Friday, 21 September 2012

What is a motherboard?

So what is a motherboard? A computer motherboard (also known as the mainboard) is one of the most crucial components of a computer.

As the name suggests, a motherboard is the mother to all the other parts. In other words, everything in a computer connects to the motherboard. A motherboard (mobo) is the primary circuit board in a computer.


Tuesday, 4 September 2012

Simple Mail Transfer Protocol (SMTP)

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC 821 (1982, eventually declared STD 10) and last updated by RFC 5321 (2008) which includes the extended SMTP (ESMTP) additions, and is the protocol in widespread use today. SMTP uses TCP port 25. The protocol for new submissions (MSA) is effectively the same as SMTP, but it uses port 587 instead. SMTP connections secured by SSL are known by the shorthand SMTPS, though SMTPS is not a protocol in its own right.

Post Office Protocol


The Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval.Virtually all modern e-mail clients and servers support both. The POP protocol has been developed through several versions, with version 3 (POP3) being the current standard. Most webmail service providers such as Hotmail, Gmail and Yahoo! Mail also provide IMAP and POP3 service.

Wednesday, 29 August 2012

What is web server.


Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://networking-and-issues.blogspot.in/ in your browser, this sends a request to the Web server whose domain name is networking-and-issues.blogspot.com The server then fetches the page named index.html and sends it to your browser.
Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.

Tuesday, 28 August 2012

Windows Server 2008 Core


Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. All configuration and maintenance is done entirely through command line interface windows, or by connecting to the machine remotely using Microsoft Management Console. However, Notepad and some control panel applets, such as Regional Settings, are available.
Server Core does not include the .NET Framework, Internet Explorer, Windows PowerShell or many other features not related to core server features. A Server Core machine can be configured for several basic roles: Domain controller/Active Directory Domain Services, ADLDS (ADAM), DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 Web server and Hyper-V virtual server. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing.
Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core

Windows Server 2008 Features

Windows Server 2008 is built from the same code base as Windows Vista; therefore, it shares much of the same architecture and functionality. Since the code base is common, it automatically comes with most of the technical, security, management and administrative features new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as BitLocker and ASLR (address space layout randomization); improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices, to allow hot-plugging of these devices. This allows the system resources to be partitioned dynamically using Dynamic Hardware Partitioning; each partition has its own memory, processor and I/O host bridge devices independent of other partitions.

Windows Server 2008



Windows Server 2008 (sometimes abbreviated as "Win2K8" or "W2K8") is one of Microsoft Windows' server line of operating systems. Released to manufacturing on February 4, 2008, and officially released on February 27, 2008, it is the successor to Windows Server 2003, released nearly five years earlier. A second release, named Windows Server 2008 R2, was released to manufacturing on July 22, 2009. Like Windows Vista and Windows 7, Windows Server 2008 is based on Windows NT 6.x.

Monday, 27 August 2012

Installing Windows 7


If you get the installation of an operating system right, it makes supporting that operating
system throughout its lifetime a great deal simpler. If you make an incorrect configuration
decision when installing an operating system, and you do not find out about it until you have
deployed the operating system to more than 100 computers in your organization, it will take
significantly more time to rectify the problem. In this lesson, you learn about the minimum
hardware requirements for Windows 7, the different editions, how to perform a fresh
installation,
and how to configure Windows 7 to dual-boot with other operating systems.





                             
                  Windows 7 Enterprise and Ultimate Editions


The Windows 7 Enterprise and Ultimate editions are identical except for the fact that
Windows
7 Enterprise is available only to Microsoft’s volume licensing customers, and
Windows
7 Ultimate is available from retailers and on new computers installed by
manufacturers.
The Enterprise and Ultimate editions support all the features available in other
Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop
Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD. Windows 7
Enterprise
and Ultimate editions support up to two physical processors.


                           Windows 7 Hardware Requirements




Operating systems work properly only when you install them on computers that meet the
minimum hardware requirements. You should remember that these requirements are just
for the operating system itself, but most people want to do more than just run an operating
system: they also want to run applications. Applications require memory and storage space
beyond that of the operating system minimum requirements. As someone who may be
responsible for making recommendations about the specifications of computer hardware that
your organization will purchase, you need to take into account the hardware requirements of
the operating system and the applications that will run on it, not just the operating system
itself. Windows 7 Starter and Windows 7 Home Basic have the following minimum hardware
requirements:
n 1 GHz 32-bit (x86) or 64-bit (x64) processor
n 512 MB of system memory
n A 20-GB (x64) or 16-GB (x86) hard disk drive, traditional or Solid State Disk (SSD), with
at least 15 GB of available space
n A graphics adapter that supports DirectX 9 graphics and 32 MB of graphics memory
Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the
following
minimum hardware requirements:
n 1 GHz 32-bit (x86) or 64-bit (x64) processor
n 1 GB of system memory
n A 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space
n A graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver
Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum
of 128 MB graphics memory










Mailbox


You can recall or replace a message only if its recipient is logged on and using Microsoft Outlook and has not read the message or moved it from their Inbox.
To replace a message, you must send a new one. If you do not send the new Item, the original message is still recalled.


In the Navigation Pane, click Sent Items to switch to that folder
In the Sent Items folder, double-click the message that you want to recall to open it.
In the open message, click Other Actions in the Actions group, and click Recall This Message.

Outlook Connectivity


When you are online, Outlook sends and receives messages immediately for Exchange, IMAP, and HTTP e-mail accounts. For POP3 e-mail accounts, messages are sent immediately if the Send immediately when connected check box is selected on the Mail Setup tab (Tools menu, Options command). When offline all accounts use the scheduling send/receive time in the Send/Receive Groups dialog box.

  1.     



How to change work offline and work online.
On the File menu, click Work Offline.
his feature requires you to be using a Microsoft Exchange Server e-mail account in Cached Exchange Mode.
On the File menu, click Work Offline

What Is a User Account?

Local user accounts
(stored on local computer)




Domain user accounts 
 (stored in Active Directory)
                                                                                                                       
Multimedia: Types of User Accounts




























































What Is a Printer Driver?


Software used to communicate with printers and plotters
Translates the information sent from the computer into printer commands
Consists of the following types of files:


Configuration or printer interface file
Displays the Properties and Preferences dialog
boxes when you configure a printer.

Has a .dll extension.
Data file
Provides information about the capabilities of a
specific printer.

Can have a .dll, .pcd, .gpd, or .ppd extension.
Printer graphics 
driver file
Translates DDI commands into printer commands.


Has a .dll extension.

What Are Printer Permissions?

Permission
Allows the user to:
Print                                                                                            
Connect to a printer and send documents to the printer
Manage Printers
Perform the tasks associated with Print permission. The user has complete administrative control of the
 printer
Manage Documents
Manage all aspects of documents that all users submit. The user cannot send documents to the printer or
 control the status of the printer

How to Manage Local and Network Printers


              Local Printers
     Use LPT or USB or IR
    Can only be installed by Administrators or Print Operators
    Support Plug and Play devices
             
              Network Printers

Use a network protocol such as IP, IPX or AppleTalk
Can be installed only by any authenticated user
Support Plug and Play devices

Installing and Managing Access to Printers


How to Manage Local and Network Printers
Hardware Requirements for Configuring a Print Server
What Are Printer Permissions?
Why Modify Printer Permissions?
Practice: Installing and Managing Access to Printers

Wi-Fi Wireless Networks and Technology

Most agree that wireless networking represent the future of computer and Internet connectivity worldwide. Wi-Fi continues to be the pre-eminent technology for building general-purpose wireless networks.

Saturday, 25 August 2012

What are Roaming Profiles?


A roaming profile is basically a file on a shared network location where a user's customized settings are stored. When a user logs on to the network, the desktop accesses their roaming profile and loads their particular settings. Because the roaming profile is stored on the network, the end user can enjoy their customized settings on any machine that has network access, regardless of its location.


What is terminal server?

A terminal server is a specialized computer which aggregates multiple communication channels together. Because these channels are bidirectional, two models emerge: Multiple entities connecting to a single resource, and a single entity connecting to multiple resources

What is Remote Assistance?

Windows Remote Assistance is a feature of Windows XP and later that allows a user to temporarily control a remote Windows computer over a network or the Internet to resolve issues.

What is Fault Tolerance?

The ability of a system to respond gracefully to an unexpected hardware or software failure. There are many levels of fault tolerance, the lowest being the ability to continue operation in the event of a power failure. Many fault-tolerant computer systems mirror all operations -- that is, every operation is performed on two or more duplicate systems, so if one fails the other can take over.

What is roaming profile?



A roaming user profile is a concept in the Microsoft Windows NT family of operating systems that allows a user with a computer joined to a Windows Server domain to log on to any computer on the same network and access their local files and settings




What is disk quota?




Disk quotas are configured on a per volume basis and cannot be set on a file or folder level. Each volume would have its individual settings which do not affect any other volumes. Disk quotas are used in NTFS

What is mount drives?


A mounted drive is a drive that is mapped to an empty folder on a volume that uses the NTFS file system. Mounted drives function as any other drives, but they are assigned drive paths instead of drive letters. When you view a mounted drive in Windows Explorer, it appears as a drive icon in the path in which it is mounted. Because mounted drives are not subject to the 26-drive-letter limit for local drives and mapped network connections, use mounted drives when you want to gain access to more than 26 drives on your computer.

What is ftp server?


File Transfer Protocol (FTP) is a network protocol used to transfer data from one computer to another through a network such as the Internet.

File Transfer Protocol (FTP) is a network protocol used to exchange and manipulate files over a TCP computer network, such as the Internet. An FTP client may connect to an FTP server to manipulate files on that server.

IP usage


Used to connect to another computer
Allows transfers of files and e-mail

What Is an IP Address?


IP stands for Internet Protocol. An IP address is a unique address used by different computers on a computer network to identify and communicate with one another. So, an IP address is used as an identifier to find electronic devices connected to one another on a network. Therefore, each device in the network must have its own unique address. An IP address is like a mailing address that is used to deliver data, that is, files, to a computer.
Some IP Address are meant to be unique within the scope of the global Internet, whereas others are meant to be unique within the scope of a specific network. Internet Assigned Numbers Authority (IANA) creates and manages IP addresses for the public Internet. IANA allocates the super blocks of addresses to Regional Internet Registries, which in turn allocate smaller blocks of addresses to Internet service providers.
Static and Dynamic IP Addresses

What is Subnetting?


Subnetting is the process of breaking down an IP network into smaller sub-networks called "subnets."

What is active directory?


                 Ad is a service that identifies resources in a network and makes them available to the user.
                       Directory is a collection of information on about user group and computer. Active directory organizes those resources and make them accessible over the network.
Microsoft create it own implementations directory services in windows in called NTDS. Ntds in Windows NT can manage 40000 objects and it use flat name space like abs,
Yahoo.
First introduction of active directory was in 2k server. It uses hierarchical name space.

Example
Win NT    directory services (ABC) DC called PDC ADC called BDC.
Win 2k   active directory (abc.com)

2k server ……… it can manage 1million objects.
2k3 in 2k3 we can manage 10million objects the file to store directory information it called NTDS.dit. (Directory information tree)
Win2k and 2k3 support .com


The function of active directory benefit of active directory.

1. Cartelization management
2. Scalability
3. Extensibility 
4. Integration
5. Policy base administration
6. Replication of information like any change dc to ADC
7. Secure authentication
8. Active directory support multiple authentication module like Kerberos, ssl, smartcard certificate.
 
Structure of Active directory
Logical structure                         Physical structure 
1. Forest                                       1. DC
2. OU                                           2. GCS
3. Tree                                          3. Site
4. Domain



Requirement of active directory

O/S   NT, 2K, 2K3, 2k8
NTFS partition
LAN card connected
Static IP


250MB free space (200MB NTDS + 50 SYSBOL).
DCPROMO.EXE

What is forest?
By default first DC create a first forest. It content common GCS and share common schema.  

Advantage of ADC

Adc is use backup and fault tolerances.
It is read and write copy of DC.
It is run NLB.


Why we can create CDC and what is use.

  1.  To create additional object.
  2. To control replication.
  3. By default two way transitive trusts create.
  4. It shares contagious name space.


What is GCS?
GCS contain full information of OWN information.

NTDS.dit partition

  1. Schema partition is format of object (like a form )
  2. Configuration partition can store information who many DC, ADC, CDC
  3. Domain partition data base like object information.

What is domain?
Domain is a logical boundary or domain is logical grouping of network elements manage by single administration.

What is tree?
Multiple interconnected CDC that share  name space called tree.

Friday, 24 August 2012

What Are Domains?


The Domain is the core unit of logical structure in Active Directory. Grouping objects into one or more domains allows a company’s organization to be reflected in its network.
All network objects exist within a domain, and each domain stores information only about the objects it contains (objects that belong to that domain).
A domain boundary contains objects to which access is restricted by the use of Access Control Lists (ACLs), populated by Access Control Entries (ACEs).  All security polices and settings, such as administrative rights, security policies, and Access Control Lists (ACLs), do not cross from one domain to another, thus a domain administrator has absolute rights to set policies only within domain they belong to.
Domains provide the following three functions:
        An administrative boundary for objects
        A means of managing security for shared resources
        A unit of replication for objects

The Logical Structure of Active Directory


Active Directory provides a means for designing a directory structure that should meet whatever needs an organization may have. However, because of the flexibility in design that it offers, an organization’s business structure should be examined prior to installing Active Directory, so that their current and future needs may be met.
In Active Directory, resources are organized in a logical structure, and this grouping of resources logically enables a resource to be found by its name rather than by its physical location.
In previous versions of Microsoft Windows NT the logical structure was the domain, which contained user accounts, computer accounts, printers, files and applications, with a limitation of approximately 40,000 objects. Administration of these resources could not be divided any further, without having to create new domains and manually creating the trusts between them. With Windows 2000, which can store billions of objects, resources can be organized and administered more granularly by utilizing the following logical structures.
        Objects
        Organizational Units
        Domains
        Trees
        Forests
























Purpose of Active Directory



Active Directory stores information about users, computers, and network resources and makes the resources accessible to users and applications. It provides a consistent way to name, describe, locate, access, manage, and secure information about these resources.

What Is Active Directory?


Active Directory consists of a series of components that constitute both its logical structure and its physical structure. It provides a way for organizations to centrally manage and store their user objects, computer objects, group membership, and define security boundaries in a logical database structure.

Introduction to Active Directory

Thursday, 23 August 2012

IP Address


It is a unique address by which we can identify each computer in the network.
32-bit addresses
Commonly expressed in dotted decimal format (e.g., 192.168.10.12)
Each “dotted decimal” is commonly called an octet (8 bits)

Networking Devices

                                                         REPEATERS

Repeaters regenerate incoming signals.
Repeaters work at the physical layer of the OSI model.
Repeaters can be into two categories
Amplifiers:-- simply amplify the signal.
Signal re generators :-- strip out the original signal which has weakened.




















                                         HUB

A hub joins multiple computers (or other network devices) together to form a single network segment.
A hub includes a series of ports that each accept a network cable.
Larger hubs contain 8, 12, 16 and even 24 ports.








                                                          NETWORK INTERFACE CARD 


Amplifies electronic signals
Packages data for transmission
Physically connects computer to transmission media (cable)









                                                                                 
                                    BRIDGES 

Bridges have all the features of a repeater.
They function at the Data Link layer of the OSI model.












                                         SWITCHES 

A switch is a small device that joins multiple computers together.
They function at the Data Link layer of the OSI model.













                                           ROUTERS


Routers is used in wide area networks which often connect networks using different communication protocols and different addressing schemes.
They function at the Network layer of the OSI model.








Routing Protocols

Routing protocols are used between routers to determine paths and maintain routing tables.
Eg: RIP, IGRP, EIGRP, OSPF.


                    Routing Protocol Evolution


RIP
Distance vector                                           
Most common IGP                                        
Uses hop count

IGRP
                                                           •Distance vector
                                                           •Developed by Cisco       
                                                                          


EIGRP
Hybrid protocol
Developed by Cisco
Merges benefits of link state & distance vector


  OSPF
            •Link state
            •Successor to RIP
            •Uses least-cost routing, multipath routing, and load balancing 

                                                                                                             Distance Vector
                                                                                            Hybrid
                                                                                                  Link State