 8: choose the file system to format the disk

  • 8/2/2019 hos file (1)

    26/38

    Step 9: After that formatting will start in few seconds

    Step 10: Specify the root folder

  • 8/2/2019 hos file (1)

    27/38

    Step 11: After this setup will copy the necessary files and reboot the system

    PHASE 1: Gathering Information

    Step 1: Give name and Organization to work further

  • 8/2/2019 hos file (1)

    28/38

    Step 2: After that it will ask for the product key or registration key

    Step 3: After that give the license mode either per seat or per server

  • 8/2/2019 hos file (1)

    29/38

    Step 4: It will ask for the name of computer

    Step 5: It will show the server type we have to select the one

  • 8/2/2019 hos file (1)

    30/38

    Phase 2: Installing Components

    Step 1: Show the connection type

  • 8/2/2019 hos file (1)

    31/38

    Step 2: Network Protocols

    Step 3: Installing various protocols

  • 8/2/2019 hos file (1)

    32/38

    PHASE 3: Finishing Setup

  • 8/2/2019 hos file (1)

    33/38

    Login and see the welcome screen

  • 8/2/2019 hos file (1)

    34/38

    Steps to Create User

    Step 1: click on start after that click on programs Step 2: After that click on administrative tools and user manager for

    domain Step 3: User Manager Screen will open Step 4: Click on User and New user Step 5: Click on Add so that the user will be added to provide policies

    Click on Groups to add the user to a group

    Step 6: To provide the time, click on HoursSteps to Create Group

    Step 1: click on start after that click on programs Step 2: After that click on administrative tools and user manager for

    domain

    Step 3: User Manager Screen will open Click on New Local Group Step 4: click on Add to add this group to an existing group

  • 8/2/2019 hos file (1)

    35/38

    DIFFERENCE BETWEEN WINDOW XP AND WINDOW 7?The following are the some differences between Window XP and Window 7:

    1. One of the major differences between both the operating system is UserAccess Control. Where Windows XP doesn't have any UAC on other side

    Windows 7 enables the UAC feature which was introduced in Windows

    Vista.

    2. Windows 7 supports DirectX 11 where Windows XP supports Directx 9.

    3. One major difference is regarding the graphics, where Windows XP lacksthem on other hand Windows 7 is known for its visual appearance.

    4. There is a difference in speed of both the operating system where Windows7 boots quicker than Windows XP

    5. Networking features like Direct access and VPN reconnect which were notavailable in Windows XP but are introduced in Windows 7 also adds a pointto this list of differences between Windows XP and Windows 7.

  • 8/2/2019 hos file (1)

    36/38

    DIFFERENTIATE BETWEEN DOMAIN AND WORKGROUP?S.N Domain Workgroup

    1. A domain is a logical grouping of

    one or more computers that allow

    them to be managed as a single unit.

    A workgroup is a collection of

    computers which are logically grouped

    together for a common purpose.

    2. Centralized administration. Decentralized administration.

    3. Complex and difficult to install. Simple and easy to install.

    4. Costly and difficult to setup. Cheap and easy to setup.

    5. All the computers in the domain has

    same account database i.e. directory

    database.

    Each computer has its own accounts

    database.

    6. Every computer in it has same

    security policy.

    Each computer has its own security

    policy.

    7. When you log on to machine in adomain, you are logging on to the

    server machine.

    When you logon to a machine in aworkgroup, you are logging onto that

    specific machine.

    8. Only windows NT server machine

    supports domain.

    Both windows 95 and NT workstations

    support workgroups.

    9. Suitable for large organizations. Suitable for small organizations.

    10. Logon process is somewhat more

    complicated for a domain because

    logon information must pass to the

    domain controller and back again.

    Logon process is easy as compared to

    domain.

  • 8/2/2019 hos file (1)

    37/38

    11. Structure of domain:- Structure of workgroup:-

    12. Unauthorized users cannot gain

    access, as there are no lope holes inthe systems.

    Unauthorized users could gain access

    as there are number of loop holespresent.

    13. Login Procedure in domain: - Login Procedure in workgroup: -

    14. Single user logon provides network-

    wide resource access.

    This thing is not their in it.

  • 8/2/2019 hos file (1)

    38/38

    15. Efficient for networks that have

    many computers.

    Inefficient for networks that have many

    computers.

    16. Microsoft recommends that a

    workgroup consist of more than 100computers.

    Microsoft recommends that a

    workgroup consist of less than 10computers.