+ All Categories
Home > Documents > EPS_Technical Material.doc

EPS_Technical Material.doc

Date post: 28-Feb-2018
Category:
Upload: anonymous-druqetqca
View: 219 times
Download: 0 times
Share this document with a friend

of 24

Transcript
  • 7/25/2019 EPS_Technical Material.doc

    1/24

    1) What is Active Directory

    Active Directory is a directory service used to store information about the networkresources across a domain.

    AnActive Directory(AD) structure is a hierarchical framework of objects. The objects fallinto three broad categories - resources (e.g. printers services (e.g. e-mail ) and users

    (accounts or users and groups). The AD provides information on the objects organi!esthe objects controls access and sets security.

    2) What are FSMO Roles? Explain Each Role

    Domain naming master. This domain controller manages the addition and removal ofdomains in the forest. A forest can have only one domain naming master which can betransferred to another domain controller through the Active Directory Domains and Trustssnap-in.

    Schema master. The schema master controls updates to the domain schema data.There is one schema master in the entire forest. "t can be transferred to another domaincontroller through the Active Directory #chema $aster snap-in.

    D! Em"lator master. "n a mi%ed &indows ' and &indows T environment the*D+ ,mulator master supports the D+s. Thus it manages user account and passwordchanges and forwards that information to the &indows T D+. "n a native mode&indows ' environment the *D+ ,mulator master receives preference in thereplication of user account passwords. efore a logon fails it is checked for updatedinformation. This master role can be transferred to another domain controller through the

    Active Directory sers and +omputers snap-in.

    Relative #D master. A single relative "D master in each domain of a tree manages theallocation of se/uential relative "Ds (0"Ds) to each of the domain controllers. This makesall security "Ds (#"Ds) created in a domain relative to the domain controller. This masterrole can be transferred to another domain controller through the Active Directory sers

    and +omputers snap-in.#n$rastr"ct"re master. The infrastructure master is responsible for managing group anduser references. ,%pect a delay in changes to user g when they are made acrossdomains. pdates to other domains are made by the infrastructure master domaincontroller via a process called multimaster replication. This master role can be transferredto another domain controller through the Active Directory sers and +omputers snap-in.

    %) What is a &lo'al !atalog

    The 1lobal +atalog (1+) has two primary functions. 2irst it acts as a domain controller thatstores object data and manages /ueries about objects and their most common attributes (calledthe 1lobal +atalog *artial Attribute #et or *A#). #econd it provides data that permits network

    logon. "n single domain controller environments the Active Directory and 1+ reside on the sameserver. &here multiple domain controllers e%ist as we discuss later it is often advisable to movethe 1+ to its own dedicated domain controller. All domain trees have a 1+ and must reside on adomain controller.

    () What are &ro"p olicies

  • 7/25/2019 EPS_Technical Material.doc

    2/24

    1roup policies are used by administrators to configure and control user environmentsettings. 1roup *olicy 3bjects (1*3s) are used to configure group policies which areapplied to sites domains and organi!ational units (3s).

    ) What is the *i$$erence 'et+een a Domain an* Wor,gro"p

    &indows has two modes of operation - &orkgroup and Domain. Depending on theenvironment that your computer is in you will be running in one of these two modes.$ost home and small business environments will be &orkgroup and most mid- to largebusinesses will run in domain mode. There are different features and capabilitiesdepending on each and each serve a purpose

    &orkgroups can be best understood as a loosely connected group of computers. Theyrely on each other for nothing but they are there to share resources should the needarise. There is no centrali!ed management and so there is a low barrier to use. ydefault &indows 4* is in this mode.

    Domains on the other hand provide centrali!ed management and security. ser accessis controlled from a separate server called a domain controller and there is a 5trust6 builtbetween systems in a domain. There are much more robust differences as well.

    Wor,gro"pA workgroup is best understood as a peer-to-peer network. That is each computer issustainable on its own. "t has its own user list it7s own access control and its ownresources. "n order for a user to access resources on another workgroup computer thate%act user must be setup on the other computer.

    "n addition workgroups offer little security outside of basic access control. &indows5share permissions6 are very basic and do not offer any kind of granularity for 5who6 canaccess 5what6 etc.&orkgroups are more than ade/uate though for most small business and home use.

    Domain

    A domain is a trusted group of computers that share security access control and havedata passed down from a centrali!ed domain controller server or servers. Domain+ontrollers handle all aspects of granting users permission to login. They are thegatekeeper. "n addition most modern domains use Active Directory which allows andeven more centrali!ed point for software distribution user management and computercontrols.

    -) What is the relationship 'et+een tree an* a $orest

    Forests. trees. an* *omains

    The framework that holds the objects is viewed at a number of levels. At the top of thestructure is the 2orest - the collection of every object its attributes and rules (attribute

    synta%) in the AD. The forest holds one or more transitive trust-linked Trees. A tree holdsone or more Domains and domain trees again linked in a transitive trust hierarchy.Domains are identified by their D# name structure the namespace. A domain has asingle D# name.

    The objects held within a domain can be grouped into containers called 3rgani!ationalnits (3s). 3s give a domain a hierarchy ease its administration and can give asemblance of the structure of the AD8s company in organi!ational or geographical terms.3s can contain 3s - indeed domains are containers in this sense - and can holdmultiple nested 3s. $icrosoft recommends as few domains as possible in AD and a

  • 7/25/2019 EPS_Technical Material.doc

    3/24

    reliance on 3s to produce structure and improve the implementation of policies andadministration. The 3 is the common level at which to apply group policies which are

    AD objects themselves called 1roup *olicy 3bjects (1*3s) although policies can alsobe applied to domains or sites (see below). The 3 is the lowest level at whichadministrative powers can be delegated.

    As a further subdivision AD supports the creation of Sites which are physical rather than

    logical groupings defined by one or more "* subnets. #ites distinguish between locationsconnected by low-speed (e.g. &A 9* ) and high-speed (e.g. :A ) connections.#ites can contain one or more domains and domains can contain one or more sites. Thisis important to control network traffic generated by replication.

    The actual division of the company8s information infrastructure into a hierarchy of one ormore domains and top-level 3s is a key decision. +ommon models are by business bygeographical location or by "T roles. These models are also often used in combination.

    /) What is the $ile name o$ Active *irectory an* +here is it store*

    2ile name ; TD#.D"T:ocation ;

  • 7/25/2019 EPS_Technical Material.doc

    4/24

    other words the archive attribute is cleared). "f you use a combination of normal and

    incremental backups you will need to have the last normal backup set as well as all

    incremental backup sets to restore your data.

    ormal 'ac,"p

    A normal backup copies all the files you select and marks each file as having been

    backed up (in other words the archive attribute is cleared). &ith normal backups you

    only need the most recent copy of the backup file or tape to restore all of the files. >ou

    usually perform a normal backup the first time you create a backup set.

    acking up your data using a combination of normal backups and incremental backups

    re/uires the least amount of storage space and is the /uickest backup method. ?owever

    recovering files can be time-consuming and difficult because the backup set might be

    stored on several disks or tapes.

    acking up your data using a combination of normal backups and differential backups is

    more time-consuming especially if your data changes fre/uently but it is easier to

    restore the data because the backup set is usually stored on only a few disks or tapes.

    1) What is the *i$$erence 'et+een 3FS an* FA3 $ile system

    file allocation table. 2AT is ancient in computer terms. ecause of its age most operatingsystems-including &indows T &indows @ $ac3# and some versions of "4-offer supportfor 2AT.

    $icrosoft created the new technology file system (T2#) to compensate for the features it felt

    2AT lacked. These features include increased fault tolerance enhanced security and so on.

    !ompati'ilityefore you decide which type of file system to use on a partition you must consider compatibility."f multiple operating systems will access the partition you must use a file system that alloperating systems can read. sually this means using 2AT because of its universal compatibility.3nly &indows T supports T2# partitions.

    Beep in mind however that this limitation applies only to the local machine. 2or e%ample if&indows T and &indows @ are loaded on the same machine and both operating systemsre/uire access to a common partition you must format that partition as 2AT. ?owever if &indowsT is the only operating system on the *+ you can format the partition as T2# even ifcomputers running other operating systems will access the partition across the network.

    4ol"me si5eAnother determining factor is the physical si!e of your partition. 2AT supports partition si!es onlyup to ' 1. "f your partition si!e is larger than ' 1 you must either format it as T2# or break itinto smaller partitions. Beep in mind that T2# has more overhead than 2AT. "f your partition si!eis smaller than ' $ you should use 2AT to avoid losing a major chunk of disk space to theoverhead associated with T2#. The ma%imum si!e of an T2# partition is C , (e%abytes-ane%abyte is 'EF bytes or C'F terabytes).

    Fa"lt tolerance3nce you8ve considered your partition si!e and compatibility issues you have some fle%ibility indetermining which file system is right for you. &hen making this decision you should consider

  • 7/25/2019 EPS_Technical Material.doc

    5/24

    fault tolerance. &indows T offers software support for several alternate disk-access methodsthat increase speed andGor fault tolerance. These options include disk striping and disk stripingwith parity. $any of these options re/uire T2#. "f you8re planning to use a hardware-basedstripe set you can use either file system.

    ,ven without these advanced fault-tolerant options T2# includes built-in fault-tolerantcapabilities well beyond the capabilities of 2AT. 2or e%ample when T2# writes a change to the

    hard disk it makes a record of the change in a log file. "n the event of a power failure or a diskerror &indows T can use these log files to repair your data.

    T2# also repairs hard disk errors automatically without displaying an error message. &hen&indows T writes a file to an T2# partition it keeps a copy of the file in memory. "t then readsback the file to make sure it matches the copy stored in memory. "f the copies don8t match&indows T marks that section of the hard disk as corrupted and won8t try to use it again. "t thenuses the copy of the file stored in memory to rewrite the file to an alternate location on the harddisk.

    The 2AT file system doesn8t offer any of these safety features. &hile 2AT does maintain twocopies of the file-allocation table in case one copy is damaged it8s incapable of automaticallyfi%ing errors. "nstead you must run a utility such as #candisk.

    Sec"rity

    As we mentioned before T2# has a built-in security system. >ou can grant various permissionsto directories and to individual files. These permissions protect files and directories locally andremotely. 2or e%ample if someone were to sit down at a *+ containing restricted files T2#would protect those files.

    "f you8re using 2AT you8re dependent on share permissions for security. #hare permissions willprotect a file across the network but they offer no local protection. A person trying to accessrestricted files could simply sit down at the local *+ and gain full access to these files. Anotherdisadvantage to share permissions is that they can be messy to manage. #uppose you havehundreds of users on a server each with his or her own directories. >ou could potentially end upwith hundreds of shares-and some of them may overlap which creates additional complications.

    File compressionAnother advantage to T2# is its native support for file compression. T2# compression is much

    better than its predecessors. "t offers you the chance to compress individual files and directoriesof your choice. ecause it compresses individual files a minor hard disk problem won8t foul upyour compression scheme and make you lose everything. +ompressing individual files anddirectories also lets you limit compression to seldom-used files. y doing so you won8t slow youroperating system by making it decompress files each time it needs to access them.

    3he system partitionThis article may seem to say that T2# is superior to 2AT and that unless you have a smallpartition or need compatibility with other operating systems you should always use T2#.?owever this isn8t the case.

    As we mentioned earlier T2# partitions are accessible only via &indows T. "f you have a fatalerror with &indows T you can8t simply boot a system disk to a command prompt and fi% aproblem on an T2# partition. To get around this problem $icrosoft recommends installing asecond copy of &indows T on your hard disk and using this copy to repair problems that occur

    on T2# partitions.

    nfortunately this method has some serious drawbacks. 2or starters a second copy of &indowsT could consume up to CH $ depending on which options you choose to load. #econdduring the boot process both copies share common files. Therefore if your system partition (thepartition your *+ boots from) is formatted as T2# and has a problem you may not be able toboot either copy of &indows T to fi% the problem. &hile you may think the odds of a systempartition error are slim remember that many changes you might make to your disk partitionsresult in having to manually update the oot.ini file. "f you incorrectly update this f ile &indows Twill become unbootable. #ince this is an initial boot file on the system partition every installed

  • 7/25/2019 EPS_Technical Material.doc

    6/24

    copy of &indows T would share this file.

    A better solution is to format your system partition as 2AT. "f you8re concerned about securitysimply make the system partition small and don8t place anything other than the &indows Tsystem files on it. 0emember a 2AT partition is safe from a security standpoint as long as nounauthori!ed person has physical access to the machine.

    !onverting to 3FS"f you8ve read this article and wish you could use T2# on some of your partitions that alreadycontain data you can easily convert a partition to T2#. To do so open an $#-D3# *romptwindow and type the following command;

    +39,0T drive; G2#;T2#

    2or e%ample if you want to convert your D drive to T2# you8d replace the word drivewith theletter D as follows;

    +39,0T D; G2#;T2#

    12) 6o+ *o yo" install Active Directory

    *rocedureTo install Active Directory on &indows #erver 'I

    C. +lick Start click R"n type dcpromo and then click O7.

    '. 3n the first page of the Active Directory "nstallation &i!ard click ext.

    ote8

    "f this is the first time you have installed Active Directory you can click Active Directory 6elpto learn more about Active Directory before clicking ext.

    I. 3n the ne%t page of the Active Directory "nstallation &i!ard click ext.

    F. 3n the Domain !ontroller 3ypepage click Domain !ontroller $or a ne+ *omain and

    then click ext.

    H. 3n the !reate e+ Domainpage click Domain in a ne+ $orest and then click ext.

    . 3n the e+ Domain amepage in the F"ll DS name $or ne+ *omainbo% type

    corp.contoso.com and then click ext.

    J. 3n the Data'ase an* 9og Fol*ers page accept the defaults in the Data'ase $ol*er

    bo% and the 9og $ol*erbo% and then click ext.

    . 3n the Share* System 4ol"mepage accept the default in theFol*er locationbo% andthen click ext.

    @. 3n the DS Registration Diagnosticspage click #nstall an* con$ig"re the DS

    server on this comp"ter an* set this comp"ter to "se this DS server as its

    pre$erre* DS Server and then click ext.

  • 7/25/2019 EPS_Technical Material.doc

    7/24

    C. 3n the ermissionspage click ermissions compati'le only +ith Win*o+s 2 or

    Win*o+s Server 2% operating systems and then click ext.

    CC. 3n the Directory Services Restore Mo*e A*ministrator ass+or*page enter a

    password in the Restore Mo*e ass+or*bo% retype the password to confirm it in the

    !on$irm pass+or*bo% and then click ext.

    C'. 3n the S"mmarypage confirm the information is correct and then click ext.

    CI. &hen prompted to restart the computer click Restart no+.

    1() What is DS?

    1) +hat is D6!?Dynamic 6ost !on$ig"ration rotocol(D6!) is a network application protocol used bydevices (DHCP clients) to obtain configuration information for operation in an "nternet *rotocolnetwork. This protocol reduces system administration workload allowing devices to be added tothe network with little or no manual intervention.

    D6! *iscovery

    The client broadcasts on the physical subnet to find available servers. etwork administrators can

    configure a local router to forward D?+* packets to a D?+* server on a different subnet. This

    client-implementation creates a D* packet with the broadcast destination of 'HH.'HH.'HH.'HH orsubnet broadcast address.

    A client can also re/uest its last-known "* address (in the e%ample below C@'.C.C.C). "f the

    client is still in a network where this "* is valid the server might grant the re/uest. 3therwise it

    depends whether the server is set up as authoritative or not. An authoritative server will deny the

    re/uest making the client ask for a new "* immediately. A non-authoritative server simply ignores

    the re/uest leading to an implementation-dependent timeout for the client to give up on the

    re/uest and ask for a new "* address.

    D6! o$$ers

    &hen a D?+* server receives an "* lease re/uest from a client it reserves an "* address for the

    client and e%tends an "* lease offer by sending a D?+*322,0 message to the client. This

    message contains the client8s $A+ address the "* address that the server is offering the subnet

    mask the lease duration and the "* address of the D?+* server making the offer.

    The server determines the configuration based on the client8s hardware address as specified in

    the +?ADD0 field. ?ere the server C@'.C.C.C specifies the "* address in the >"ADD0 field.

    http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://www.isc.org/index.pl?/sw/dhcp/authoritative.phphttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://www.isc.org/index.pl?/sw/dhcp/authoritative.php
  • 7/25/2019 EPS_Technical Material.doc

    8/24

    D6! re:"ests

    A client can receive D?+* offers from multiple servers but it will accept only one D?+* offer and

    broadcast a D?+* re/uest message. ased on Transaction "D field in the re/uest servers are

    informed whose offer the client has accepted. &hen other D?+* servers receive this message

    they withdraw any offers that they might have made to the client and return the offered address to

    the pool of available addresses.

    D6! ac,no+le*gement

    &hen the D?+* server receives the D?+*0,K,#T message from the client the configuration

    processes enters its final phase. The acknowledgement phase involves sending a D?+*A+B

    packet to the client. This packet includes the lease duration and any other configuration

    information that the client might have re/uested. At this point the "* configuration process is

    complete

    1/) +hat is ping ;pac,et internet gropher) < its protocol ;#!M) == ping is "se* to chec,connectivity to an #

    10) +hat are the 'oot options $or a !> list them < +hich option *o +e "se < +hen ;theoption +e get 'y pressing F0 = sa$e mo*e . sa$e mo*e +ith net+or,ing >> / so on>)

    1) +hat is 9A. WA

    21) +ht is $ire+all.

    22) proxy server

    2-) 'oot se:"ence o$ !

    2/) M@R ;master 'oot recor*)

    20) other general OS 'ase* :"estions as +hat options " hv in manage ;rt clic, my comp =manage). +hich logs " hv in event vie+er. etc>>

    2)Di$$erent Servers???

    &inTG'G'IG'

    %)!an Win 6ome E*ition 'e a**e* in a Domain?>>i$ no Why?o

    %1)+hy *oes sa$e mo*e have a 'lac, 'ac,gro"n*?

    9ideo card is disabled or not loaded

    %2)What is RA#D?

    "n computing the acronym RA#D(originally re*"n*ant array o$ inexpensive *is,s now alsoknown as re*"n*ant array o$ in*epen*ent *is,s) refers to a data storage scheme usingmultiple hard drives to share or replicate data among the drives. Depending on the version

  • 7/25/2019 EPS_Technical Material.doc

    9/24

    chosen the benefit of 0A"D is one or more of increased data integrity fault-tolerance throughput or capacity compared to single drives. "n its original implementations its keyadvantage was the ability to combine multiple low-cost devices using older technology into anarray that offered greater capacity reliability speed or a combination of these things than wasaffordably available in a single device using the newest technology.

    Stan*ar* RA#D levels

    A :"ic, s"mmary o$ the most commonly "se* RA#D levels8

    RA#D 8 Stripe* Set

    RA#D 18 Mirrore* Set

    RA#D 8 Stripe* Set +ith arity

    %%)System re:"irements $or *i$$erent servers>?

    %()6o+ m"ch Ram *oes +in server 2% stan*ar* e*ition s"pport?

    LF 1%)Explain Dhcp?>;explain DORA)

    %-)Event vie+er? 9O& $iles&ith Event 4ie+er you can monitor events recorded in eventlogs. Typically a computer storesthe Application #ecurity and #ystem logs

    %0) What is A3. ho+ it +or,?1

    AT is like the receptionist in a large office. :et8s say you have left instructions with thereceptionist not to forward any calls to you unless you re/uest it. :ater on you call a potentialclient and leave a message for them to call you back. >ou tell the receptionist that you aree%pecting a call from this client and to put them through.

    The client calls the main number to your office which is the only number the client knows. &henthe client tells the receptionist who they are looking for the receptionist checks a lookup table thatmatches up the person8s name and e%tension. The receptionist knows that you re/uested thiscall therefore the receptionist forwards the caller to your e%tension.

    Developed by +isco etwork Address Translation is used by a device (firewall router orcomputer) that sits between an internal network and the rest of the world. AT has many formsand can work in several ways;

    %)+hat is OB?

    3rgani!ational nitsM are administrative-level containers on a computer network that allow

    network administrators to organi!e groups of users together so that any changes securityprivileges or any other administrative tasks could be accomplished more efficiently.

    A network administrator will typically create organi!ational units that resemble their company8sbusiness organi!ation. An 3 can be set up for each department. &ithin that department 3there could be subsets or objects that represent users groups customers partners vendors oreven computers and printers on the network.

    1

  • 7/25/2019 EPS_Technical Material.doc

    10/24

    Applying a set of policies or restrictions to an organi!ational unit applies it to all subsets withinthat organi!ation unit. An object placed into a new organi!ation unit inherits all the policies andrights associated with that organi!ational unit.

    3rgani!ational nits are used on systems as a form of identity management a method oftechnology used to automate various administrative applications such as password

    synchroni!ation resetting passwords user provisioning meta directories and consolidatedreporting and auditing.

    (2) classes o$ ##hort for #nternetrotocol #is an address of a computer or other network device on a networkusing "* or T+*G"* . 2or e%ample the number MC.J.C.'IM is an e%ample of such an address.These addresses are similar to addresses used on houses and help data reach its appropriatedestination on a network.

    There are five classes of available "* ranges; +lass A +lass +lass + +lass D and +lass ,while only A and + are commonly used. ,ach class allows for a range of valid "* addresses.elow is a listing of these addresses.

    +lass Address 0ange #upports

    !lass A C...C to C'.'HH.'HH.'HF #upports C million hosts on each of C'J networks.

    !lass @ C'.C..C to C@C.'HH.'HH.'HF #upports H hosts on each of C networks.

    !lass ! C@'..C.C to ''I.'HH.'HF.'HF #upports 'HF hosts on each of ' million networks.

    !lass D ''F... to 'I@.'HH.'HH.'HH 0eserved formulticastgroups.

    !lass E 'F... to 'HF.'HH.'HH.'HF 0eserved.

    FI)what is $A+ address..mention the itN

    "n computer networking a $edia Access +ontrol address ($A+ address) ,thernet ?ardware

    Address (,?A) hardware address adapter address or physical address is a /uasi-uni/ue

    identifierassigned to most network adaptersor network interface cards ("+s) by the

    manufacturer for identification. "f assigned by the manufacturer a $A+ address usually encodes

    the manufacturer8s registered identification number.

    Three numbering spaces managed by the"nstitute of ,lectrical and ,lectronics ,ngineers

    (",,,) are in common use for formulating a $A+ address;

    (()Explain 6"'. S+itch an* Ro"ter8=A h"'is typically the least e%pensive least intelligent and least complicated of the three. "ts jobis very simple; anything that comes in one port is sent out to the others. That8s it. ,very computerconnected to the hub MseesM everything that every other computer on the hub sees. The hub itselfis blissfully ignorant of the data being transmitted. 2or years simple hubs have been /uick andeasy ways to connect computers in small networks.

    A s+itchdoes essentially what a hub does but more efficiently. y paying attention to the trafficthat comes across it it can MlearnM where particular addresses are. 2or e%ample if it sees traffic

    http://www.computerhope.com/jargon/p/protocol.htmhttp://www.computerhope.com/jargon/p/protocol.htmhttp://www.computerhope.com/jargon/m/multicast.htmhttp://www.computerhope.com/jargon/m/multicast.htmhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://www.computerhope.com/jargon/p/protocol.htmhttp://www.computerhope.com/jargon/m/multicast.htmhttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Media_Access_Controlhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Unique_identifierhttp://en.wikipedia.org/wiki/Network_adapterhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineers
  • 7/25/2019 EPS_Technical Material.doc

    11/24

    from machine A coming in on port ' it now knows that machine A is connected to that port andthat traffic to machine A needs to only be sent to that port and not any of the others. The net resultof using a switch over a hub is that most of the network traffic only goes where it needs to ratherthan to every port. 3n busy networks this can make the network significantly faster.

    A ro"teris the smartest and most complicated of the bunch. 0outers come in all shapes andsi!es from the small four-port broadband routers that are very popular right now to the largeindustrial strength devices that drive the internet itself. A simple way to think of a router is as acomputer that can be programmed to understand possibly manipulate and route the data itsbeing asked to handle. 2or e%ample broadband routers include the ability to MhideM computersbehind a type of firewall which involves slightly modifying the packets of network traffic as theytraverse the device. All routers include some kind of user interface for configuring how the routerwill treat traffic. The really large routers include the e/uivalent of a full-blown programminglanguage to describe how they should operate as well as the ability to communicate with otherrouters to describe or determine the best way to get network traffic from point A to point .

    ()Explain the Registry ?

    The &indows registry is a directory which stores settings and options for the operating system for$icrosoft &indows I'-bit versions F-bit versions and &indows $obile. "t contains information

    and settings for all the hardware operating system software most non-operating systemsoftware users preferences of the *+ etc. &henever a user makes changes to +ontrol *anelsettings file associations system policies or most installed software the changes are reflectedand stored in the registry. The registry also provides a window into the operation of the kernele%posing runtime information such as performance counters and currently active hardware

    7eys an* val"es

    The registry contains two basic elements; keys and values

    ?ives

    The 0egistry is split into a number of logical sections or MhivesM.OIP ?ives are generally named bytheir &indows A*" definitions which all begin M?B,>M. They are abbreviated to a three- or four-letter short name starting with M?BM (e.g. ?B+ and ?B:$).

    The ?B,>Q:3+A:Q$A+?", and ?B,>Q+00,TQ#,0 nodes have a similar structure toeach otherR applications typically look up their settings by first checking for them inM?B,>Q+00,TQ#,0=#oftware=9endor8s name=Application8s name=9ersion=#etting nameMand if the setting is not found look instead in the same location under the?B,>Q:3+A:Q$A+?", key. &hen writing settings back the reverse approach is used S?B,>Q:3+A:Q$A+?", is written first but if that cannot be written to (which is usually the caseif the logged-in user is not an administrator) the setting is stored in ?B,>Q+00,TQ#,0

    instead.

    ?B,>Q+:A##,#Q033T (?B+0)

    Abbreviated ?B+0 ?B,>Q+:A##,#Q033T stores information about registered applicationssuch as file associations and 3:, 3bject +lass "Ds tying them to the applications used to handlethese items. 3n &indows ' and above ?B+0 is a compilation of ?B+=#oftware=+lassesand ?B:$=#oftware=+lasses. "f a given value e%ists in both of the subkeys above the one in?B+=#oftware=+lasses is used.OFP

  • 7/25/2019 EPS_Technical Material.doc

    12/24

    ?B,>Q+00,TQ#,0 (?B+)

    Abbreviated ?B+ ?B,>Q+00,TQ#,0 stores settings that are specific to the currentlylogged-in user. The ?B+ key is a link to the subkey of ?B,>Q#,0# that corresponds to theuserR the same information is reflected in both locations. 3n &indows-T based systems eachuser8s settings are stored in their own files called T#,0.DAT and #0+:A##.DAT inside their

    own Documents and #ettings subfolder (or their own sers subfolder in &indows 9ista). #ettingsin this hive follow users with a roaming profile from machine to machine.

    ?B,>Q:3+A:Q$A+?", (?B:$)

    Abbreviated ?B:$ ?B,>Q:3+A:Q$A+?", stores settings that are general to all users on thecomputer. 3n T-based versions of &indows ?B:$ contains four subkeys #A$ #,+0"T>#32T&A0, and #>#T,$ that are found within their respective files located in the

  • 7/25/2019 EPS_Technical Material.doc

    13/24

    Directory #ervice 0estore $ode; This mode is valid only for &indows-based domain controllers.This mode performs a directory service repair.

    De'"gging Mo*e; This option turns on debug mode in &indows. Debugging information can besent across a serial cable to another computer that is running a debugger. This mode isconfigured to use +3$'.,nable oot :ogging; This option turns on logging when the computer is started with any of the#afe oot options e%cept :ast Bnown 1ood +onfiguration. The oot :ogging te%t is recorded inthe tbtlog.t%t file in the oumust log on in all modes by a domain or by the local #ecurity Accounts $anager depending on

    which #afe oot mode you select.

    (/)OS# layers

    !haracteristics o$ the OS# 9ayers

    The seven layers of the 3#" reference model can be divided into two categories; upper layersand lower layers.

    The upper layersof the 3#" model deal with application issues and generally are implementedonly in software. The highest layer the application layer is closest to the end user. oth users

    and application layer processes interact with software applications that contain a communicationscomponent. The term upper layer is sometimes used to refer to any layer above another layer inthe 3#" model.

    The lower layers of the 3#" model handle data transport issues. The physical layer and the datalink layer are implemented in hardware and software. The lowest layer the physical layer isclosest to the physical network medium (the network cabling for e%ample) and is responsible foractually placing information on the medium.

    2igure C-I illustrates the division between the upper and lower 3#" layers.

    2igure C-I Two #ets of :ayers $ake p the 3#" :ayers

  • 7/25/2019 EPS_Technical Material.doc

    14/24

    OS# Mo*el hysical 9ayer

    The physical layer defines the electrical mechanical procedural and functional specifications foractivating maintaining and deactivating the physical link between communicating networksystems. *hysical layer specifications define characteristics such as voltage levels timing of

    voltage changes physical data rates ma%imum transmission distances and physical connectors.*hysical layer implementations can be categori!ed as either :A or &A specifications. 2igureC-J illustrates some common :A and &A physical layer implementations.

    2igure C-J *hysical :ayer "mplementations +an e :A or &A #pecifications

    OS# Mo*el Data 9in, 9ayer

    The data link layer provides reliable transit of data across a physical network link. Different datalink layer specifications define different network and protocol characteristics including physicaladdressing network topology error notification se/uencing of frames and flow control. *hysicaladdressing (as opposed to network addressing) defines how devices are addressed at the datalink layer. etwork topology consists of the data link layer specifications that often define howdevices are to be physically connected such as in a bus or a ring topology. ,rror notification

  • 7/25/2019 EPS_Technical Material.doc

    15/24

    alerts upper-layer protocols that a transmission error has occurred and the se/uencing of dataframes reorders frames that are transmitted out of se/uence. 2inally flow control moderates thetransmission of data so that the receiving device is not overwhelmed with more traffic than it canhandle at one time.

    The "nstitute of ,lectrical and ,lectronics ,ngineers (",,,) has subdivided the data link layer into

    two sublayers; :ogical :ink +ontrol (::+) and $edia Access +ontrol ($A+). 2igure C- illustratesthe ",,, sublayers of the data link layer.

    2igure C- The Data :ink :ayer +ontains Two #ublayers

    The Logical Link Control (LLC)sublayer of the data link layer manages communications betweendevices over a single link of a network. ::+ is defined in the ",,, '.' specification andsupports both connectionless and connection-oriented services used by higher-layer protocols.",,, '.' defines a number of fields in data link layer frames that enable multiple higher-layerprotocols to share a single physical data link. The Media Access Control (MAC)sublayer of thedata link layer manages protocol access to the physical network medium. The ",,, $A+specification defines $A+ addresses which enable multiple devices to uni/uely identify oneanother at the data link layer.

    OS# Mo*el et+or, 9ayer

    The network layer defines the network address which differs from the $A+ address. #omenetwork layer implementations such as the "nternet *rotocol ("*) define network addresses in away that route selection can be determined systematically by comparing the source networkaddress with the destination network address and applying the subnet mask. ecause this layerdefines the logical network layout routers can use this layer to determine how to forward packets.ecause of this much of the design and configuration work for internetworks happens at :ayer Ithe network layer.

    OS# Mo*el 3ransport 9ayer

    The transport layer accepts data from the session layer and segments the data for transportacross the network. 1enerally the transport layer is responsible for making sure that the data is

    delivered error-free and in the proper se/uence. 2low control generally occurs at the transportlayer.

    2low control manages data transmission between devices so that the transmitting device doesnot send more data than the receiving device can process. $ultiple%ing enables data fromseveral applications to be transmitted onto a single physical link. 9irtual circuits are establishedmaintained and terminated by the transport layer. ,rror checking involves creating variousmechanisms for detecting transmission errors while error recovery involves acting such asre/uesting that data be retransmitted to resolve any errors that occur.

  • 7/25/2019 EPS_Technical Material.doc

    16/24

    The transport protocols used on the "nternet are T+* and D*.

    OS# Mo*el Session 9ayer

    The session layer establishes manages and terminates communication sessions.+ommunication sessions consist of service re/uests and service responses that occur between

    applications located in different network devices. These re/uests and responses are coordinatedby protocols implemented at the session layer. #ome e%amples of session-layer implementationsinclude Uone "nformation *rotocol (U"*) the AppleTalk protocol that coordinates the name bindingprocessR and #ession +ontrol *rotocol (#+*) the D,+net *hase "9 session layer protocol.

    OS# Mo*el resentation 9ayer

    The presentation layer provides a variety of coding and conversion functions that are applied toapplication layer data. These functions ensure that information sent from the application layer ofone system would be readable by the application layer of another system. #ome e%amples ofpresentation layer coding and conversion schemes include common data representation formatsconversion of character representation formats common data compression schemes andcommon data encryption schemes.

    +ommon data representation formats or the use of standard image sound and video formatsenable the interchange of application data between different types of computer systems.+onversion schemes are used to e%change information with systems by using different te%t anddata representations such as ,+D"+ and A#+"". #tandard data compression schemes enabledata that is compressed at the source device to be properly decompressed at the destination.#tandard data encryption schemes enable data encrypted at the source device to be properlydeciphered at the destination.

    *resentation layer implementations are not typically associated with a particular protocol stack.#ome well-known standards for video include KuickTime and $otion *icture ,%perts 1roup($*,1). KuickTime is an Apple +omputer specification for video and audio and $*,1 is astandard for video compression and coding.

    Among the well-known graphic image formats are 1raphics "nterchange 2ormat (1"2) Voint*hotographic ,%perts 1roup (V*,1) and Tagged "mage 2ile 2ormat (T"22). 1"2 is a standard forcompressing and coding graphic images. V*,1 is another compression and coding standard forgraphic images and T"22 is a standard coding format for graphic images.

    OS# Mo*el Application 9ayer

    The application layer is the 3#" layer closest to the end user which means that both the 3#"application layer and the user interact directly with the software application.

    This layer interacts with software applications that implement a communicating component. #uch

    application programs fall outside the scope of the 3#" model. Application layer functions typicallyinclude identifying communication partners determining resource availability and synchroni!ingcommunication.

    &hen identifying communication partners the application layer determines the identity andavailability of communication partners for an application with data to transmit.&hen determining resource availability the application layer must decide whether sufficientnetwork resources for the re/uested communication e%ist. "n synchroni!ing communication allcommunication between applications re/uires cooperation that is managed by the application

  • 7/25/2019 EPS_Technical Material.doc

    17/24

    layer. #ome e%amples of application layer implementations include Telnet 2ile Transfer *rotocol(2T*) and #imple $ail Transfer *rotocol (#$T*).

    FACs8

    1) What is Active Directory?2) What are FSMO Roles? Explain Each Role%) What is a &lo'al !atalog?() What are &ro"p olicies?) What is the *i$$erence 'et+een a Domain an* Wor,gro"p?-) What is the relationship 'et+een tree an* a $orest?/) What is the $ile name o$ Active *irectory an* +here is it store*0) What are the *i$$erent types o$ 'ac,"ps explain them) Where is System State an* +hat *oes it contain1) What is the *i$$erence 'et+een 3FS an* FA3 $ile system?11) What is a logical artition an* hysical artition in Active Directory?12) 6o+ *o yo" install Active Directory?1%) !an Active Directory 'e "ninstalle*? #$ yes ho+? #$ no +hy1() What is DS?1) What is ro"ter $re:"ency. A3. ho+ it +or,s. +hat ro"ter *oes. +hich protocol it "ses1-) OS# layer. 3!# mo*el < protocols in each layer1/) What is ping ;pac,et internet gropher) < its protocol ;#!M) == ping is "se* to chec,connectivity to an #10) What are the 'oot options $or a !> 9ist them < +hich option *o +e "se < +hen ;theoption +e get 'y pressing F0 = sa$e mo*e. sa$e mo*e +ith net+or,ing> / so on>)1) What is 9A2) Mother 'oar* components21) What is $ire+all. ho+ *o change settings $or +in*o+s $ire+all. %r* party $ire+alls22) roxy server2%) Ena'ling $ile < printer sharing2() Where *o " $in* a*ministrative tools

    2) Di$$erence 'et+een s+itch < h"' < ro"ter. layers on +hich they +or,2-) @oot se:"ence o$ !2/) M@R ;master 'oot recor*)20) Other general OS 'ase* :"estions as +hat options " have in manage ;right clic, mycomp = manage). +hich logs yo" have in event vie+er. etc>

  • 7/25/2019 EPS_Technical Material.doc

    18/24

    1) What is Active Directory

    2) What are FSMO Roles? Explain Each Role

    %) What is a &lo'al !atalog

    () What are &ro"p olicies

    ) What is the *i$$erence 'et+een a Domain an* Wor,gro"p

    -) What is the relationship 'et+een tree an* a $orest

    /) What is the $ile name o$ Active *irectory an* +here is it store*

    0) What are the *i$$erent types o$ 'ac,"ps explain them

    ) Where is system State an* +hat *oes it contain

    1) What is the *i$$erence 'et+een 3FS an* FA3 $ile system

    11) What is a logical artition an* hysical artition in Active Directory

    12) 6o+ *o yo" install Active Directory

    1%) !an Active Directory 'e "ninstalle*? i$ yes ho+? i$ no +hy

    1() What is DS?

    1) What is ro"ter $re:"ency. A3. ho+ it +or,. +hat ro"ter *oes. +hich protocol it "ses

    1-) OS# layer < protocols in each layer

    1/) +hat is ping ;pac,et internet gropher) < its protocol ;#!M) == ping is "se* to chec,connectivity to an #

    C) &hat is Active DirectoryN

    Ans; An Active Directory (AD) structure is a hierarchical framework of objects which includeresources (e.g. printers) services (e.g. e-mail ) and users (accounts or users and groups) or wecan say AD is a repository service of enterprise wide data

    ') &hat are 2#$3 0olesN ,%plain ,ach 0oleNAns; Although most operations such as creating a user are multi-mastered and can be made byconnecting to any available domain controller some operations are still handled only bydesignated domain controllers. $icrosoft sometimes calls this the 2le%ible #ingle $aster3peration (2#$3) roles. There are five 2#$3 roles.Two of these are per forest;C) #chema $aster; There is only one D+ in the forest acting as the #chema $aster. "t holds themaster copy of the #chema.') Domain aming $aster; There is only one D+ in the forest acting as the Domain aming$aster. "t authori!es the creation and deletion of domains in the forest.

    &ithin each domain there are three further roles.

  • 7/25/2019 EPS_Technical Material.doc

    19/24

    I) *D+ emulator; ,ach domain has a *D+ emulator. As its name suggests it providescompatibility with legacy (TF) D+s and clients. "t also functions as the domain master browsersource for time synchroni!ation within the domain and the single mastering of 1roup *olicies.F) 0"D $aster; ,ach domain also has a 0"D $aster. The 0"D $aster generates a pool of 0elative"Dentifiers and allocates them to other D+s in its domain. ,ach D+ can use a 0"D from its poolwhenever it needs to generate a #"D (#ecurity "Dentifier) for any new security principals object(users groups or computers) that is created. A #"D is a globally uni/ue identifier for a securityprincipal. The 0"D master is also used to single master the movement of security principals fromone domain to another.H) "nfrastructure $aster; 2inally each domain has an "nfrastructure $aster ("$). The "$periodically looks up references to e%ternal objects by consulting the global catalog. An e%ampleof an 8e%ternal object8 would be if you added a user from one Domain A to a group in Domain .

    As far as Domain is concerned the user is an e%ternal object. The "$ is checking to see if anydetails about that foreign object (such as its distinguished name or #"D) have changed.

    I) &hat is a 1lobal +atalogNAns; The 1lobal +atalog (1+) has two primary functions. 2irst it acts as a domain controller thatstores object data and manages /ueries about objects and their most common attributes (calledthe 1lobal +atalog *artial Attribute #et or *A#). #econd it provides data that permits networklogon.1+ provides a listing of all objects in AD so we can /uery 1+ for any information needed.

    :DA* (light weight directory access protocol) is used (by AD) to /uery the 1+ on port I'.

    F) &hat are 1roup *oliciesNAns; 1roup policies are used by administrators to configure and control user environmentsettings. 1roup *olicy 3bjects (1*3s) are used to configure group policies which are applied tosites domains and organi!ational units (3s). #ettings that do the following may be applied withgroup policy; $anage user environments - &allpaper and other settings. $anage scripts -:ogonGlogoff and startupGshutdown scripts. $anage security - ,vent log settings accountpolicies and more. $anage software deployment - Applications may be automatically installedwhen the client computer starts. 0edirect folders - 2olders on a local computer may be redirectedto a network share.

    H) &hat is the difference between a Domain and &orkgroupN

    Ans; A domain is a group of computers and devices on a network that are administered as a unitwith common rules and procedures. &ithin the "nternet domains are defined by the "* address.

    All devices sharing a common part of the "* address are said to be in the same domain.&orkgroup computing occurs when all the individuals have computers connected to a network (agroup of two or more computer systems linked together) that allows them to send e-mail to oneanother share data files and other resources such as printers. ormally a workgroup is limitedto C network devicesGcomputers. #ince workgroup machines might have different accountnames you really have to know the admin account for each specific machine in order toeffectively manage the workgroup.

    ) &hat is the relationship between tree and a forestN

    Ans; The framework that holds the objects is viewed at a number of levels. At the top of thestructure is the 2orest - the collection of every object its attributes and rules (attribute synta%) in

    the AD. The forest holds one or more transitive trust-linked Trees. A tree holds one or moreDomains and domain trees again linked in a transitive trust hierarchy. Domains are identified bytheir D# name structure the namespace. A domain has a single D# name.

    The objects held within a domain can be grouped into containers called 3rgani!ational nits(3s). 3s give a domain a hierarchy ease its administration and can give a semblance of thestructure of the AD8s company in organi!ational or geographical terms. 3s can contain 3s -indeed domains are containers in this sense - and can hold multiple nested 3s. $icrosoftrecommends as few domains as possible in AD and a reliance on 3s to produce structure andimprove the implementation of policies and administration. The 3 is the common level at which

  • 7/25/2019 EPS_Technical Material.doc

    20/24

    to apply group policieswhich are AD objects themselves called 1roup *olicy 3bjects (1*3s)although policies can also be applied to domains or sites (see below). The 3 is the lowest levelat which administrative powers can be delegated.

    OTo allow users in one domain to access resources in another AD uses trust. Trust isautomatically produced when domains are created.P

    J) &hat is the file name of Active directory and where is it storedNAns; +;G&indowsGTD#Gtds.dit

    ) &hat is backupN &hat are the different types of backups e%plain themNAns; ackup "s creating a replica of data on a serverG*+. ackups could be taken on another diskor magnetic tape for offsite storage. Types of backup are;") normal or full backup; the entire backup for the dayii) "ncremental backup; backup since last backupiii) Differential backup; backup since last full backup

    @) &here is #ystem #tate and what does it containN

    C) &hat is the difference between T2# and 2AT file systemN

    Ans; 2AT (file allocation table); 2ATC W I'T2# (new technology file system); has an additional feature such as Sec"rity < Filecompression (not both at same time)

    >ou can convert a partition from 2AT to T2# but not vice versa. To do so open an $#-D3#*rompt window and type the following command;

    +39,0T drive; G2#; T2#

    2or e%ample if you want to convert your D drive to T2# you8d replace the word drivewith theletter D as follows;

    +39,0T D; G2#; T2#

    CC) &hat is a logical *artition and *hysical *artition in Active DirectoryNAns; refer AD document.

    C') ?ow do you install Active DirectoryNAns; in command prompt; use the command D+*romo 230 "#TA:: G "#TA::. "f it isinstalled the command would uninstall it or if it is not installed it will install it.

    CI) +an Active Directory be uninstalledN if yes howN if no whyNAns; Kuestion C'

    CF) &hat is D#NAns; Domain naming system is responsible for resolving names to "* address.

    CH) &hat is router fre/uency AT how it works what router does which protocol it usesN

    Ans; '.F1?U. etwork address translation (AT) separates e%ternal network or internet frominternal networkGintranet. 0outer operates on network layer.C) 3#" model W protocols in each layerN

    Ans; The 3#" model describes a fi%ed seven layer stack for networking protocols.

    J. A**:"+AT"3; ?TT* #$T* #$* 2T* Telnet ,+?3 #"* ##? 2# 0T#* 4$**&hois ,0*

    . *0,#,TAT"3; 4D0 A#.C #$ A2* +*.

  • 7/25/2019 EPS_Technical Material.doc

    21/24

    H. #,##"3; A#A* T:# ##: "#3 I'J G ++"TT 4.''H 0*+ et"3# A#*. ,stablishing Wmanaging sessions.

    F. T0A#*30T; 3! D* 0T* #+T* #*4 AT* ":. This layer is for flow control.

    I. ,T&30B; # "+$* "1$* "*4 1* 3#*2 0"* "10* ,"10* A0* 0A0* 4.'H. 0outerworks on network layer. +onnecting over a network.

    '. DATA :"B; ,thernet Token ring ?D:+ 2rame relay "#D AT$ '.CC &i2i 2DD" ***.#witch works on this layer.

    C. *?>#"+A:; CA#,-T CA#,-T CA#,-T #3,TG#D? T-carrierG,-carrier various'.CC physical layers. ?ubs W repeaters operate on this layer.

    T+*G"* model;

    F Application8D# T2T* T:#G##: 2T* ?TT* "$A* "0+ T* *3*I #"*#$T*#$* ##? T,:,T ,+?3 it Torrent 0T* *0* rlogin ,0* X

    0outing protocols like 1* YorderQ1atewayQ*rotocolL and 0"* which for a variety of reasonsrun over T+* and D* respectively may also be considered part of the application or networklayer.

    I 3ransport8T+* D* D++* #+T* ": X 0outing protocols like 3#*2Y3penQshortestQpathQfirstL which run over "* may also be considered part of the transport ornetwork layer. "+$* and "1$* Y"nternetQgroupQmanagementQprotocolL run over "* may beconsidered part of the network layer.

    ' et+or,8"* A0* and 0A0* operate underneath "* but above the link layer so they belongsomewhere in between.

    C 9in,; ,thernet &i-2i Token ring *** #:"* 2DD" Y2iberQdistributedQdataQinterfaceLAT$ 2rame 0elay #$D# X

    CJ) &hat is pingNAns; *acket internet gropher W it uses "+$* protocol. "t is used to check connectivity to an "* or*+ name. try ping command on your *+ W check for replies.

    C) &hat r the boot options for a *+. :ist them W which option do we use W whenNAns; &hen *+ reboots press 2 so you reach the boot options.

    a) #afe $ode; This starts &indows using only basic drivers and no network connection. #afe$ode allows a &indows *+ to start using default settings (91A display driver $icrosoft mouseno network connection minimal device drivers) so that you can perform a system repair. Theseoptions often allow you to repair your &indows configuration without performing a complete re-installation of the system software. 2or e%ample if you have installed an application thatsubse/uently prevents &indows from starting you should be able to start in #afe $ode so thatyou can remove the offending application.b) #afe $ode with etworking; This is useful if you need to connect to +2# to install new driversfrom the shared copy of installation files.c) #afe $ode with +ommand *rompt; This startup option does not start the &indows 1".?owever 91A drivers are installed so the option is very similar to basic #afe $ode.d) ,nable oot :ogging; This starts &indows whilst logging all devices and services that areloaded in a file TT:31.T4T in the &indows directory. A log is always created by thepreceding three #afe $ode options.e) ,nable 91A $ode; This option specifically addresses the problems which occur when a videodriver prevents &indows from starting.f) :ast Bnown 1ood +onfiguration; "f &indows fails to start successfully try the option :astBnown 1ood +onfiguration before all others including #afe $ode. This starts &indows using the

  • 7/25/2019 EPS_Technical Material.doc

    22/24

    registry information it saved at the last successful shutdown and it can correct basic configurationproblems. "t does not solve problems caused by incorrect or missing files.g) Directory #ervices 0estore $ode; 2or &indows ' and 'I servers only.h) Debugging $ode; Diagnostic tool for e%perienced managers.i) Disable automatic restart on system failure; &indows 4* only; "f &indows e%periences a criticalerror on startupR a blue screen error (#3D) message may be displayed before the systemrestarts. This option allows you to disable the automatic restart so that the error message can beread.

    C@) &hat is :ANAns; :ocal area connection. o need to elaborate.

    ') $other board componentsNAns; +entral *rocessing nit (+*) underlying circuitry e%pansionG*+" slots video componentsrandom access memory (0A$) slots and a variety of other chips.

    'C) &hat is firewall ?ow to change settings for windows firewall Ird party firewallsNAns; Asystemdesigned to prevent unauthori!ed accessto or from a private network.2irewallscan be implemented in bothhardware andsoftwareor a combination of both. 2irewalls are

    fre/uently used to prevent unauthori!ed "nternetusers from accessing privatenetworksconnected to the "nternet especially intranets. All messages entering or leaving the intranet passthrough the firewall which e%amines each message and blocks those that do not meet thespecified securitycriteria.

    "f you right click on local area connection icon you will get the option to change windowsfirewall settings. >ou can also start or stop the service from services menu by typing services.mscin run window W then selecting the service.

    Irdparty firewalls are orton or #ymantec $cAfee A91 etc.

    '') *ro%y serverNAns; *ro%y server; "ntercepts all messages entering and leaving the network. The pro%y servereffectively hides the true network addresses.

    A serverthat sits between aclient applicationsuch as a&eb browserand a real server.

    "t intercepts all re/uests to the real server to see if it can fulfill the re/uests itself. "f not it forwardsthe re/uest to the real server.

    'I) ,nabling file W printer sharingNC. Ans; 0un the etwork #etup wi!ard.'. +lick the connection method that applies for your computer.I. Accept the default computer description and computer name.F. Accept the default workgroup name. This name should match the workgroup name of the

    other computers that you want to share files with.

    'F) &here do you find administrative toolsNAns; #tart*rogramsadministrative tools

    'H) Difference between switch W hub W router layers on which they workNAns;

    ') oot se/uence of *+N

    Ans; 2or #ystem oot #e/uence go through this;

    The system"3# is what starts the computer running when you turn it on. The following are the

    steps that a typical boot se/uence involves. 3f course this will vary by the manufacturer of your

    http://www.webopedia.com/TERM/f/firewall.html#%23http://www.webopedia.com/TERM/f/access.htmlhttp://www.webopedia.com/TERM/f/network.htmlhttp://www.webopedia.com/TERM/f/hardware.htmlhttp://www.webopedia.com/TERM/f/software.htmlhttp://www.webopedia.com/TERM/f/Internet.htmlhttp://www.webopedia.com/TERM/f/firewall.html#%23http://www.webopedia.com/TERM/f/intranet.htmlhttp://www.webopedia.com/TERM/f/security.htmlhttp://www.webopedia.com/TERM/f/proxy_server.htmlhttp://www.webopedia.com/TERM/P/server.htmhttp://www.webopedia.com/TERM/P/client.htmhttp://www.webopedia.com/TERM/P/browser.htmhttp://www.webopedia.com/TERM/P/proxy_server.html#%23http://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.webopedia.com/TERM/f/firewall.html#%23http://www.webopedia.com/TERM/f/access.htmlhttp://www.webopedia.com/TERM/f/network.htmlhttp://www.webopedia.com/TERM/f/hardware.htmlhttp://www.webopedia.com/TERM/f/software.htmlhttp://www.webopedia.com/TERM/f/Internet.htmlhttp://www.webopedia.com/TERM/f/firewall.html#%23http://www.webopedia.com/TERM/f/intranet.htmlhttp://www.webopedia.com/TERM/f/security.htmlhttp://www.webopedia.com/TERM/f/proxy_server.htmlhttp://www.webopedia.com/TERM/P/server.htmhttp://www.webopedia.com/TERM/P/client.htmhttp://www.webopedia.com/TERM/P/browser.htmhttp://www.webopedia.com/TERM/P/proxy_server.html#%23http://www.pcguide.com/ref/mbsys/bios/bootSequence-c.html
  • 7/25/2019 EPS_Technical Material.doc

    23/24

    hardware "3# etc. and especially by what peripherals you have in the *+. ?ere is what

    generally happens when you turn on your system power;

    C. The internalpower supply turns on and initiali!es. The power supply takes some timeuntil it can generate reliable power for the rest of the computer and having it turn onprematurely could potentially lead to damage. Therefore the chipsetwill generate a reset

    signal to the processor (the same as if you held the reset button down for a while on yourcase) until it receives the *ower 1ood signal from the power supply.

    '. &hen the reset button is released the processor will be ready to start e%ecuting. &henthe processorfirst starts up it is suffering from amnesiaR there is nothing at all in thememory to e%ecute. 3f course processor makers know this will happen so they pre-program the processor to always look at the same place in the system "3# 03$ for thestart of the "3# boot program. This is normally location 2222h right at the end of thesystem memory. They put it there so that the si!e of the 03$ can be changed withoutcreating compatibility problems. #ince there are only C bytes left from there to the end ofconventional memory this location just contains a MjumpM instruction telling the processorwhere to go to find the real "3# startup program.

    I. The "3# performs thepower-on self test (*3#T). "f there are any fatal errors the bootprocess stops. *3#T beep codes can be found in this area of the Troubleshooting

    ,%pert.F. The "3# looks for the video card. "n particular it looks for the video card8s built in "3#

    program and runs it. This "3# is normally found at location +h in memory. Thesystem "3# e%ecutes the video card "3# which initiali!es the video card. $ostmodern cards will display information on the screen about the video card. (This is why ona modern *+ you usually see something on the screen about the video card before yousee the messages from the system "3# itself).

    H. The "3# then looks for other devices8 03$s to see if any of them have "3#es.ormally the "D,GATA hard disk "3# will be found at +h and e%ecuted. "f any otherdevices "3#es are found they are e%ecuted as well.

    . The "3# displays its startup screen.J. The "3# does more tests on the system including the memory count-up test which you

    see on the screen. The "3# will generally display a te%t error message on the screen if it

    encounters an error at this pointR these error messages and their e%planations can befound in this part of the Troubleshooting ,%pert.. The "3# performs a Msystem inventoryM of sorts doing more tests to determine what

    sort of hardware is in the system. $odern "3#es have many automatic settings and willdetermine memory timing (for e%ample) based on what kind of memory it finds. $any"3#es can also dynamically set hard drive parameters and access modes and willdetermine these at roughly this time. #ome will display a message on the screen for eachdrive they detect and configure this way. The "3# will also now search for and labellogical devices (+3$ and :*T ports).

    @. "f the "3# support the *lug and *lay standard it will detect and configure *lug and *laydevices at this time and display a message on the screen for each one it finds. #ee herefor more details on how *n* detects devices and assigns resources.

    C. The "3# will display asummary screen about your system8s configuration. +heckingthis page of data can be helpful in diagnosing setup problems although it can be hard to

    see because sometimes it flashes on the screen very /uickly before scrolling off the top.CC. The "3# begins the search for a drive to boot from. $ost modern "3#es contain a

    setting that controls if the system should first try to boot from the floppy disk (A;) or firsttry the hard disk (+;). #ome "3#es will even let you boot from your +D-03$ drive orother devices depending on the boot se/uence "3# setting.

    C'. ?aving identified its target boot drive the "3# looks for boot information to start theoperating system boot process. "f it is searching a hard disk it looks for a master bootrecord at cylinder head sector C (the first sector on the disk)R if it is searching afloppy disk it looks at the same address on the floppy disk for a volume boot sector.

    http://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.pcguide.com/ref/power/sup/func_PowerGood.htmhttp://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.pcguide.com/ref/mbsys/bios/bootPOST-c.htmlhttp://www.pcguide.com/ts/x/sys/beep/index.htmhttp://www.pcguide.com/ts/x/sys/beep/index.htmhttp://www.pcguide.com/ref/mbsys/bios/bootStartup-c.htmlhttp://www.pcguide.com/ts/x/sys/booterr.htmhttp://www.pcguide.com/ts/x/sys/booterr.htmhttp://www.pcguide.com/ref/mbsys/res/logic.htmhttp://www.pcguide.com/ref/mbsys/res/pnp_Operation.htmhttp://www.pcguide.com/ref/mbsys/res/pnp_Operation.htmhttp://www.pcguide.com/ref/mbsys/bios/bootSummary-c.htmlhttp://www.pcguide.com/ref/mbsys/bios/set/adv_Boot.htmhttp://www.pcguide.com/ref/hdd/file/struct_MBR.htmhttp://www.pcguide.com/ref/hdd/file/struct_MBR.htmhttp://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.pcguide.com/ref/power/sup/func_PowerGood.htmhttp://www.pcguide.com/ref/mbsys/bios/bootSequence-c.htmlhttp://www.pcguide.com/ref/mbsys/bios/bootPOST-c.htmlhttp://www.pcguide.com/ts/x/sys/beep/index.htmhttp://www.pcguide.com/ts/x/sys/beep/index.htmhttp://www.pcguide.com/ref/mbsys/bios/bootStartup-c.htmlhttp://www.pcguide.com/ts/x/sys/booterr.htmhttp://www.pcguide.com/ts/x/sys/booterr.htmhttp://www.pcguide.com/ref/mbsys/res/logic.htmhttp://www.pcguide.com/ref/mbsys/res/pnp_Operation.htmhttp://www.pcguide.com/ref/mbsys/res/pnp_Operation.htmhttp://www.pcguide.com/ref/mbsys/bios/bootSummary-c.htmlhttp://www.pcguide.com/ref/mbsys/bios/set/adv_Boot.htmhttp://www.pcguide.com/ref/hdd/file/struct_MBR.htmhttp://www.pcguide.com/ref/hdd/file/struct_MBR.htm
  • 7/25/2019 EPS_Technical Material.doc

    24/24

    CI. "f it finds what it is looking for the "3# starts the process of booting the operatingsystem using the information in the boot sector. At this point the code in the boot sectortakes over from the "3#. The D3# boot process is described in detail here. "f the firstdevice that the system tries (floppy hard disk etc.) is not found the "3# will then try thene%t device in the boot se/uence and continue until it finds a bootable device.

    CF. "f no boot device at all can be found the system will normally display an error messageand then free!e up the system. &hat the error message is depends entirely on the "3#and can be anything from the rather clear Mo boot device availableM to the very crypticM3 03$ A#"+ - #>#T,$ ?A:T,DM. This will also happen if you have a bootable harddisk partition but forget to set it active.

    This process is called a Mcold bootM (since the machine was off or cold when it started). A Mwarm

    bootM is the same thing e%cept it occurs when the machine is rebooted using Z+trl[\ZAlt[\ZDelete[

    or similar. "n this case the *3#T is skipped and the boot process continues roughly at step

    above.

    'J) $0 (master boot record)N

    ') 3ther general 3# based /uestions as what options u have in manage (right click my comp

    manage) which logs u have in event viewer etc..NAns; 3nce you reach there you will find #ystem tools (here we have ,vent viewer shared folderslocal users W groups *erformance logs W alerts device manager) #torage (here we have aoption for disk management which tells you the file system for each drive) #ervices Wapplications.

    ,vent viewer has system application W security logs. Any errors or success are logged inrespective logs. Are helpful in troubleshooting. 2or e.g. if a print job fails you would have event "D@ in system log indicating print job failure.

    http://www.pcguide.com/ref/hdd/file/struct_Boot.htmhttp://www.pcguide.com/ref/hdd/file/struct_Active.htmhttp://www.pcguide.com/ref/hdd/file/struct_Boot.htmhttp://www.pcguide.com/ref/hdd/file/struct_Active.htm

Recommended