Networking Notes for Interview.doc

Embed Size (px)

Citation preview

  • 8/13/2019 Networking Notes for Interview.doc

    1/41

    NETWORK ESSENTIAL

    Network:The physical connection of computers or 2 or more computers connected together

    called Network.

    Networking:sharing the resources within a N/W.

    Share Resources:Hardware & Software

    Require:Media

    Media: its a communication path through which signal will pass.

    Internet:connection number of network.

    NETWORK SIZES

    LAN: connection of 2 or more location within a single location.

    CAN: connecting a N/W within a Single campus.

    MAN:is a largecomputer network that usually spans a city or a large campus.

    WAN: is acomputer network that covers a broad area (i.e., any network whose communications

    links cross metropolitan, regional, or national boundaries)

    Server:who always gives the resources.

    Peer:who acts as both client and server.

    Client:who always request for the resources.

    There are 2 models

    1) Work group or peer to peer model

    2) Server based model or ( Client model) or (domain model)

    Operating system

    1) Client operating system2) N/W operating system

    Client operating system such as: N/W operating system such as:1) Windows 98 1) server 20002) NT- Workstation 2) NT server3) 2000 Professional 3) Linux and Netware & windows 2003

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_network
  • 8/13/2019 Networking Notes for Interview.doc

    2/41

    Work group or peer to peer model

    Disadvantage:

    No centralize deviceNo centralized data base

    Advantage:Sharing the information

    Reduce the cost

    Its an independent

    Server based model or (Client or Server model) or (domain model)

    Disadvantage:

    It will depends on server

    Cost is expensive

    Only local user will be loginIf server fails the whole N/W is fail.

    Advantage:Data Centralization

    Security

    Effective PermissionSingle Platform to manage whole network

    User can login to any computer and access their resources any time and much more

    Basic components of N/W

    Media, NIC, Protocols

    N/W Card: is also called LAN orTransceiver.

    Multiple home pc:aPC which is having more the one PC.

    PXE:Pre-execution Environment and it is an Integrated IC.

    Using PXE we can make client & connect to the server.

    Different types of N/W card

    1) ARC NET 2) TOKEN RING 3) ETHERNET

    TOPOLOGY:The wave in which the Computers are connected is known as topology.

    There are 2 types of topology

    1) Physical topology: the physical structure of a N/W.

    2) Logical topology: it defined the dataflow with in a N/W.

    ETHERNET:its a physical address or MAC address

  • 8/13/2019 Networking Notes for Interview.doc

    3/41

  • 8/13/2019 Networking Notes for Interview.doc

    4/41

    Advantages

    Easy to implement and extend.

    Easy to install.

    Well-suited for temporary or small networks not requiring high speeds (quick setup).

    Cheaper than other topologies. Cost effective; only a single cable is used.

    Easy identification of cable faults.

    Reduced weight due to fewer wires.

    Disadvantages

    Limited cable length and number of stations.

    If there is a problem with the cable, the entire network breaks down.

    Maintenance costs may be higher in the long run.

    Performance degrades as additional computers are added or on heavy traffic (shared

    bandwidth). Proper termination is required (loop must be in closed path).

    Significant Capacitive Load (each bus transaction must be able to stretch to most distant

    link).

    It works best with limited number of nodes.

    Slower data transfer rate than other topologies.

    Only one packet can remain on the bus during one clock pulse

    Difficult to troubleshoot.

    Star topology

    Star networksare one of the most commoncomputer networktopologies.In its simplestform, a star network consists of one centralswitch,hub or computer,

    Its Fig2 looks like: Physical is always star, Logical is always Bus

    Fig2: Star Topology

    It requires centralized Device (HUB, SWITCH) UTP cable

    No need for Termination

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Network_hubhttp://en.wikipedia.org/wiki/Network_hubhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Computer_network
  • 8/13/2019 Networking Notes for Interview.doc

    5/41

    Disadvantages

    The cable require is becomes more

    Cost will be more or high

    If centralize device fails, the whole N/W will fail.

    AdvantageStatus LEDsTroubleshooting easy

    If the one pc fails the rest of the PCs will participate

    We can extend the N/W.

    RING TOPOLOGY

    A ring network is anetwork topology in which each node connects to exactly twoother nodes, forming a single continuous pathway for signals through each node - a

    ring. Data travels from node to node, with each node along the way handling every

    packet.

    Require Token ring, Ethernet

    1) CDDI:copper distributed data interface2) FDDI:Fiber distributed data interface3) IBMToken Ring

    Cables:UTP cable & Fiber optic cable

    Fig3: Ring topology

    Advantages

    Very orderly network where every device has access to the token and the opportunity to

    transmit

    Performs better than a star topology under heavy network load

    Can create much larger network usingToken Ring

    Does not require network server to manage the connectivity between the computers

    Disadvantage

    One malfunctioning workstation or bad port in the MAU can create problems for the

    entire network

    Moves, adds and changes of devices can affect the network

    http://en.wikipedia.org/wiki/Network_topologyhttp://en.wikipedia.org/wiki/Token_Ringhttp://en.wikipedia.org/wiki/Token_Ringhttp://en.wikipedia.org/wiki/Network_topology
  • 8/13/2019 Networking Notes for Interview.doc

    6/41

    Network adapter cards and MAU's are much more expensive thanEthernet cards and

    hubs

    Much slower than an Ethernet network under normal load

    MESH TOPOLOGY

    The value of fully meshed networks is proportional to the exponent of the number of

    subscribers, assuming that communicating groups of any two endpoints, up to and

    including all the endpoints.

    The physical fully connected mesh topology is generally too costly and complex forpractical networks, although the topology is used when there are only a small number of

    nodes to be interconnected.

    All the pc are connected together

    It support fault toleranceRequire UTP cable

    Fig4: Mesh Topology

    HYBRID TOPOLOGY

    Hybrid networks use a combination of any two or more topologies in such a way that the

    resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). Forexample, a tree network connected to a tree network is still a tree network, but two star networks

    connected together exhibit a hybrid network topology. A hybrid topology is always producedwhen two different basic network topologies are connected. Two common examples for Hybridnetwork are:star ring networkandstar bus network

    A Star ring network consists of two or more star topologies connected using amultistation access

    unit (MAU) as a centralized hub.

    A Star Bus network consists of two or more star topologies connected using a bus trunk (the bus

    trunk serves as the network's backbone).

    Fig5: Hybrid Topology

    Advantage: The dissimilar topology can be connected.

    http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/Media_Access_Unithttp://en.wikipedia.org/wiki/Ethernet
  • 8/13/2019 Networking Notes for Interview.doc

    7/41

    To building a N/W

    Combi card: -An N/W card which has more than 1 type of connector is called combi card.

    Require: -Nodes, Media, NIC, Drivers

    Drivers: -it is software which makes the H/W to function properly.

    Plug-N- Play: -is a feature in which it automatically detects the hardware &try to load the resources.

    In order to support P-N-P

    1) Os Must support2) Bios must have P-N-P compatible3) The hardware & drivers have P-N-P compatible (Plug & play)

    Protocol: -is a set of rules which governs how the system will communicate n/w. or it is a common

    language used by the system for the communicating B/W each other protocol& Protocol is software

    Protocol stack: -A collection of protocol it is require for in order to provide task.

    TCP/IP: - Transmission control protocol. It is routable protocol.

    IPX/SPX: - internetworking packet exchange // Sequential Packet exchange. It is routable protocol.

    NET BIOS: - Net basic input output system. It is Non- routable protocol.

    Adopter: -it is a card is connected to one of the slot.

    Ping: -Packet Internet Grapher.

    OSI MODEL

    OSI: -open system interface or interconnected.

    OSI model is known as Reference model & how the data will flow in the media this is done by OSI

    model.

    It is designed in 1977 the organization ISO.

    ISO: -International organization for standardization.

    Reference model has 7 layers &each layer is performed its own task.

    Each subtask has one layer, the Dividing a subtask is known as task.

  • 8/13/2019 Networking Notes for Interview.doc

    8/41

    OSI Model have 7 Layers

    Application Layer 7thLayer 7TH& 6TH& 5THlayer is also

    known as MESSAGES

    It is a Top most layer

    Presentation Layer 6thLayer

    Session Layer 5thLayer

    Transport Layer 4thLayer 4thlayer is also known as

    SEGMENTS

    It is a medal most layer

    Network Layer 3rdLayer 3rdlayer is also known as

    PACKETS

    It is a medal most layer

    DataLink Layer 2ndLayer 2NDlayer is also known as

    FRAMES

    It is a lower most layer

    Physical Layer 1STLayer 1st layer is also known as

    BITS

    It is a lower most layer

    Physical

    P

    DataLink

    D

    Network

    N

    Transport

    T

    Session

    S

    Presentation

    P

    Application

    A

    Please do Not through sars piazza awave

    Application Layer

    : - is a layer at which the users interact with the network.

    Protocols used by the application layer: FTP=21& 20, TFTP=69, HTTP=80, SNMP= , NMTP=

    Presentation Layer

    It takes the presenting the data to the user or application layer.

    Presentation layer helps in compression, Encryption, code formatting

    Protocols used by the Presentation layer: BMP, AUI, WAV, MPEG, DOC. & TEXT MODE: ASCIE,EBCDIC, and JPEU.

  • 8/13/2019 Networking Notes for Interview.doc

    9/41

    Session Layer

    Which helps establish a session like user logon, exchanging dialogues, alerting, and authentication

    Which helps in build a session & teardown a session.

    Before sending the data the session must establish

    It helps in sending multiple sessions.(At a time a single pc sending so many files, web pages, printer o/p)

    Before sending the data 1stit contacts the transport layer.

    Protocols: NFS: - N/W file system. RPC: - Remote processor call. SQL: - structure query language.

    Transport Layer

    It helps in flow control & Error control & segmenting, Multiplexing, Reliable & Unreliable services.

    Converting data into segments, 3way handshake, and connection management.

    Segment: -is it a part of a message. Which helps in connection management.

    Segmenting: - The process of dividing the large number of messages in to small blocks of data is known

    as segmenting.

    Flow control: -in order to flow of data.

    Which maintain the flow of data transfer B/W the PC-PC.

    Sequential numbering: -which helps in the rearrange the data at the destination.

    Disadvantage: - there is no sequential number.

    Advantage: - speed will increase.

    Example: - there is 2 systemshave 100mbps & 2 systemshave 10mbps {100 mbps has adjusted to

    10mbps}.

    Connection Management: -it is for connection oriented or TCP. Before sending any data the 3way handshake must establish.

  • 8/13/2019 Networking Notes for Interview.doc

    10/41

    Example: - 3 Way Hand Shake

    Comp 1 Comp2

    _________ SYNC _______________________

    SYNC/ACKNOWNLEDGEMENT

    ACKNOWNLEDGEMENT

    FLOW OF SEGMENT (OR) CONTROL

    Connection Management

    1) Connection establishment2) Dataflow3) Connection termination

    Flow Control

    How the segments will flow

    Example: -

    Sender Receiver

    Flood /over flowing the data

    Flow of controls uses 2 methods to avoide the over flow of data.

    1) Windowing: it avoids the overflow of data.2) Ready or not Ready

    C2C1

    10 segments 8 segments

  • 8/13/2019 Networking Notes for Interview.doc

    11/41

    1) Ready or not ReadyExample: -

    Sender Receiver

    1-2-3-14-20-25

    Not Ready

    Ready

    Here there is no proper negotiating between devices.

    2) WindowingSegments 1-50 Segments 1-50

    DYNAMIC NEGOCIATION

    Negotiation: they will talk each other means source and destination.

    It will fix window size it is become slow

    The destination is not over flow.

    Error control

    CONNECTION ORIENTED CONNECTION LESS

    TCP (Transmission control protocol) UDP (User Datagram Protocol)

    Slow Fast

    Reliable Non-Reliable

    It will work with acknowledgement It will not work with acknowledgement

    It uses 3way hand shake It wont use 3way hand shake

    Ex:FTP Ex:DNS

    Reliable: - the data losses are avoided and there is no data loss.

    Error control done at Transport layer.

    Multiplexing

    1-50 segments 10 segments

    Sender Receiver

  • 8/13/2019 Networking Notes for Interview.doc

    12/41

    Network Layer

    Which helps in routing, Brouter, Layer 3 switch & it will converts segments to packets.

    Packets are also known as datagram. Packets consisting of source and destinationIP address.

    Error checking done at N/W layer.

    N/W is a logical&most of the important task will be done at the N/W &Transport Layer.

    The function of N/W layer routing [Route discovery or Route selection]

    Routing: -is a device which used for routing & the process of transferring the packets from one network

    to another network is known as routing.

    Each Router maintains a table known as routing table.

    All ways switches check the MAC address.

    Router: - is used to connect 2 different networks.

    Device Addressing

    Logical: - Ip address

    Physical: - MAC address

    Where the router acts as a gateway B/W the N/Ws.

    Hop count: -The one pass through a N/W or router is known as a Hop Count.

    Routing table: -routers maintain a table known as routing table. Which helps the packets to reach itsdestination.

    Data-Link Layer

    Data link layer helps in MAC addressing & Error checking.

    Frame consists of Trailer, Data, and CRC

    Header: -consists of source and destination MAC address

    Data: -consisting actual data to send the destination.

    CRC: -It is consists the Error checking.

    Error checking is used to know whether the data is altered this error checking is done at the destinationend where as it is send by the source end.

  • 8/13/2019 Networking Notes for Interview.doc

    13/41

    Example:-Frame works

    1) After sending a frame it waits for some time.2) If it receives (-ve) acknowledgement it will retransmit once again.3) If it receives (+ve) acknowledgement it will transmit the next frame4) No acknowledgement (+ve) or (-ve) it wait for some time & it transmit the same frame once

    again.

    Parity checking: -is also used for error checking.1) Even Parity 2) Odd Parity

    MACaddress is also known as Hardware (or) physical address.

    It is 12 digit Hexa-decimal numbersEx: -0A-12-09-BC-08-F3

    IEEE: -Divide a 12digit decimal into 2

    1st6 digit 2nd6 digit

    It is given by IEEE & It is given by other company

    OUT: - organization unique identify

    1stdigit has to be same and another 6digit we can change that number.

    In data link layer has 2 sub layers

    1) Logical link control (LLC)2) MAC

    Binding: -the process of linking the protocol to a NIC is known as binding or The process of interfacingthe LAN drivers with protocols is knows as BINDING.

    Data Link devices:-Bridge & Layer-2-switch.

    Protocols: -1) 802.3 2) 802.2 3) SAP/SNAD 4) FRAME RELAY 5) HDLC 6) PPP 7) SDLA

    LAN protocols: 802.3, 802.2, SAP/SNAD, Frame relay

    WAN protocols: HDLC, PPP, SDLA

  • 8/13/2019 Networking Notes for Interview.doc

    14/41

    DHCP

    Dynamic Host Configuration Protocol

    Installed DHCP in to Windows 2000 & 2003 & 2008 server is called DHCP server.

    The range of IP address is created depending on the number of clients.

    The range of IP address must use the same class & same N/W ID which is used for Windows 2000 &2003 & 2008 server& it is one time configuration.

    If the server fails the IP address will fail.

    DHCP port number= 67&68

    Release the Existing IP address IPCONFIG / RELEASE

    Renew the existing IP address IPCONFIG / RENEW

    Auto private IP address (APIPA)

    Whenever the client request & no response from the DHCP server the client will automatically generateda class B IP address of its own.

    To configure DHCP at the Client end

    1) Install DHCP in the machine running with server2) Configure server

    (a) Give the scope of IP address[Starting & ending range]

    (b) Specify the lease period

    Note: - [DHCP will assign the IP address to clients on lease basis]

    (c) At the client end(a) Select local area N/W & enable

    Obtain an IP address automatically

    DHCP service

    StartSettingsControl PanelAdd/Remove windows componentsN/Wing servicesDHCP

  • 8/13/2019 Networking Notes for Interview.doc

    15/41

    Configuring a DHCP Scope

    Log on administrator

    The DHCP Server provides:

    1) Default gateway address2) Domain Name3) Service server addresses4) WINS server addresses5) NETBIOS name resolution type.

    TITLE: DHCP Options Supported by ClientsFrom the Network Administration group, start DHCP Manager.

    The DHCP Manager window appears.

    1) Under DHCP Servers, select *Local Machine*

    Local Machine indicates that you are configuring the local DHCP server, and not a remoteDHCP server.

    2) From the Scope menu, choose Create.

    The Create Scope dialog box appears.3) Complete the scope configuration.

    The DHCP server cannot be a DHCP client. It must have a static IP address, subnet mask,and default gateway address. You also have the option of assigning an exclusion range orspecific excluded addresses as well as lease duration and a name.4) Choose OK when done.5) Choose Yes to activate the scope.

    The DHCP Manager window appears with the new scope added. Notice the yellow light bulbnext to the IP address. This indicates an active scope.6) Close the DHCP Manager

    TCP/IP Models

    Application Also known as Application, Presentation, Session

    Transport Layer Also known as Transport

    Internet Also known as NetworkNetwork Also known as Data link, Physical

  • 8/13/2019 Networking Notes for Interview.doc

    16/41

    802 Projects

    IEEE: -it is designed 1980 Feb standard for LAN &WAN&it has 12 standards.

    1) 802.1 LAN/MAN Management2) 502.2 LLC sub layer3) 802.3 CSMA/CD [ Ethernet]4) 802.4 Token Passing5) 802.5 IBM Token Ring6) 802.6 DQDB [Distributed Queue dual bus]7) 802.7 Broad band N/W8) 802.8 Fibre optic9) 802.9 ISDN10)802.10 LAN/WAN security11)802.11 wireless communication12)802.12 Demand priority or 100VG anylan

    Media access

    1) Contention methoda) CSMA/CA & it is used in Apple talc Network

    b) CSMA / CD & it is user in Ethernet Network2) Token passing

    a) Token Ring & FDDI network3) Demand priority

    CSMA/CA: - Carrier sense multiple access / collision avoidance.

    CSMA/CD: - Carrier sense multiple access / collision detection.

    Contention Method

    In contention method whenever the nodes whats to send a data 1stits sense the carrier whenever thecarrier is found free it will transmit the data. When 2 systems sense the media at the same time & if it free

    they will transmit and collision will occur in a Network.

    Before sending the data C1C4 sense the carrier or media or check to know whether the carrier free.

    CSMA/CD

    Hub always logically Bus & physically Star.

    Switch always physical star & Logical Ring

    In Ethernet always the data flows in Bidirectional.Ex:-2 pcsfrom C1to C4& C2C1aretransferring the data at a time.

  • 8/13/2019 Networking Notes for Interview.doc

    17/41

    Disadvantage: - the collision will occur when 2 pcs transmitted the data at a time.

    In this method all the system contender to transmit the data.

    Whenever the number of nodes increases the collision will occurs data is avoided performance willdecreases.

    Ethernet network designed by HAWAI.

    CSMA/CA

    Anode wishing to transmit data has to first listen to the channel for a predetermined amount of time todetermine whether or not another node is transmitting on the channel within the wireless range. If the

    channel is sensed "idle," then the node is permitted to begin the transmission process. If the channel issensed as "busy," the node defers its transmission for a random period of time. Once the transmission

    process begins, it is still possible for the actual transmission of application data to not occur.

    In this method it wont send the data 1

    st

    , 1

    st

    it will send the signal.

    TOKEN PASSING

    In telecommunication,token passingis achannel access method where a signal called a tokenis passedbetween nodes that authorize the node to communicate. The most well-known examples aretoken ringandARCNET.

    In case of token passing each system will get an opportunity to transmit the data here the token will begenerated. The system which is having the token can transmit the data.

    In this token passing method the collision are avoided because the data flows in always one direction &

    more number of systems will simultaneously transmit the data.

    The Ring Designed by IBM international business machine.

    DEMAND PRIORITY PROTOCOL

    Require demand priority switches. Demand priority is the media access control protocol defined in theIEEE 802.12 draft standard. It is called 100VG-anyLAN by HP. various techniques are used to ensurefaitness of access for all nodes and to guarantee access time for individual nodes. Round robin selection

    procedures are used to give each node an equal opportunity to transmit data. Two priority levels areprovided so that time-critical traffic such as interactive video, audio and multimedia can be given priority

    service with guaranteed low delay. A bandwidth allocator can be introduced to control the amount of

    bandwidth each application can use.

    These techniques make demand priority able to accommodate multimedia applications with guaranteed

    performance levels, while allowing normal traffic to use the remaining bandwidth in a fair manner.

    http://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Telecommunicationhttp://en.wikipedia.org/wiki/Channel_access_methodhttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/ARCNEThttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Channel_access_methodhttp://en.wikipedia.org/wiki/Telecommunicationhttp://en.wikipedia.org/wiki/Node_(networking)
  • 8/13/2019 Networking Notes for Interview.doc

    18/41

    NETWORKING DEVICES

    1) Hub2) Switch3) Router

    HUB

    Hub is a device & also known as Concentrator

    There are 3 types of hub

    1) Passive Hub 2) Active Hub 3) Intelligent Hub

    Active Hub

    1) External power supply2) Statuss LEDs

    3) The signal become strong4) Amplification5) No MAC address6) The administrator check the status of LEDs

    Passive Hub

    1) The signals become weaken.2) No amplification its just act likes a connector which helps how the system will

    communicate.

    3) No amplification4) No status LEDs

    Intelligent Hub

    1) It will check the status of the frame2) The time requirement is more3) Status of LEDs4) Amplification5) Its have own power supply

    SWITCH

    There are 3 types of switch

    1) Store & forward 2) Cut through 3) Fragment free

    Store & forward

    1) Before sending the data it will check the source and destination MAC address2) It is slow3) It is Reliable&It will check the CRC.[ cyclic Redundancy check]

  • 8/13/2019 Networking Notes for Interview.doc

    19/41

    Cut through

    1) It wont check the CRC2) It will check the destination & Amplify3) It will faster4) It wont check the error

    5) Non-Reliable

    Fragment free

    1) It will check 1st64 bytes of data2) There is128bytes3) In 64 bytes any error will be their it wont send the data for the destination.4) Once a switch off the MAC table it will erase & its temporary memory & when the MAC table

    will take some time & its refresh.5) Reliable

    IP ADDRESSING

    It is a logical or layer 3 addresses.It is a 32 bit address. It is an Ip 4 version. Each block is known as fieldor octet. Each field size is 8 bit.

    8 bits 8 bits 8 bits 8 bits

    Range & Classes of IP address

    Class A 1 to126 [127 is a Loop back address& it is used for troubleshooting or it is checking forTCP/IP stack]

    Class B128 to 191

    Class C192 to 223

    Class D224 to 239 & Class E240 to 254 [255 is a Broadcast address]

    Without sub netting IP address has 2 parts

    1) N/W part 2) Host part

    With subneting IP address has 3 ports

    1) N/W part 2) Host part 3) Subneting

  • 8/13/2019 Networking Notes for Interview.doc

    20/41

    To Built N/W

    Whenever all computer must have same ID [Identification] &all computers must different host ID.

    Subneting:- The process of dividing large N/Ws into small N/W is known as subneting.

    Subnet Mask:- which is used to differentiate the Host part from a N/W part.

    Class N/W Host No. of N/W No. of Host Subneting

    A 1 3 126 1, 67, 77, 214 Class A

    255.0.0.0

    B 2 2 16, 384 65, 534 Class B

    255.255.0.0

    C 3 1 20, 97, 152 254 Class C

    255.255.255.0D Multicast

    address

    E Researchpurpose

    0 for N/W address / Default Routing

    127 for loop back address

    255 Broadcast addresses

    (.)Dotperiod is used to separate the field.

    Note: - While addressing a Host using an IP address the part should not consist of all Zeros or all ones.

    Note: - Where all Zeros represent network address where all ones represent broadcast address.

    For a given 2 N/W addresses are always lost

    For Class A2 to the power of 24-2=22

    For Class B2 to the power of 16-2 =14

    For Class C2 to the power of 8-2=6

    The host part should consist of 0s & 1s.

  • 8/13/2019 Networking Notes for Interview.doc

    21/41

    Private address

    Class A: 10.0.0.0 [1 N/W is reserved for private]

    Class B: 172.16.0.0 to 172.16.0.31 [16 N/W is reserved for private]

    Class C: 192.168.0.0 to 192.168.255.0 [256 N/W is reserved for private]

    Class C Subneting

    Mask

    bitsSubnet Mask # of Host # of N/Ws

    /24 255.255.255.0 2 to power of 8 256-2=254

    /25 255.255.255.128 2 to power of 7 128-2=126

    /26 255.255.255.192 2 to power of 6 64-2=62

    /27 255.255.255.224 2 to power of 5 32-2=30

    /28 255.255.255.240 2 to power of 4 16-2=14

    /29 255.255.255.248 2 to power of 3 8-2=6/30 255.255.255.252 2 to power of 2 4-2=2

    Example:-

    200.10.10.0/282to the power of 4Total Network address=16 Host: (16-2=14 from each network)

    Subnet Mask: 255.255.255.240

    Network

    address

    Host address Range Broadcast

    address

    200.10.10.0 200.10.10.1 to 200.10.10.14 200.10.10.15200.10.10.16 200.10.10.17 to 200.10.10.30 200.10.10.29

    200.10.10.48 200.10.10.33 to 200.10.10.46 200.10.10.47

    200.10.10.64 200.10.10.49 to 200.10.10.62 200.10.10.63

    200.10.10.80 200.10.10.65 to 200.10.10.78 200.10.10.79

    200.10.10.96 200.10.10.81 to 200.10.10.94 200.10.10.95

    200.10.10.112 200.10.10.97 to 200.10.10.110 200.10.10.111

    200.10.10.128 200.10.10.113 to 200.10.10.126 200.10.10.127

    200.10.10.144 200.10.10.129 to 200.10.10.142 200.10.10.143

    200.10.10.160 200.10.10.145 to 200.10.10.159 200.10.10.159

    200.10.10.176 200.10.10.161 to 200.10.10.174 200.10.10.175

    200.10.10.192 200.10.10.177 to 200.10.10.190 200.10.10.191

    200.10.10.208 200.10.10.193 to 200.10.10.206 200.10.10.207200.10.10.224 200.10.10.209 to 200.10.10.222 200.10.10.223

    200.10.10.240 200.10.10.225 to 200.10.10.238 200.10.10.239

    200.10.10.254 200.10.10.241 to 200.10.10.254 200.10.10.255

  • 8/13/2019 Networking Notes for Interview.doc

    22/41

    Class B Subneting

    Host

    bits

    Subnet Mask Host Network

    /16 255.255.0.0 2 the power of 16

    65536-2= 65534

    /17 255.255.128.0 2 the power of 1532768-2= 32766

    /18 255.255.192.0 2 the power of 14 16384-2= 16382

    /19 255.255.224.0 2 the power of 138192-2= 8190

    /20 255.255.240.0 2 the power of 124096-2= 4094

    /21 255.255.248.0 2 the power of 112048-2= 2046

    /22 255.255.252.0 2 the power of 101024-2= 1022

    /23 255.255.254.0 2 the power of 9512-2= 510

    /24 255.255.255.0 2 the power of 8

    256-2= 254

    /25 255.255.255.128 2 the power of 7

    128-2= 126

    /26 255.255.255.192 2 the power of 664-2= 62

    /27 255.255.255.224 2 the power of 532-2= 30

    /28 255.255.255.240 2 the power of 416-2= 14

    /29 255.255.255.248 2 the power of 28-2= 6

    /30 255.255.255.252 2 the power of 134-2= 2

  • 8/13/2019 Networking Notes for Interview.doc

    23/41

    Example:-

    175.10.0.0/202 to the power of 4Total Network address=16 Host: (16-2=14 from each network)

    Network address Host address Range Broadcast

    address Range175.10.0.0 175.10.0.1 to 175.10.14.254 175.10.15.255175.10.16.0 175.10.16.1 to 175.10.30.254 175.10.31.255

    175.10.32.0 175.10.32.1 to 175.10.46.254 175.10.47.255

    175.10.64.0 175.10.48.1 to 175.10.62.254 175.10.63.255

    175.10.80.0 175.10.64.1 to 175.10.78.254 175.10.79.255

    175.10.96.0 175.10.80.1 to 175.10.94.254 175.10.95.255

    175.10.112.0 175.10.96.1 to 175.10.110.254 175.10.111.255

    175.10.128.0 175.10.112.1 to 175.10.126.254 175.10.127.255

    175.10.144.0 175.10.128.1 to 175.10.142.254 175.10.143.255

    175.10.160.0 175.10.144.1 to 175.10.158.254 175.10.159.255

    175.10.176.0 175.10.160.1 to 175.10.174.254 175.10.175.255

    175.10.192.0 175.10.176.1 to 175.10.190.254 175.10.191.255175.10.208.0 175.10.192.1 to 175.10.206.254 175.10.207.255

    175.10.224.0 175.10.208.1 to 175.10.222.254 175.10.223.255

    175.10.240.0 175.10.224.1 to 175.10.238.254 175.10.239.255

    175.10.254.0 175.10.240.1 to 175.10.254.254 175.10.255.255

  • 8/13/2019 Networking Notes for Interview.doc

    24/41

    Class A Subneting

    Host

    bits

    Subnet Mask Host / Subnet Host/Network

    /8 255.0.0.0 2 the power of 24

    16777216-2= 16777214

    /9 255.128.0.0 2 the power of 23

    8388608-2= 8388606

    /10 255.192.0.0 2 the power of 22

    4194304-2= 4194302

    /11 255.224.0.0 2 the power of 21

    2097152-2= 2097150

    /12 255.240.0.0 2 the power of 20

    1048576-2= 1048574

    /13 255.248.0.0 2 the power of 19

    524288-2= 524286

    /14 255.252.0.0 2 the power of 18

    242144-2= 242142

    /15 255.254.0.0 2 the power of 17

    131072-2= 131070

    /16 255.255.0.0 2 the power of 16

    65536-2= 65534

    /17 255.255.128.0 2 the power of 1532768-2= 32766

    /18 255.255.192.0 2 the power of 1416384-2= 16382

    /19 255.255.224.0 2 the power of 138192-2= 8190

    /20 255.255.240.0 2 the power of 124096-2= 4094

    /21 255.255.248.0 2 the power of 112048-2= 2046

    /22 255.255.252.0 2 the power of 101024-2= 1022

    /23 255.255.254.0 2 the power of 9512-2= 510

    /24 255.255.255.0 2 the power of 8

    256-2= 254

  • 8/13/2019 Networking Notes for Interview.doc

    25/41

    /25 255.255.255.128 2 the power of 7

    128-2= 126

    /26 255.255.255.192 2 the power of 664-2= 62

    /27 255.255.255.224 2 the power of 532-2= 30

    /28 255.255.255.240 2 the power of 416-2= 14

    /29 255.255.255.248 2 the power of 28-2= 6

    /30 255.255.255.252 2 the power of 14-2= 2

    Example:-

    10.0.0.0/23 2 to the power of 15Total Network address=768 Host: (2 to the power of 9 =512host

    from each network)

    Network address Host address Broadcast

    address10.0.0.0 10.0.0.1 to 10.0.1.254

    10.0.2.1 to 10.0.1.254

    10.0.4.1 to 10.0.1.254

    10.0.6.1 to 10.0.1.254

    10.0.8.1 to 10.0.1.254

    10.0.10.1 to 10.0.1.254

    10.0.12.1 to 10.0.1.254

    10.0.14.1 to 10.0.1.25410.0.16.1 to 10.0.1.254

    10.0.18.1 to 10.0.1.254

    10.0.20.1 to 10.0.1.254

  • 8/13/2019 Networking Notes for Interview.doc

    26/41

    DEVELPOMENT OF TCP/IP

    Require: -Media convertor, MSAU, Repeaters

    MSAU: - Multi Station Access Unit

    Signal Generator: - It separates the signal& Noise..

    --------------------------------

    MSAU: - it is used for IBM Token Ring.

    Repeaters: - It is a physical layer of OSI Model.

    Drawback of Repeaters: - it will amplify the signals known as repeaters

    Media convertor: - It is a small box & it is a device which converts input fibre optic cable to cable to fibreoptic cable & output fibre optic cable to converting to the UTP cable is known as media convertor.

    Connect the Fibre optic cable requires: -

    1) SC: - Subscriber connector2) ST: - Straight trip3) Patch cards

    Advantages of Fibre optic cable

    1) Cheap: - Fiber optic cables cost less than copper wire, making optical cables a more economicalchoice when transmitting data over large distances.

    2) Secure: - Fiber optic cables offer more secure communications because they are highly resistantto tapping, radio frequency interference and jamming. The United States Department ofDefense has been using fiberoptics for secure communications for more than 25 years.

    3) Low Attenuation: - Fiber optics experience very little data loss, even over long distances,

    because light travels through the fiber without experiencing attenuation or a loss of intensity over

    time.

    4) Space Saver: - A single fiber optic cable can carry significantly more data than a single electrical

    cable, which saves space within a building or other small space.

    5) Low Attenuation: - Fiber optics experience very little data loss, even over long distances,because light travels through the fiber without experiencing attenuation or a loss of

    intensity overtime.

    PC1 PC2

    http://www.ehow.com/facts_5147482_advantages-fiber-optic-cable.htmlhttp://www.ehow.com/optics/http://www.ehow.com/facts_5147482_advantages-fiber-optic-cable.htmlhttp://www.ehow.com/optics/http://www.ehow.com/facts_5147482_advantages-fiber-optic-cable.html
  • 8/13/2019 Networking Notes for Interview.doc

    27/41

    802.6 DQDB {Distributed Queue Dual-bus}

    It is a distributed multi-accessnetwork.

    a. Supports integratedcommunications using a dual bus and distributed queuing,b. Provides access tolocal ormetropolitan area networks

    c. Supports connectionless data transfer,connection-oriented data transfer, andisochronouscommunications, such as voice communications.

    802.2 LLC Sub layer {Link link control}

    The Logical Link Control (LLC) data communication protocol layer is the upper sub-layer of theData

    Link Layer (which is itself layer 2, just above thePhysical Layer)in the seven-layerOSI reference model.It providesmultiplexing andflow control mechanisms that make it possible for several network protocols(IP,IPX)to coexist within a multipoint network and to be transported over the same network media.

    The LLC sub-layer acts as an interface between the Media Access Control (MAC) sub layer and the

    network layer.It is the same for the various physical media (such as Ethernet,token ring,andWLAN).

    As theEther type in anEthernet II framing formatted frame is used to multiplex different protocols on topof the Ethernet MAC header it can be seen as LLC identifier.

    802.7 Broad band N/W

    The IEEE Broadband Technical Advisory Group, chartered to develop standards for definition of a

    broadband cable plant design and establish guidelines for LAN construction within a physical facilitysuch as a building. This standard has been withdrawn.

    An IEEE standard for a broadband local area network (LAN) using coaxial cable. This standard was

    developed for cable Internet companies.

    802.11 wireless communication

    A WirelessLocal Area Network (WLAN) links two or more devices using some wireless distributionmethod (typically spread-spectrum or OFDM radio), and usually providing a connection through anaccess point to the wider internet. This gives users the mobility to move around within a local coveragearea and still be connected to the network.

    Wireless LANs have become popular in the home due to ease of installation, and the increasing

    popularity of laptop computers. Public businesses such as coffee shops and malls have begun to offer

    wireless access to their customers; sometimes for free. Large wireless network projects are being put upin many major cities:New York City,for instance, has begun a pilot program to cover all five boroughsof the city with wirelessInternet access.

    http://en.wikipedia.org/wiki/Accesshttp://en.wikipedia.org/wiki/Telecommunicationhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Metropolitan_area_networkshttp://en.wikipedia.org/wiki/Telecommunication_connectionhttp://en.wikipedia.org/wiki/Isochronoushttp://en.wikipedia.org/wiki/Protocol_(computing)http://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Physical_Layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Multiplexinghttp://en.wikipedia.org/wiki/Flow_controlhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/IPXhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Ethertypehttp://en.wikipedia.org/wiki/Ethernet_II_framinghttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Spread_spectrumhttp://en.wikipedia.org/wiki/OFDMhttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/New_York_Cityhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/New_York_Cityhttp://en.wikipedia.org/wiki/Laptophttp://en.wikipedia.org/wiki/OFDMhttp://en.wikipedia.org/wiki/Spread_spectrumhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Ethernet_II_framinghttp://en.wikipedia.org/wiki/Ethertypehttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Token_ringhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/IPXhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Flow_controlhttp://en.wikipedia.org/wiki/Multiplexinghttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Physical_Layerhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Data_Link_Layerhttp://en.wikipedia.org/wiki/Protocol_(computing)http://en.wikipedia.org/wiki/Isochronoushttp://en.wikipedia.org/wiki/Telecommunication_connectionhttp://en.wikipedia.org/wiki/Metropolitan_area_networkshttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Telecommunicationhttp://en.wikipedia.org/wiki/Accesshttp://en.wikipedia.org/wiki/Access
  • 8/13/2019 Networking Notes for Interview.doc

    28/41

    802.10 Local Area Network / Wide Area Network

    1. Un-patched servers

    Server systems used within the corporate network, both ones exposed to the internet, and internalservers that have no direct connection to the internet represent a potential major security risk.

    While most IT departments would claim that they are diligent about applying patches as soon as theyare available, this risk has to be taken very seriously as even large companies (Microsoft for example)

    have failed to patch all servers in a timely manner, leading to disruption of internal network traffic byWorms like Code Red and its variants. (Particularly at risk are internal servers that may be neglected

    because they dont connect directly to the internet)

    2. Un-patched client software

    Many common and freely available internet client applications, in particular Internet Explorer,Outlook Express, and Outlook contain security vulnerabilities that may be exploited by a large number ofvariations on Worm or Viral code. Many of the variations will slip past anti-virus software for several

    days before anti-virus software makers add their signatures to their software.

    Many of these threats can be negated by making sure that all web browsing and e-mail software is

    regularly updated with all available security patches.

    In the particular case of e-mail attachments, the single most dangerous and common security threattoday, Using Microsoft Outlook 2000 patched to at least service release 2 and having the extended

    attachment security option installed completely blocks all executable content in email attachments.Microsoft Office XP includes the dangerous attachment blocking automatically.

    It should be noted that no version of Microsofts free Outlook Express offers effective blocking of

    dangerous attachments and users of Outlook Express should therefore have an up to date anti-virus utilityinstalled on their system in addition to training on what attachments are safe to open.

    3. Insecure peer to peer file sharing

    Individual users computers often have file and printer sharing turned on, allowing files to be copied

    directly between computers within an office. While this is very convenient and often essential toworkgroup productivity, care must be taken when deciding what folders to share.

    Workstation computer operating systems generally offer much less security than server operating

    systems. Network aware worms and viruses may take advantage of unprotected shared folders to spreadfrom machine within a LAN. To prevent the possible spread of viruses between computers the root folder,

    program folders, and operating system folders should never be shared.

    Only folders containing data files should be shared, and confidential data that must be shared should

    be stored on a server where more security is available.

    4. Insecure passwords

    When possible, any resources shared on a network should be protected by allowing access only with a

    valid user name and password combination. Passwords should be difficult to guess, and not shared or leftin plain sight (i.e. stuck to the monitor.)

    A strong password policy allows access to resources to be restricted as needed, to working hours, and

    an individuals access to confidential data can be disabled immediately upon termination.

  • 8/13/2019 Networking Notes for Interview.doc

    29/41

    Protecting the Network

    Being aware of the above threats and following the guidelines above will provide a reasonable level of

    safety for a corporate network, but additional steps are usually taken to further reduce security risks.

    Firewalls and Network Address Translation

    Most networks have the added security of a hardware or software firewall that blocks and discards anytraffic coming into the network that is not expected. Computers behind the firewall usually are assignedspecial IP (Internet Protocol) addresses that cannot be routed over the internet.

    Network address translation is performed by a gateway router or proxy server (often integrated withthe firewall) that allows computers with non-routable addresses to make requests from the internet.

    There is no way that unsolicited traffic from the internet can de directed to a computer with a non-routable address unless the firewall/router etc. has been specifically programmed to pass traffic to a

    particular server (a web or mail server for example) behind the firewall.

    Unfortunately a firewall cannot prevent hostile applications running on individual workstations (suchas Trojans, Viruses, and Worms) from opening security holes from inside a network, as the traffic can

    appear to be perfectly normal.Programs like Zone Alarm (which has a free version) try to identify suspicious outgoing traffic, but

    these need to be installed on each individual workstation and may be of limited usefulness because of a

    large number of false alarms.

    The Bottom Line

    Even If all of the above suggestions are followed to the extreme, there is still the chance thatsomething can get past even the best planned network security; the internet will never be completely safe.

    These suggestions should in most cases limit potential damage to a single computer. The failure tofollow these suggestions, in particular allowing unsafe peer to peer file sharing with inadequate or non-existent passwords could allow a hostile application to spread to a large number of computers

    Expand

    1 FAT File Allocation Table2 LAN/N/W Local Area Network3 WAN Wide Area Network

    4 CAN Campus Area Network

    5 MAN Metropolitan Area Network

    6 NIC Network Interface Card

    7 UTP Unshielded Twisted Pair

    8 STP Shielded Twisted Pair

    9 PXE Pre-Execution Environment

    10 MAC Media Access Control

    11 IBM International Business Machine

    12 AWG American Wire Gauge

    13 CDDI Copper Distributed Data Interface

    14 FDDI Fibre Distributed Data Interface

    15 TPI Twisted Per Inch

    16 EMI Electro Magnetic Interface

    17 AUI Attachment Unit Interface

  • 8/13/2019 Networking Notes for Interview.doc

    30/41

    18 FDM Frequency Division Multiplexing

    19 TCP/IP Transmission Control Protocol/Internet Protocol

    20 IPX/SPX Internetworking packet Exchange/Sequential Packet Exchange

    21 NEUI Net Extend User Interface

    22 BNC British Novell Connector

    23 OSI Open System Interconnector Interface24 ISO International Standardization For Organization

    25 UDP User Datagram Protocol

    26 IP Internet Protocol

    27 DHCP Dynamic Host Configuration Protocol

    28 INIC Internet Network Information Centre

    29 ARCN Attachment Resources Computing Network

    30 LTAP Local Talk Access Protocol

    31 TTAP Token Talk Access Protocol

    32 PAP Print Access Protocol

    33 ATDSP Apple Talk Data Steam Protocol

    34 ATSP Apple Talk Session Protocol

    35 DGDP Data Gram Delivery Protocol36 ZIP Zone Information Protocol

    37 RTMP Routing Table Management Protocol

    38 ATTP Apple Talk Transmission Protocol

    39 NNTP Network News Transmission Protocol

    40 FQDN Fully Qualified Domain Name

    41 WINS Windows Internet Name Service

    42 DNS Domain Name System Or Service

    43 POP Post Office Protocol

    44 HTML Hyper Text Markup Language

    45 HDLC High Level Data Link Control

    46 SDLC Sequential Data Link Control47 PPP Point To Point Protocol

    48 SLIP Serial Line Internet Protocol

    49 CLP Command Line Interface

    50 IOS Internetworking Operating System

    51 HAL Hardware Abstraction Layer

    52 NDS Novell Directory Service

    53 ADS Active Directory Service

    54 RAS Remote Access Service

    55 CSN Client Services Netware

    56 GSN Gateway Services Netware

    57 LLC Logical Link Control

    58 APIPA Auto Private Internet Protocol Address59 CSMA/CA Carrier Sense L=Multi Access/Collision Avoidance

    60 CSMA/CD Carrier Sense Multiple Access/Collision Detection

    61 QOS Quality Of Services

    62 MAU Multistation Access Unit

    63 PIG Packet Internet Grapher

    64 IEEE Institute Of Electrical And Electronics Engineering

    65 NLSP Netware Link State Protocol

  • 8/13/2019 Networking Notes for Interview.doc

    31/41

    66 OSPP Open Shortest Path Protocol

    67 RIP Routing Information Protocol

    68 SPF Shortest Path First

    69 DQDB Distributed Queue Data Bus

    70 ISDN Internet Service Digital Network

    71 ST Straight Trip

    72 SC Subscriber Connector

    73 DOD Department Of Defense

    74 ARPA Advance Research Project Agency

    75 FTP File Transfer Protocol

    76 SMTP Simple Mail Transfer Protocol

    77 TFP Trivial File Transfer Protocol

    78 HTTP Hyper Tie Transfer Protocol

    79 ARP Address Resolution Protocol

    80 RARP Reverse Address Resolution Protocol

    81 ICMP Internet Control Message Protocol

    82 SNMP Simple Networking Manage Protocol

    83 FPN File & Printer Netware84 CSN Client Service Netware

    85 GSN Gateway Service Netware

    86 RPC Remote Processor Call

    87 DCE Data Communication Equipment

    88 BRI Binary Rate Interface

    89 ASC Anolog Switch Connection

    90 DSC Digital Switch Connection

    92 TDM Time Division Multiple

    93 ATM Asynchronous Transfer Mode

    94 MC Microsoft Challenge

    95 RADUI Remote Authentication Dial In User Service

    96 SLIP Serial Line Internet Protocol97 CHAP Challenge Handshake Authentication Protocol

    98 EAP Extensible Authentication Protocol

    99 PAP Password Authentication Protocol

    100 L2TP Layer 2 Tunneling Protocol

    101 BAP Bandwidth Allocation Protocol

    102 PPTP Point To Point Tunneling Protocol

    103 SMART Self Monitoring Analysis Receiving Transceiver

    104 TDRM Time Domain Reflect meter

    105 CHSAP Challenge Hand Shake Authentication Protocol

  • 8/13/2019 Networking Notes for Interview.doc

    32/41

    ACTIVE DIRECTORY SERVICES

    An active directory is a directory structure used on Microsoft Windows based computers and servers tostore information and data about networks and domains

    Work group

    In workgroup model with a single user account user can login from only from that local user system

    where the account is created but he cant login from all the system.

    In work group model only local users can be created

    Note:Administrator built in user& Administrators built in group

    Converting workgroup model to Domain Model

  • 8/13/2019 Networking Notes for Interview.doc

    33/41

    Server act like a

    1) Stand-alone server2) Member server3) Domain controller

    4) Additional domain controller

    Standalonealone server

    Standalone servers are independent of domain controllers on the network. They are not domain membersand function more like workgroup servers. In many cases a standalone server is configured with aminimum of security control with the intent that all data served will be readily accessible to all users.

    Member server

    Member servers

    A member server is a computer that:

    Runs an operating system in the Windows 2000 Server family or the Windows Server 2003

    family.

    Belongs to a domain.

    Is not a domain controller.A member server does not process account logons, participate in Active Directory replication, or storedomain security policy information.

    Member servers typically function as the following types of servers: file servers, application servers,

    database servers, Web servers, certificate servers, firewalls, and remote access servers. For more

    information about server roles, seeServer roles.

    The following security-related features are common to all member servers:

    Member servers adhere to Group Policy settings that are defined for the site, domain, or

    organizational unit.

    Access control for resources that are available on a member server.

    Member server users have assigned user rights.

    Member servers contain a local security account database, the Security Accounts Manager(SAM).

    Domain controller

    Domain controllersA domain controller is a computer that:

    Runs an operating system in the Windows 2000 Server family or the Windows Server 2003family.

    http://technet.microsoft.com/en-us/library/cc756962(WS.10).aspxhttp://technet.microsoft.com/en-us/library/cc756962(WS.10).aspx
  • 8/13/2019 Networking Notes for Interview.doc

    34/41

    Uses Active Directory to store a read-write copy of the domain database, participate inmultimaster replication, and authenticate users.

    Domain controllers store directory data and manage communication between users and domains,including user logon processes, authentication, and directory searches. Domain controllers synchronizedirectory data using multimaster replication, ensuring consistency of information over time.

    Additional domain controller

    If you already have one domain controller in a domain, you can add additional domain controllers to the

    domain to improve the availability and reliability of network services. Adding additional domaincontrollers can help provide fault tolerance, balance the load of existing domain controllers, and provide

    additional infrastructure support to sites.

    More than one domain controller in a domain makes it possible for the domain to continue to function if adomain controller fails or must be disconnected. Multiple domain controllers can also improve

    performance by making it easier for clients to connect to a domain controller when logging on to thenetwork. You can add additional domain controllers over the network or from backup media.

    Before adding domain controllers you should thoroughly understand Active Directory and therequirements necessary to set up additional domain controllers in an existing domain

    The command used to install active directory services

    DCPROMOto Install Domain Controller Promote

    DCPROMOto Demote or Uninstall

    Points

    1) Active directory services to a standalone server will convert to a domain control

    2) To convert standalone server to domain controller install ADS

    Before installing ADS

    A) The system must have at least one partition formatted with NTFS 5.0

    B) The N/W card has been configured properly.

    3) In standalone server we can create the local user can be created

    4) By converting standalone server to domain controller you cannot create local users

    5) To login from the clients end to a domain controller connect the clients or joint the clients to amember of domain controller.

    6) ADScan be installed only on windows 2000, 2003 server family. It cannot be installed on 2000 orXP Professional.

    7) In 2000 or XP professional only local users can be created.

    8) When I connect the standalone server to a member of domain controller it will become MemberServer.

    9) From the member server. The administration can be done but the directory will be updated indomain controller not the member server

  • 8/13/2019 Networking Notes for Interview.doc

    35/41

    10)Disjoining the member server from a domain controller will convert to a standalone server.

    11)The process of transferring the database from one system to another system called Replication.

    12)To support the fault tolerance creates one additional domain controller where it will keep anadditional copy of directory database.

    13)The database updated in the domain controller will be replicated to Additional DomainController.

    Points

    a) When I connect between 2 different parent by default there is no relational ship.

    b) In this case users in one domain cannot authenticate in the other domain & users in the otherdomain cannot authenticate in this domain.

    c) In this case user has to manually establish the relationship. This relationship is known asTRANSITIVE TRUST

    d) NON TRANSTIVE TRUSTestablish by in one way.e) B/W parent & child domain by default a 2way trust relationship will establish by default this

    is known as Transitive Trust.Means users in one domain can authenticate in the otherdomain & users in the other can authenticate in this domain because both the domains are

    Trusting B/W each other.

    A one way Non Transitive Trust

    Pc1 Pc 2 Pc 3 Trusted Pc1 Pc 2 Pc 3 Trusting

    In this Trust one domain has to be configured as Trust Domain. (Where the user account are their)

    and the other domain has to be configured as Trusting Domain.

    HOD.COM STAFF.COM

  • 8/13/2019 Networking Notes for Interview.doc

    36/41

    In the one way Non Transitive Trust as shown in the above figure users in the MD domain canauthenticate in the Staff.com domain but users in the Staff.com domain cannot authenticate in the

    MD.com.The arrow indicates Trusted to Trusting.

    Parent Domain

    Schema

    A schema is a set of rules which defines the tree structure.

    A collection of tree are Known as Forest.

    By default name of the active directory database NTDS

  • 8/13/2019 Networking Notes for Interview.doc

    37/41

    PROFILE

    Profile: user desktop environment

    Profile is divided by 2 types

    1) Software profile

    2) Hardware profile

    Local profile:Stored in the C:\Documents and Settings\username folder. The profiles file is

    NTUSER.DAT in the directory called by the user's name.

    Drawback: the user is not getting the same desktop in the other system whenever you login.

    Mandatory profile:Which discards any changes the user makes to their profile at logoff time, can be

    implemented by modifying the name of the user profile file from ntuser.dat to ntuser.man. The ntuser.ini

    file is used to set up the user roaming profile components that are not copied to the server. The

    ntuser.dat.log file is used for ntuser.dat file recovery in the case of an error. Additional folders in thec:\documents and settings\username folder are: Desktop, Start Menu, My Documents, and Cookies.

    User can change the desktop

    Roaming Profile:Stored on an NT server and downloaded to the computer that the user logs onto. This

    way the same user's profile can be available on any machine.

    It is profile which will be updated in the Domain controller.

    Disadvantage:in roaming profile whenever the user logoff the changes will be updated

    Drawback:background changes are updated.

  • 8/13/2019 Networking Notes for Interview.doc

    38/41

    RAID

    (Redundant Array of Independent Disks)

    BASIC DYNAMIC

    Manufacture Disk Not available

    Partition Volume

    Support all OS 2000 family

    Convert basic to dynamic Disk Cantconvert

    Simple Volume:The process of extending the size within a single drive is known as simple volume.

    We can create volumes after converting basic disks to dynamic mini single disk & up to 32 disks is

    required. In simple volume we can extend the volumes as much as possible with in the disk region.

    Simple volume is not fault tolerance.

    Spanned volume:after upgrading as dynamic from the basic disk we can create spannedvolume

    We can extend the size of a volume by utilizating the free spaces from more than 1 Disk.

    At start writing the 1stdisk & later on finishing that it goes to 2ndhard disk.

    Data will be written one after another

    It wont support fault tolerance

    Cant extend system partition further.

    Only NTFS partition can be extended

    Uneven size of space from different disks can be put together & create a volume.

    If any 1 disk fails the whole disk will crush.

    RAID 0 OR Stripe Volume

    It requires mini-2 HDD & Maxi -32HDD

    On this volume we can have an even space from all the disks & put together & create a volume. It will

    take the least space from the disk & create a volume.

    Data will be written simultaneously in the entire disk at a time.& it can be extended.

    It will uses for even sizes and performance.

    Disadvantage:It wont support fault tolerance.There is no Redundancy

  • 8/13/2019 Networking Notes for Interview.doc

    39/41

    RAID 1 ORMirroring & Duplexing Volume

    In order to create Mirroring 2HDD mini & maxi 2HDD & we should combine the HDD of having

    same R P M (Rotation per Minute).

    After creating mirrored volume data will be automatically copied as its on the other disks.

    If we cannot 2 HDD in a particular IDE then it becomes Mirroring. In case one HDD from to IDE 0 &

    one HDD from IDE-1 then it becomes Duplexing.

    It support fault tolerance.

    RAID 5 ORStripping with parity Volume

    It require mini 3 HDD Maxi=32 HDD

    It supports fault tolerance here also only even space of all the disks may be clubbed.

    In this method 67% of the data may be written in the entire disk & 33% of the space will be resources for

    the parity information.

    In this method we can break the Mirroring that makes 2 separate volumes & there will be no fault

    tolerance. & we can remove disk that makes it will remove whole disk.

    Bridge

    HUB HUB

    pc1 2 3 4 5 6 7 pc1 2 3 4

    Port 1 Port 2

    A network bridge, also known as a layer 2 switch, is a hardware device used to create a connection

    between two separate computer networks or to divide one network into two. Both networks usually usethe same protocol;Ethernet is an example of a protocol. Network devices include, but are not limited to,

    Personal Computers (PCs), printers, routers, switches and hubs. Devices connected to a network via anEthernet adapter card have what is known as a Media Access Control (MAC) address, also called a

    physical or hardware address. It is this address that uniquely identifies a device to a bridge that can thendetermine to which network the device is connected.

    The principal function of a networkbridge is to forward data based on the MAC address of the sendingand receiving devices. This operation helps to eliminate what are known as collision domains. One way ofdefining a collision domain is a network in which one device, also called a node, and forces every otherdevice to listen when it is transmitting data packets. Another definition states that a collision domain

    exists when two or more devices attempt to transmit information at the exact same time. Networks

    Bridge

    http://www.wisegeek.com/what-is-a-computer.htmhttp://www.wisegeek.com/what-is-ethernet.htmhttp://www.wisegeek.com/what-are-personal-computers.htmhttp://www.wisegeek.com/what-is-pcs.htmhttp://www.wisegeek.com/what-is-pcs.htmhttp://www.wisegeek.com/what-are-personal-computers.htmhttp://www.wisegeek.com/what-is-ethernet.htmhttp://www.wisegeek.com/what-is-a-computer.htm
  • 8/13/2019 Networking Notes for Interview.doc

    40/41

    running Carrier Sense Multiple Access/Collision Detection (CSMA/CD) should, intheory,be protectedfrom collisions occurring, but CSMA/CD can fail.

    Whenever collisions occur, the efficienttransmission of data packets is greatly compromised. The more

    devices that are on a network trying to transmit data, the greater the chance for a collision to occur. Anetwork bridge can be used to segment one network into two, thereby reducing the number of devices

    competing for transmission privileges. For example, if network A has 20 devices, there is the likelihoodthat two or more of them will attempt to transmit data at the same time and cause a collision. If a network

    bridge is added, it can split network A into networks A and B of 10 devices each.

    Once the network bridge is incorporated, it will begin to "listen" to the transmission of data performed bydevices on the two networks. It accomplishes this by recording the MAC address of the devices in a tablethat it automatically generates without being programmed to do so. When the first device transmits data,

    the network bridge will add its MAC address to what is known as a forwarding table for future reference.The bridge also looks at the MAC address of the destination or receiving device. If it does not appear in

    its table, the bridge will broadcast the data packet to all devices on both networks to locate the intendeddestination.

    Forwarding tables are not instantly built, rather the network bridge has to wait until it receives a

    transmission from a device before it can learn its MAC address. MAC addresses of receiving devices alsohave to be learned via broadcast, a search for the location of the destination. Once the destinationresponds, its address is also added to the forwarding table of the network bridge. Eventually, all MAC

    addresses will be captured and data packets will be efficiently routed straight to their destination. Thiswill happen without all devices having to listen to one transmitting device.

    When the sending and receiving devices are on the same network, no forwarding of data packets takes

    place. If they are on opposite networks, the bridge will forward the information. The prevention ofcollisions is not the only advantage of using bridges; they also are used to control the flow of informationto maintain privacy. When a device transmits, it is seen by the bridge as a MAC address that belongs to

    one of two separate networks, and if the sending and receiving devices are on the same network, the datawill not be forwarded. This is one way anetwork administrator might maintain privacy of information.

    Features of bridge

    Which isolates 2 different collision domains.

    Which will doubles the bandwidthIt reduces the traffic

    Disadvantage

    In bridge all the ports must have the same N/W ID. Whereas using router we cannot different N/Ws.

    Advantage

    Different types of N/Ws can be connected like

    1) Ethernet with token ring

    2) Token ring with Ethernet.

    http://www.wisegeek.com/what-is-a-theory.htmhttp://www.wisegeek.com/what-is-a-theory.htmhttp://www.wisegeek.com/what-is-a-theory.htmhttp://www.wisegeek.com/what-is-a-transmission.htmhttp://www.wisegeek.com/what-is-a-network-administrator.htmhttp://www.wisegeek.com/what-is-a-network-administrator.htmhttp://www.wisegeek.com/what-is-a-transmission.htmhttp://www.wisegeek.com/what-is-a-theory.htm
  • 8/13/2019 Networking Notes for Interview.doc

    41/41

    This is possible because bridge acts like a translator.

    Which accept the frame from an Ethernet n/w translated into a format that will be understood by the token

    ring n/w & (Viceversa)

    DIFFERENCE BETWEEN BRIDGE AND ROUTER

    BRIDGE ROUTER

    1 Built table based on MAC address Built table based on the network

    address

    2 All the ports must have the same network number It can connect different network

    number

    3 Unknown address will be forward It will filter the unknown address

    4 Forward the broad cast address It wont forward the broadcastaddress

    DIFFERENCE BETWEEN BRIDGE AND SWITCH

    BRIDGE SWITCH

    1 Switch mode: store & forward Store & forward

    2 Duplexing: Function in only duplexing Function in both duplexing &fullduplexing

    3 FPS: Switch will have more FPS(50,000) >1 Million

    4 Ports: (2 TO 16) 100

    The bridge will forward the unknown addresses to all the other ports from where it receives the frame.

    Bridge uses a protocol spanning tree protocol. (STP)

    Spanning tree protocol: is set of rules which dynamically select the path by communicating with the

    bridges when the bridges are connected in parallel to provide the redundancy.