Motherboard & Attached Resources

What is Motherboard?

Motherboard is an electronic printed circuit board. It is also the hub of all computer peripherals. It is called “mother board” because there are other boards (VGA, Sound, and NIC etc) that are all attached to this board as well the Microprocessor installed on this board. All motherboards are properly installed and fixed with screws onto the cabinet for safety and damage protection.

Southbridge: An integrated circuit (e.g., Intel or VIA) on the motherboard that is responsible for the hard drive controller, I/O controller and integrated hardware such as sound card, video card if present on the motherboard, USB, and Ethernet.

Northbridge: An integrated circuit (e.g., Intel or VIA) that is responsible for communications between the CPU interface, AGP, PCI, and the memory.

What is PC Assembling?


PC assembling means to build a PC system by collecting, connecting and joining the hardware resources to Motherboard which is already installed and fixed into computer case known as cabinet. During PC assembling we first setup the motherboard into cabinet then following resources are connected, attached or inserted with proper care and settings.

1.                  Microprocessor Chip and CPU Cooler/Fan
2.                  Extended memory / RAM
3.                  Power and Reset LEDs
4.                  HDD to IDE or SATA ports
5.                  CD-ROM/DVD-ROM drives
6.                  SMPS connectors to motherboard and FDD, HDD and CD/DVD drives
7.                  Battery and BIOS config jumper
8.                  Keyboard and Mouse connections to PS/2 or USB ports.
9.                  Monitor data cable link
10.              Multimedia components (MIC & Speakers) 

What is SMPS?

A switched-mode power supply (switching-mode power supply/SMPS) is an electronic power supply unit (PSU) that converts the volt and current characteristics from one form to another and incorporates a switching regulator in order to be highly efficient.
Unlike a linear power supply, the pass transistor of a switching mode supply switches very quickly between full-on and full-off states, which minimizes wasted energy. It regulates either output voltage or current by switching ideal storage elements, like inductors and capacitors, into and out of different electrical configurations.

What are the Ports?

A port is the hardware interface that enables us to connect other peripherals to CPU unit (Cabinet).  Port literally means a device that can send and receive data to and from the computer system. Port is then connected to BUS which carries the signal between two connected communicating devices. Such as Mouse and CPU needs COM1/COM2 port to interact.
Extensible Firmware Interface (EFI)

In computers with the Intel Itanium processor, the interface between a computer's firmware, hardware, and the operating system. The Extensible Firmware Interface (EFI) defines a new partition style called GUID partition table (GPT). EFI serves the same purpose for Itanium-based computers as the BIOS found in x86-based computers. However, it has expanded capabilities that provide a consistent way to start any compatible operating system and an easy way to add EFI drivers for new bootable devices without the need to update the computer's firmware.Types of Ports

Serial Port: An Asynchronous port on the computer used to connect a serial device to the computer and capable of transmitting one bit at a time. Serial ports are typically identified by 9-pin (type DB-9) also called COM (communications) ports example, COM1 and COM2.

Serial ports are used to connect Mouse, Modem, Printer and Network.

RS232-C (Recommended Standard) is serial port standard developed by ANSI.

Parallel Port: It is a communicating hardware interface between the CPU and different peripherals in bytes/character. The parallel port is found on the back of IBM compatible computers and is a 25-pin (type DB-25) computer interface commonly used to connect printers to the computer.

Parallel ports are also used to connect Scanners, Computer-to-Computer and Terminal. These ports are identified by LPT1, LPT2 and LPT3. (LPT is the abbreviation for Line Printer).

USB Port: USB is short or Universal Serial Bus, USB is a standard that was introduced in 1995 by Intel, Compaq, Microsoft and several other computer companies. USB is an external bus standard that supports data transfer rates of 12 Mbps and is capable of supporting up to 127 peripheral devices. USB 2.0, also known as "hi-speed USB", was developed by Compaq, Hewlett Packard, Intel, Lucent, Microsoft, NEC and Philips and was introduced in 2001. Hi-speed USB is capable of supporting a transfer rate of up to 480 Mbps and is backwards compatible, meaning it is capable of supporting USB 1.0 and 1.1 devices and cables.
Ethernet Port: An Ethernet adapter or Ethernet controller is a term used to describe an Ethernet network card used to connect a desktop computer to a network (Media / Cable). There is one RJ45 connector that connects a PC to Star LAN another is BNC (Bus Network Connection) port to connect the PC to BUS LAN.

What is BIOS?


BIOS is the abbreviation for Basic Input Output System. A computer generally the IBM PC or any IBM compatible PC has CMOS (Complementary Metal Oxide Semiconductor) as the ROM to store the “bootstrap loader”. This is also known BIOS setup utility – responsible for POST (Power-On-Self-Test). In BIOS setup we actually configure the motherboard resources always at the system startup automatically. Hence a properly tuned and perfectly installed hardware platform is ready to load the Operating System, such as DOS, Windows and Linux etc. In this way a good and properly working PC platform given to user for computing, business and other electronic activities.



What we can do in BIOS setup?


All motherboards come with CMOS BIOS (Firmware) already installed. It is also pre-configured at different hardware known as “factory defaults”. To change and make entries into BIOS setup we need to press “F2” or “Del” key just after power-on. BIOS setup has following menus:

Main (Standard CMOS Features): It gives information about the BIOS version, Date, Time, motherboard, CPU, RAM etc.

Advanced Configuration: In this menu “Drive Configuration” is used to workout the settings for HDD (IDE/ATA & SATA) and CD-ROM/DVD-ROM. The “Peripheral Settings” is used for Serial/Parallel ports and LAN. The “Floppy Drive” setting is used to enable/disable FDD. The “USB settings” is used to enable/disable the USB device and to change other options. The “Video Settings” option is used to modify the primary display i.e., On-board and/or External

Security: This BISO features enables us to create, delete and change the password for “supervisor” and “user”. These password are then used to lock the CMOS setup and System boot.

Boot: This menu option enables use to select the First/Second/Third boot device order when our system is connected with CD/DVD-ROM, HDD and Floppy drive. We can also disable “boot” facility of removable device, USB and Ethernet.

Exit: This menu options helps us to finally decide about the made changes to CMOS setup i.e., “save and exit”, “exit without saving”, “load default settings” and “discard changes”.


(BIOS) Device Driver Files

Himem.sys: On DOS platform or on Windows 95/98 machine, this file is used to configure the Extended memory (RAM). Since DOS can’t use memory more than 640 KB (base RAM), therefore we need to create “config.sys” file as follows:

Rem Created for DOS booting
Device=C:\DOS\Himem.sys /testmem:off
Files=60
Buffer=35

In this way, at the booting time with DOS (io.sys, msdos.sys, command.com) this file is also loaded into primary memory. Therefore, it is called Higher Memory Manager System file.

Smartdrv.sys: This is a system file for DOS platform to be used by OS for advanced read and write access operations. It enable fast transfer of data between the memory and Disk drive. This file needs to loaded during booting of DOS with “config.sys” or “autoexec.bat” system files.

Rem Autoexec file modify
@echo off
Prompt $p$g
Path=C:\; C:\DOS; C:\Tally; C:\Turboc3
Smartdrv.exe

Ramdrive.sys: This is a system file used on DOS platform to create a drive letter to access the primary memory like storage mean. A “Ramdrive” is very fast when loading programs or writing information. This type of drive only exists till the system is live and will be lost as the machine is turned off.
It best suitable for “Hard Disk-less” workstations and LAN, such as DOS based NetWare LAN.

Rem Created for DOS booting –
Rem config.sys file
Device=C:\DOS\Ramdrive.sys /E:2048
Files=60
Buffer=35

RAM Terminology

1. SDRAM

Short for Synchronous DRAM, SDRAM is a type of DIMM memory that synchronizes itself with the computer's system clock to provide the synchronization between the memory and the computer processor

2. SRAM

Short for Static RAM, SRAM is a type of computer memory that requires a constant power flow in order to hold information. Although quicker than DRAM, SRAM is much more expensive and requires more power; therefore, it is commonly only used in cache and video card memory.

3. DDR

Short for Double Data Rate, DDR is a type of memory that utilizes both the rising and falling edge of the system clock that has the potential of doubling the speed of the memory. DDR2 is the second generation of DDR memory capable of operating at greater speeds of 400 MHz and higher, offers a greater bandwidth potential, and operates at a lower power consumption generating less heat. Today DDR3 and DDR4 memory is also available for new generation motherboards and microprocessors, such as Core2 Duo, Dual Core and i2, i3 Intel CPUs.

4. DIMM

Short for Dual In-line Memory Module, DIMM is a type of circuit board that holds memory chips. DIMMs have a 64-bit path because of the Pentium Processor requirements. Because of the new bit path, DIMMs can be installed one at a time, unlike SIMMs on a Pentium that would require two to be added.

5. SIMM

Short for Single In-line Memory Module, SIMM is a circuit board that holds six to nine memory chips per board, the ninth chip usually an error checking chip (parity / non parity) and were commonly used with Intel Pentium or Pentium compatible motherboards. SIMMs are rarely used today have have been widely replaced by DIMMs.

 



Primary Memory Terminology


1. Base Memory

It is the main and base memory that is limited to the size of 640 KB. This small size primary memory was used by DOS operating system. It is also referred as the conventional memory.   

2. Upper Memory

3. Extended Memory

It is actually the primary memory that is created by extending the size of base memory (640 KB barrier). It is not configurable and unavailable to programs other than those that run in Microsoft Windows and OS/2.

4. HMA

5. Cache Memory

6. Virtual Memory


This is actually the disk space that has been marked as virtual memory in Ms-Windows to increase the physically installed primary memory ( RAM ) size in our system. This disk space is used by Windows at run-time as if it were RAM to load large size applications and the files / programs. In this way is it is used to make up the RAM short fall in our system.

How to configure Virtual Memory
1.          Startà Run : sysdm.cpl (return)
Or
My Computer à Properties
2.          Advanced à Performance Settings
3.          Advanced à Virtual Memory Change
4.          Select drive other than ‘boot drive’ à Customize
5.          Type minimum and maximum disk area as the page file size.
e.g., Min. à 1024 MB and Max. 2048 MB


Disk Controller Standards

1. ATA / PATA

Short for AT Attachment, ATA was first approved in 1994. It is an interface used to connect such devices as hard disk drives, CD-ROM drives, and other types of drives in IBM compatible computers. The original ATA interface is now often referred to as PATA (Parallel AT Attachment) after the introduction of SATA.

2. SATA

Short for, Serial AT Attachment. SATA 1.0 was first released in August 2001 and is a replacement for the Parallel ATA interface used in IBM compatible computers. SATA is capable of delivering 1.5Gbps (150MBps) of performance to each drive within a disk array, offers backwards compatibility. SATA bus is easy to route, eliminates heat exhaust problem and take less space in CPU case.

3. ATAPI

Short for AT Attachment Packet Interface, ATAPI is an extension to ATA that allows support for devices such as CD-ROM drives, Tape drives and other computer peripherals and not just hard disk drives.

4. SCSI

It is short for Small Computer System Interface. Pronounced as "Scuzzy", is the second most commonly used parallel standard for interface for disk drives capable of supporting eight devices, or sixteen devices. SCSI-3 was approved in 1996 as ANSI X3.270-1996. SCSI ports were designed for Apple Macintosh and Unix computers, but also can be used with PCs.


System Tools

Introduction

System tools in Ms-Windows are the very much important and more often used software. This type of software is responsible for keeping our system in good, proper and better condition. They also help the user and computer operators to solve many basic errors as well to run different maintenance tasks. Following are the system tools that are located in Accessories:



1. Disk Cleanup
2. Disk Defragmenter
3. Backup (& Restore)
4. Check Disk / Scandisk
5. System Restore
6. Schedule Task
7. System Information
8. System Security
9. System Configuration Utility
10. Registry Editor


   
1. What is Disk Cleanup?
Disk Cleanup helps free up space on your hard drive. Disk Cleanup searches your drive, and then shows you temporary files, Internet cache files, and unnecessary program files that you can safely delete. You can direct Disk Cleanup to delete some or all of those files. There is also a choice to find installed applications and to uninstall if not necessary or unwanted.


2. What is Check Disk (chkdsk.exe)?
It is used to find and repair the errors on the storage media Hard Disk. It very much important in Windows 2000/XP in the sense that it can be executed to repair the file system and booting problem from the command prompt. Check disk command creates and displays a status report for a disk based on the file system.
Usage:
C:\>chkdsk
(without parameter to displays the status of the disk in the current drive).

C:\>chkdsk /f /r /x
/f: Fixes errors on the disk.
/r: Locates bad sectors and recovers readable information.
 /x: Use with NTFS only to force the volume to dismount first, if necessary.
3. What is Backup?
The Backup utility helps you create a copy of the information on your hard disk. In the event of original data on your hard disk is accidentally erased or overwritten, or becomes inaccessible due to hard disk malfunction, you can use the copy to restore lost or damaged data. It is a graphical interface having wizards to Backup, Restore and Automated System Recovery.



Types of backup
The Backup utility supports five methods of backing up data on your computer or network.
1. Copy backup
A copy backup, copies all selected files but does not mark each file as having been backed up.
2. Daily backup
A daily backup copies all selected files that have been modified the day the daily backup is performed. The backed-up files are not marked as having been backed up.
3. Differential backup
A differential backup copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up.
4. Incremental backup
An incremental backup backs up only those files created or changed since the last normal or incremental backup. It marks files as having been backed up.
5. Normal backup
A normal backup, copies all selected files and marks each file as having been backed up. You usually perform a normal backup the first time you create a backup set.
System State Backup
In Backup, a collection of system-specific data that can be backed up and restored. The System State data includes the registry, the COM Class Registration database, and the system boot files. For servers, the System State data also includes the Certificate Services database (if the server is operating as a certificate server). If the server is a domain controller, the System State data also includes the Active Directory directory services database and the SYSVOL directory.
What is (Backup) Restore?
Restore Wizard in backup utility is used to recover the lost files and data from previously created backup source. To restore the original files/data you must select the appropriate the source from the available backup catalogs and highlight the one or more items.

Backup Tasks
1.                  Create the “Normal” backup for complete folder called “Turboc3” on your HDD. Place the backup source on another Drive.
2.                  Create the “Normal” backup for following three folders in C: to D: as “all-software.bkf”
a.      PC-ABC
b.      Turboc3
c.       FoxPro
3.                  Restore “Turboc3” original folder from the backup first backup source after deleting “Turboc3” in C:/D: drive.
4.                  Restore only the “FoxPro” original folder from the second backup source after deleting “FoxPro” in C:/D: drive.
5.                  Create a backup schedule to automatically run daily at 3:30 PM for any one folder in “Windows\system32\”
Disk Defragmenter overview

Disk Defragmenter analyzes local volumes and consolidates fragmented files and folders so that each occupies a single, contiguous space on the volume.

As a result, your system can access files and folders and save new ones more efficiently. Disk Defragmenter also consolidates a volume's free space, making it less likely that new files will be fragmented. The amount of time that defragmentation takes depends on several factors, including volumes size, the number and size of files and the available local system resources.

Disk Defragmenter can defragment volumes having file system, FAT32 and NTFS.

System Restore overview

System Restore is a component of Windows XP Professional that you can use to restore your computer to a previous state, if a problem occurs, without losing your personal data files.
System Restore monitors changes to the system and some application files, and it automatically creates easily identified restore points. These restore points allow you to revert the system to a previous time.
System Restore points are created daily and at the time of installation of applications or drivers and hardware components. You can also create and name your own restore points at any time.

Registry Editor

A database repository for information about a computer's configuration. The registry contains information that Windows continually references during operation, such as:
  • Profiles for each user.
  • The programs installed on the computer and the types of documents each can create.
  • Property settings for folders and program icons.
  • What hardware exists on the system.
  • Which ports are being used.
The registry is organized hierarchically as a tree and is made up of keys and their subkeys, hives, and value entries.


 Tutorial Topics

1.                  Mainframe:

Mainframes usually use proprietory circuits and or generally more powerful than a typical mini computer. It is a large, fast, multiuser computer system, often utilizing multiple processors, designed to manage large amounts of data and complex computing tasks. Mainframes are normally installed in large corporations, universities, or military installations.Some of distinguishing features are:
*).        All processing at one central location
*).        32/64-bit addressing
*).        Large amount of RAM and storage capacities
*).        Large number of users (100’s even Thousands)
*).        Designed for client/server business computing

2.                  Workstation
It is basically a Personal Computer system with little but complete hardware required to enable it as a platform in a network. It is used to access to network, network resources and download applications from the server system. It can boot itself, may have local RAM, Microprocessor but is dependent on server for file storage, applications and printing etc. Example: a PC in Cyber Café and a computer in Bank used to execute normal business.


Printer & Print Management Tasks
What is Printer?

Printer is an output device that we can connect to CPU to produce the “hard copy” of processed data or information known as result and reports. It is a peripheral device which capable of communication to-and-fro the computer via parallel/serial and USB ports. Printers are categorized as follows:
Character Printer                   Line Printer                 Page Printers
All the above printers are classified into two types: 1). the impact printers and 2) the non-impact printers.

What is Dot Matrix Printer (DMP)?

The term DOT matrix refers to the process of placing dots to form an image; the quality of the image being determined by the DPI (Dots Per Inch). This printer use print heads to shoot ink or strike an ink ribbon to place hundreds to thousands of little dots to form text and/or images. DMP printers have low quality print-outs  compared to ink jet printers.

What is an Ink Jet printer?

It is a popular type of character printer for home computer users and in business. It prints by spraying streams of quick-drying ink on paper. The ink is stored in disposable ink cartridges, often a separate cartridge is used for each of the major colors. These colors are usually Black, Red/Magenta, Green/Cyan, and Yellow (CYMK). 

Although inkjet printers inexpensive but the ink cartridges used in the printing increase the overall cost of the printer.


What is a Laser Printer?

First developed by Xerox  and released in 1971, a laser printer is a page-printer   that utilizes laser technology to print images on the paper. Its printing speed is measured in terms of PPM.

Laser printers are often used in corporate, school, and other environments that require print jobs to be completed quickly and in large quantities. It has following step before printing.

Cleaning: Removes prior image information and toner from the drum.
Conditioning: Applies a uniform negative charge to the drum.
Writing: Light source such as lasers, write to areas on the drum discharging the negative potential where it hits.
Developing: The toner is ionized with a negative charge and is attracted to the areas previously written (discharged) on the drum.
Transfer: The toner of the drum is transferred to the paper by roller.
Fusing: With heat and pressure toner melts and then is pressed to the paper

What is Spooling?

The term SPOOL is short Simultaneous Peripheral Operations On-Line. Spooling is an important function of any operating system related to print-outs. All print jobs are managed by “print manager” (Spooler); for the installed local and/or network printers. Spooler is a service which always runs in the background to accept the print requests, to direct the print jobs to default printer, to create a print queue and to cancel the prints jobs etc. To view the print spooler we need to open “printer and faxes” folder.


Installing a printer

To install a printer on the local computer system, following steps are required:

1.                     Connect the printer to CPU at Serial/Parallel/USB ports as the data cable is available.
2.                     Connect the printer to electrical switch with power cord.
3.                     StartàSettingsàPrinter & Faxes
4.                     Printer & Faxes folderàAdd Printer
5.                     Add Printer Wizard then display series of dialog boxes:
a.      Welcome Step
b.      Choose between local or network printer (Select “local”)
c.       Select the appropriate Port (LPT1, COM1, USB)
d.      Select the Manufacturer and Printer model (Example: Epson, Lx-800)
e.       Printer driver file will be copied to system folders. (You may need to provide device driver source).
f.        Give a name to printer, and select “Yes/NO” to default printer.
g.      Let the printer sharing “enable” or “not-enable”
h.      If enabled, provide a share name
i.        Specify the location and some comment
j.        Say “yes/no” to test page print
k.       Finish


What is Compression?

File Compression is a software technique to enable us to store the large size files, documents and even the folders in less space on the storage media. Another advantage about the “compression” is saving on time taken to transferring and less bandwidth on the networks. Sometimes, with compression we can create security as encrypted and password protected. Some popular compression tools are:


1.                                          pkzip/pkunzip
2.                                          WinZip
3.                                          WinRar
4.                                          JAR



CabPack is a compression program with which you can create cabinet (.CAB) files.

When Windows 95 came out, Microsoft introduced a new compression scheme for their distribution media: the cabinet files. I was curious: What is the compression rate of the CAB format, in comparison to other archivers? So I extracted the files from a cabinet file and re-compressed them using various popular compressors, including ZIP, ARJ and RAR, and even with maximum compression enabled, I was unable to achieve the same tight compression the original .CAB file had.

So I began searching for a utility that allowed me to create my own cabinet files. For over a year I was unable to find anything. Then, in 1997, Microsoft put up a CAB-SDK (cabinet software development kit) on their website. The CAB tools contained therein, however, were all command-line driven, and if you wanted to create .CAB files that spanned multiple disks, you had to create a so-called "directive file" which contained all necessary information and had to be passed over to the CAB compressor.

This was why I decided to write CabPack. It started out as a console application but has now developed into a true 32bit GUI program which makes it very easy for the user to create cabinet files. With just a few mouse clicks you specify which files to compress, which compression method to use, where the output files should go and whether or not the cabinet files should span multiple disks. CabPack is able to store subdirectories, and depending on the platform you wish to extract the cabinets on, it can create .CAB files that contain long filenames or store these long filenames in the 8.3 format.



What is PkZip: It is a file compression tools that we can use from Command Prompt (Ms-DOS). It help us to create “zip” files for original files and folders not only to save disk space but also to backup the data. “PkZip” is a command line oriented tools (CUI) therefore it can be little difficult compared to Windows Explorer “New--> Compressed Folder” command (GUI).

Step1 (Prepare a folder “Save1” as follows



Step2:
C:\...\Save1>pkzip -a -r AllOne.zip .\html\*.*


C:\...\Save1>pkzip -a -r –s AllOne.zip .\html\*.*
(for password lock)

Creating ZIP: AllOne.ZIP
  Adding: ABC/  Storing   ( 2%), done.
  Adding: ABC/  Storing   ( 2%), done.

What is PKUnzip?

This is opposite to “PkZip”. It is used to extract files from the  “.zip” compressed file.

Step1:

C:\...\Save1>pkunzip -d AllOne.zip .\html\

Or

C:\...\Save1>pkunzip -d –s AllOne.zip .\html\
(for password lock file



Creating Compressed Folder in Windows XP

We can create compressed format folder in Windows Explorer very much easily and quickly. It more user friendly than other tools, such as Pkzip/Pkunizp, WinRar, WinZip etc.

Steps:

1.         Being in any folder window or on Desktop
2.         File (Right Click in Window area) à Newà Compressed (Zipped) Folder
3.         Give a name
4.         Now move (copy/cutàpaste) the source files/folders that you want to zip/compress.
5.         (Optional) Fileà Add Password (to lock the zip source or to protect unauthorized access).


What is WinRAR?
WinRAR is a 32-bit Windows version of the RAR archiver - a powerful tool which allows you to create, manage and control archive files. There are two versions of RAR for Windows:      
1. WinRAR (Graphical user interface)
2. Rar.exe (Command line console (text mode)

WinRAR features include:
Ø  Complete support of RAR and ZIP archives,
Ø  Highly sophisticated, original compression and Special algorithms optimized for text, audio and graphics,
Ø  Shell interface including drag-and-drop facility and wizard,
Ø  Command line interface, Non RAR archives (CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO) management,
Ø  Multivolume archives,
Ø  Creation of self-extracting archives,
Ø  Recovering physically damaged archives,
Ø  Support for Unicode in file names,
Ø  Other service functions, such as encryption, archive comments, error logging, etc.


What is WinZip?
WinZip makes it easy for Windows users to work with archives. WinZip features an intuitive point-and-click drag-and-drop interface for viewing, running, extracting, adding, and deleting files in archives with a standard Windows interface, and also provides a Wizard interface that further simplifies the process of working with Zip files. These are:
  • WinZip Classic: It is preferred if you have a general understanding of Windows and of Zip files. You will be quite comfortable with its Explorer-like interface once the basics of Zip files are understood.
  • WinZip Wizard: It guides you through some of the most common operations involving Zip files. If you are new to Windows or unfamiliar with Zip files, start with the Wizard and switch later to the more powerful Classic interface.

Other features are:
Display Thumbnails in WinZip's Explorer Style View, View Compressed Images Directly From Your Zip File, FTP Upload Existing Zip Files, Zip and Burn Directly to CD and DVD Command Line Support (Separate Download), Improved Compression (WAV), Extract from .BZ2 and .RAR files, Large Zip File Support, 128- and 256-Bit AES Encryption, E-mail Support (including one-click Zip & E-mail), Split Zip File Capability, Create Self-Extracting Archives


What is a Self-Extracting Zip File?
A self-extracting Zip file is an executable program file (.EXE file) that includes a Zip file and software to extract or "unzip" the contents of the Zip file. Users can run (execute) a self-extracting Zip file just as they run any other program.
A self-extracting Zip file can be created by WinZip Self-Extractor Personal Edition or WinRAR Gold Edition.


Installing Windows XP (From CD)

1
Make Sure that CD/DVD-ROM Drive is installed and has been detected in BIOS setup.
2
Make “First Boot Device” to “CD-ROM”
3
Save BIOS setup & Exit
4
Insert “XP Bootable CD-ROM” in CD-Drive
5
Let the system Boot from CD
6
Windows Setup will be launched and the System Files will be copied to primary memory
7
Setup is Starting Windows
8
Enter to Install  ( R to Repair )
9
Press “F8” to accept license
10
Disk partitioning
(Press ‘C’ to create, ‘D’ to Delete etc)
11
Enter on Any of the newly created disk partition to install OS
12
Select disk partition format method (FAT/NTFS)
13
Formatting will be done
14
Setup copies files to windows installation folders on the HDD
15
System will be restarted
16
GUI five step windows setup mode
1)                  Collecting information
2)                  Dynamic update
3)                  Preparing installation
4)                  Installing Windows
5)                  Finalizing Installation
17
User Name, Organization
18
Windows System Name, Password for Administrator
19
Date, Time and Time Zone
20
Network Setting (if NIC is there): Typical or Custom
21
Workgroup
22




Boot.ini

It is a simple ASCII text file present in root directory of C: drive. It is used on Windows platform to provide a booting choice between (dual booting) two or more installed operating systems, such as DOS, Windows 9x, Windows 2000 and Windows XP. It displays itself each time PC is switched on, then it loads the operating system either “default” or as selected by the user.

Modifying the Boot.ini file incorrectly may prevent your computer from restarting. Be sure to edit after creating a backup copy.

Step1: StartàRun: attrib c:\boot.ini –h –s
Step2: StartàRun: Notepad c:\boot.ini
Step3:
Change the time,
Change the OS label in between double quotes (“”) only
Change the default OS
Step4: Save & Exit
Step5: StartàRun: attrib c:\boot.ini +h +s
Step6: Reboot System to confirm the changes.


Installing Windows XP (Local / Network Source)

1
Make sure that the Windows XP dump is available by Browsing/Exploring
3
Run “Setup.exe”
4
Installation Type: Upgrade or New Installation
(Select upgrade if the existing OS is old or little damage)
5
License (Accept)
6
Provide the Product Key
7
Windows Setup Options (Windows Directory Name and Source Path etc)

Windows Setup will be launched and the System Files will be copied to primary memory

System will be restarted
8
Enter to Install  ( R to Repair )

Old Windows folders will be shown if exists & ask to Repair(R) or Don’t Repair(Esc)
To install newer Window XP Choose Esc
10
Disk partitioning
(Press ‘C’ to create, ‘D’ to Delete etc)
11
Enter on Any of the newly created disk partition to install OS
12
Select disk partition format method (FAT/NTFS)
13
Formatting will be done
14
Setup copies files to windows installation folders on the HDD
15
System will be restarted
16
GUI five step windows setup mode
6)                  Collecting information
7)                  Dynamic update
8)                  Preparing installation
9)                  Installing Windows
10)              Finalizing Installation

Regional Language Options
17
User Name, Organization
18
Windows System Name, Password for Administrator
19
Date, Time and Time Zone (New Delhi/Kolkatta)
20
Network Setting (if NIC is there): Typical or Custom
21
Workgroup (Depends on the previous step/NIC)
22
 Preparing Windows Operating environment by copying, setup and registration of components

System Will Reboot

Display Settings : OK & OK

Welcome To Newly Installed XP à Next

Help Protect à Not Right now à Next

Create users:

Finish

What is an Anti Virus Software or Package?

Introduction

VIRUS is a program which has been intentionally written to create havoc and cause damages to our computer system and network resources. Therefore, an Anti-VIRUS software has also been developed to detect, scan, block and to remove viruses safely from infected resources in different ways i.e. manually, automatically and in real-time. Most Anti-VIRUS programs/software is available to users as Package.

An anti-virus package provides many tools, such as: Virus Scanner, Virus Guard, Anti-Malware, Anti-Spam, Anti-Phishing, Virus Definition Database, Updater, Firewall, Anti-Root Kits, and Anti-Spy Ware etc. It is responsible for not only detecting and scanning but also performs following actions: Repairing infected items, Deleting/ Renaming if repair fail, Block/Deny access to sensitive resources e.g. Registry, Quarantine and Do nothing etc. Popular Anti-virus Packages are: Symantec Corporate Edition, MacAfee Security etc.  

What is Quarantine: It means to move the affected files to a special directory so that the VIRUS file never get executed and launched.

What is Luke File Walker: During an on-demand scan, the status window Luke File walker appears, which provides you with exact information on the status of the scan.
----------------X----------------------------------------------------------------------------------------X-----------
Boot Sector Virus: This type of Virus is responsible for removing/damaging the “boot record” present in first sector or MBR (Master Boot Record) so that the booting process can’t take place.

Command.com Virus: This type of Virus is responsible affecting the “shell program” on DOS platform so that actual tasks are hacked.

.EXE Virus: This type of Virus is responsible for executing itself by attaching to any program file on our system. Thereby no file is saved or retrieved to-and-fro the storage media.

Partition table Virus: This type of Virus is responsible for removing/damaging the partition table on the hard disk drive/pen drives.

1.                                          Die Hard
2.                                          I Love You
3.                                          W.32 (A,B,C,D)
4.                                          StauxNet

Types/Categories of Virus
----------------------------------
Trojans:
Trojans are pretty common nowadays that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive.
Trojan horses cannot multiply themselves and have an interesting name. After execution they become active and can, for example, format the hard disk.

Worms

A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.

Other Types

Adware: An Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. These advertisements usually cannot be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.

Backdoors: A backdoor can gain access to a computer by going around the computer access security mechanisms.
A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help, but are mainly used to install further computer viruses or worms on the relevant system. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Boot viruses: The boot or master boot sector of hard disks is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more…

Bot-Net: A bot net is defined as a remote network of PCs (on the Internet), which is composed of bots that communicate with each other. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Bot-Nets serve various purposes, including Denial-of-service attacks etc., partly without the affected PC user's knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.

Honeypot: A honeypot is a service (program or server) installed in a network. It has the function to monitor a network and to protocol attacks. This service is unknown to the legitimate user - because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is logged and an alert is triggered.

Macro viruses: Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application.

Pharming: Pharming is a manipulation of the host file of web browsers to divert enquiries to spoofed websites. This is a further development of classic phishing. Pharming fraudsters operate their own large server farms on which fake websites are stored. Pharming has established itself as an umbrella term for various types of DNS attacks. In the case of a manipulation of the host file, a specific manipulation of a system is carried out with the aid of a Trojan or virus. The result is that the system can now only access fake websites, even if the correct web address is entered.

Phishing: Phishing means angling for personal details of the Internet user. Phishers generally send their victims apparently official letters such as emails that are intended to induce them to reveal confidential information to the culprits in good faith, in particular user names and passwords or PINs and TANs of online banking accounts. With the stolen access details, the phishers can assume the identities of the victims and carry out transactions in their name. What is clear is that banks and insurance companies never ask for credit card numbers, PINs, TANs or other access details by email, SMS or telephone.

Rootkit: A rootkit is a collection of software tools that are installed after a computer system has been infiltrated to conceal logins of the infiltrator, hide processes and record data - generally speaking: to make themselves invisible. They attempt to update already installed spy programs and reinstall deleted spyware.

Script viruses and worms: Such viruses are extremely easy to program and they can spread - if the required technology is on hand - within a few hours via email round the globe.

Script viruses and worms use one of the script languages, such as Javascript, VBScript etc., to insert themselves in other, new scripts or to spread themselves by calling operating system functions. This frequently happens via email or through the exchange of files (documents).

A worm is a program that multiplies itself but that does not infect the host. Worms can consequently not form part of other program sequences. Worms are often the only possibility to infiltrate any kind of damaging programs on systems with restrictive security measures.

Spyware: Spyware are so called spy programs that intercept or take partial control of a computer's operation without the user's informed consent. Spyware is designed to exploit infected computers for commercial gain.
Trojan horses (short Trojans): Trojans are pretty common nowadays. We are talking about programs that pretend to have a particular function, but that show their real image after execution and carry out a different function that, in most cases, is destructive. Trojan horses cannot multiply themselves, which differentiates them from viruses and worms. Most of them have an interesting name (SEX.EXE or STARTME.EXE) with the intention to induce the user to start the Trojan. Immediately after execution they become active and can, for example, format the hard disk. A dropper is a special form of Trojan that 'drops' viruses, i.e. embeds viruses on the computer system.

Zombie: A Zombie-PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. On command, the affected PC starts denial-of-service (DoS) attacks, for example, or sends spam and phishing emails.

Installing Device Drivers

1. Display Adapter (Steps)

a. Start-->Run : DevMgmt.Msc
b. Other devices (+)
c. Right Click "Video Controller"àUpdate Driver
d. Hardware Wizard-->No Not this time
e. What do you want wizrad to do
   () Install from a list (Advanced)
f. Choose Search & Installtion Option
   () Don't Search
g. Hardware Types-->Display Adapter
h. Select the device driver you want
   Select Any one:
   () Manufacture then product model
            OR
   () Have Disk (best)
i. Install from --> Browse the location
j. Find the correct directory for "Look in"
   then pick the ".inf" file-->Open
k. Path is now completed in "Copy manufacturers files from"--> OK
l. Select the best device driver from  "Show Comapatible H/W"-->Next
m. Observe the copying of device files
n. Completing H/W install-->Finish



What is a File System?

File System is a technique and the mechanism responsible for file handling on the storage devices. In any operating system, the overall structure in which files are named, stored, and organized is build when then storage media is formatted. NTFS, FAT, and FAT32 are types of file systems on Windows and HPFS is on OS/4. It has following components:

q  Boot Record
q  FAT:  The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems. Windows stores information about each file in the FAT so that it can retrieve the file later.
q  Track
q  Sectors
q  Cluster
q  Cylinders
q  Block

Types of File Systems

1. NTFS file system


An advanced file system that provides performance, security, reliability, and advanced features that are not found in any version of FAT. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In Windows 2000 and Windows XP, NTFS also provides advanced features such as file and folder permissions, encryption, disk quotas, and compression.

2. FAT32


A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes.

How to convert the File System?


To convert the files system (upgrade) from FAT32 to NTFS “convert” command is used on the command prompt with “Administrator” account.


1 Computer Networks

Definition: A network is group of computers that can communicate with each other, share resources (such as HDD, printer) and access remote hosts or other networks.The basic hardware components of a network are
            1.         one or more servers               
            2.         Workstations/Clients/Nodes
            3.         peripheral devices(Modem,Printer etc)         
            4.         network boards (NIC)
            5.         communication media(Wire/Wireless)

What is Local Area Network?

LAN is group of homogeneous computers (all IBM compatible or ‘all  Mac systems) connected to each other or to a server computer either directly or indirectly.
A LAN is basically used in a small office or corporate situated within a building. A LAN can be spread over 1-10 kilometer distance.

The purpose of LAN is to group two or more computers to enable communication with each other, share resources (such as HDD, printer, Internet connection etc) and access remote hosts.

The basic hardware components of a LAN are:

            1.         One or more servers              
            2.         Workstations/Clients/Nodes
            3.         Peripheral devices (Modem, Printer etc)      
            4.         Network boards (NIC)
            5.         Media (Wire/Wireless)
            6.         Communication protocols
            7. Switch or HUB

3. Computer Network Architectures

1.Peer-To-Peer (P2P)

In this architecture, computers are connected to each other in the network directly, via the media and switch/hub. There is no server computer at all. Instead each computer in the network itself works as client and server both.

2. Client/Server

In this network all the participating computers are connected to a server computer. All the communication takes place via the server only. The server computer is use to provide the services (File hosting, Printing, Internet Connection, Database and E-mail etc.)to the clients. Clients send requests to the server to access the network and network resources, whereas server provides services to the clients using there permission and rights chart.

Client/Server network concept can be implemented in LAN also with BUS and Star topologies. Applications of this network architecture are: ISPs, E-mail system, IRC system, WWW system and USEnet etc.



What is LAN (Network) Topology

It is the map of the network. Physical topology describes where the cables are run and where the workstations, nodes, routers, and gateways are located. Following are the LAN topologies.

1. BUS Topology
In this topology the clients are connected to server serially one after another, using single coaxial cable. Hence a message in the network is picked up by all clients at once. Data collision occurs at each node. It is also called Ethernet.

A protocol called CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is being used to control the data traffic in the network also to solve the data collision problem.

 coaxial-cable



2. STAR topology

A network topology in the form of a star. At the center of the star is a wiring hub and the nodes and workstations are arranged around the central point representing the point of the star. There is no data collision between the clients and other devices. This network is more popular and simple to build, run and manage. UTP (Un-Shielded Twisted Pair) cable is used to provide the path to communicate with server and other clients. RJ45 plastic connectors are used at both ends of the cable to connect NIC-Switch, NIC-HUB and NIC-NIC.



3. Ring Topology

In this topology coaxial cable is used in ring shape with no end points. A LAN with a ring structre uses “token” to regulate traffic on the network and avoid collision.

The controlling NIC generates a token that controls the right to transmit, When a node has information to transmit, it captures the token, set its status to busy, and ads the message and the destination address. The token continuously passed from one node to another around the network.
Wide Area Network

When a network crosses the geographical boundaries of cities/states, it is called a WAN.It is a public network such as PSTN (Public Switched Telephone Network).

A WAN is a digital communication system which interconnects different sites, computer installation and user terminals.In a WAN, the transmission medium used are normally public systems such as telephone lines (physical), microwave and satellite links (non-physical).

WAN is also called long haul network. Example networks are: PSTN (Public Switched Telephone Network, PSDN (Public Switched Data Network), ISDN (Integrated Services Digital network), VPN (Virtua Private Network)  and CRIS (Central Railway Information System) etc.


Difference between LAN and WAN


LAN
WAN
It is restricted to a limited  geographical area of few kilometers

It span across the geographical boundaries of cities and states.
It is a private network
It is a public network
cost of data transmission is negligible
We need to pay for data transfer to service provider in different tariff rates.
Data transmission is much higher and in large volume
It is a slow network and difficult to transfer data in large volumes
communication and link breakdown rarely occurred
communication failures and link breakdown occur more often
LAN is a digital only transmission technology (but WiFi)
WAN provide both ways of transmission: analog and digital
NIC is used as MAC
Router and HUB are used for networking

What is Media?

Definition: The path which carries the signal (messages and data) from one communicating device to another is known as media. Generally the media is cable which is physical, but wireless technology such as Radio waves, Microwaves and Infra Red rays are also called media.

Types of Media

1. Coaxial Cable

It is a high capacity cable, which can transmit data at high rate. The cable, contain a solid inner copper Conductor surrounded by plastic insulation and outer braided copper or foil shield.

Other features:
1.    Totally free from external interference
2. Permits high volumes of transmission rates
3. Suitable for long distance
4. Permits data transmission up to 10-100 Mbps.
Types of Coaxial cable
1. Thick Coaxial (10Base5) for WAN, TV network
2. Thin Coaxial (10Base2) for LAN

2.UTP Cable

UTP or Un-Shielded Twisted Paired cable is the most commonly used computer network media. It contains 8 copper wires which are paired into four physical paths, used to transmit the digital signal via switches and hubs. This cable is part of the “ARCnet” (Attched Resources Computer Network) as well standardized according to Ethernet 10BASE2.Since it lack shielding therefore prone to external interference hence widely used in LAN. RJ45 plastic connectors are used at both ends. It is used in STAR network topology also for ISDN.



Types of Coaxial cable

1          CAT 5 type UTP cable
This is the most commonly used UTP cable category in computer networks. CAT 5 comes in either solid core or standard cabling. This technology is designed to support digital voice and data communication at speed up to 100 Mbps. In CAT 5 UTP cable there are 4 twisted pairs copper wires protected with insulating sheath.

2          CAT 6 UTP cable
The CAT 6 UTP cabling is used in Ethernet and Gigabit Ethernet networks including LAN and WAN both. A CAT 6 type of UTP cable consists of 4 twisted pairs of copper wires with protective sheath. This category of UTP wiring is designed to provide quality of service, fast data transfer and speed up to 1 Gbps. ISPs and other public networks provide communication services to their clients for which money is paid.

3          CAT 3 UTP cable
This type of  UTP  cable is consists of  2 insulated wires gently  twisted together. Four such pairs are typically grouped together is a plastic sheath for protection. Since it has less twists / centimeter, is therefore prone to ‘Cross Talk’ and signal becomes weak with long distance.



UTP Signaling Terms
1.         Impedance: 100 Ohms,
2.         Frequency rating: 100MHz,
3.         Capacitance 13.5 to 17 Pico Farads/foot,
4.         Attenuation (low is good) 23 to 67dB/1000 feet,
5.         Crosstalk (low is good) 32 to 51 dB at 1000 feet.

How UTP cable wiring is done?

1. Straight through UTP cable

In this UTP cable wiring method following pairing and positioning is used at two ends. The straight through UTP cable is used to connect a PC to switch or PC to HUB as well to connect the a Switch to Switch.

A straight-thru UTP Cable is used as a patch cord in Ethernet connections.
2. Cross Over UTP cable
A cross over UTP cable is use to connect the PC-to-PC or Switch to HUB or HUB-to-HUB.It’s wiring with RJ45 connector looks like as follows:

A crossover has one end with the Orange set of wires switched with the Green set

3. Fiber Optic Cable(OFC)

It is a transmission technology that sends information in the form of pulses of light along specially manufactured optical fiber at 18600 miles/second (8x103 M/Sec). Each fiber optic consists of a core, thinner than a human hair, surrounded by a sheath with a much lower refractive index. Towards its source side is a connector that converts electrical signal into light waves. Light signals introduced at one end of the cable are conducted along the cable.
Optical Fiber



4. Microwaves

A method of radio transmission that uses high frequency waves (in the range of 1-30 Ghtz) to transmit data through space. This is a popular way of transmitting data since it does not incur the expense of laying cables. Because they can not bend or pass obstacles like hills, it is necessary that microwave transmission is in line-of-sight. It requires a repeater station (Microwave Erath Station/V-SAT) every 20 miles or so because of the obstacles and the curvature of the earth.

For microwave transmission, both satellites and the earth stations are used to amplify and retransmit the microwaves to next or target location. For example, DTH and Cell-Phone Network towers.

What is Wi-Fi?

Short for Wireless Fidelity, Wi-Fi utilizes one of the IEEE 802.11 wireless standards (802.11a, 802.11b or 802.11n) to achieve a wireless network. In this network “Radio Waves” are used to establish the link or path between the communicating nodes via a “WiFi Router”. This type of network, use very much low frequencies that are not used by networks neither allocated to anybody. The radio waves can be received in the range of 11-90 meters.

A home wireless network commonly broadcasts a signal using a WAP (Wireless Application Protocol) to send and receive signals from wireless devices on the network.



What is Protocol?

Sometimes referred to as an access method, a protocol is a standard used to define a method of exchanging data over a computer network such as LAN, Internet, Intranet etc. Each protocol has its own method of how data is formatted when sent and what to do with it once receive. Protocols also define a method for compressing data and/or to check for errors in data.

Some popular communication protocols are: BISYNC, SDLC, HDLC, NetBIOS, NetBEUI, AppleTalk, TCP/IP, POP, IMAP, MIME, HTTP and SLIP/PPP etc.

What is BOOTP?

Short for BOOTstrap Protocol, it allows a client to discover certain network information; for example, to fetch IP address from DHCP server.

Popular Communication Protocols

1. IPX/SPX

Short for Internet Packet eXchange/Sequential Packet eXchange. IPX/SPX is for local-area network only. Used by NetWare operating system between network clients, applications, and network peripherals via the physical address.

2. LDAP

Short for Lightweight Directory Access Protocol, LDAP is an Internet protocol that runs over TCP. It is used by e-mail programs (e.g., PINE, OutlookExpress) to look up contact information.

3. Uuencode

Short for Unix-to-Unix encode, uuencode is a protocol for transmitting any non-plaintext files such as images and other file attachments in e-mail.

4. MIME

Short for Multipurpose Internet Mail Extensions. MIME is a standard format, that allows the attachment (in E-mail) and sending of non-text files, such as compressed files(.zip), sound files(.wav,MP3), graphic files(.gif,.jpg), document files and video files(.avi, MPG4, .wmv) etc.  

5. NetBIOS

Short for Network Basic Input/Output System. It allows software applications to communicate with network hardware, and allow data to be transmitted properly over a network.

6. PPP

Short for Point-to-Point Protocol, it is a communication protocol that enables a user to utilize their dialup connection (commonly a modem) to connect to other network protocols like TCP/IP.

Overview of TCP-IP

TCP/IP is the acronym for Transmission Control Protocol and Internet Protocol. It is a set of communication protocols designed and developed by US Dept. of Defense’s (DARPAnet) in late 1970’s. TCP/IP is originally the WAN protocol suite for the purpose of maintaining communication links and data transfer between sites over the circuit switching (Telephone) and packet switching (Computer) networks. TCP/IP is a four layer protocol software suite which provides following functions:


1.    Remote logons
2.    File Transfer
3.    Electronic Mail
4. Support for distributed windowing system
5.  NEWS
6.  WWW
7.  NFS (Network File System)

TCP/IP Command/Utilities

1.         PING (Packet Internet Groper):
It verifies IP-level connectivity to another TCP/IP computer by sending ICMP(Internet Control Message Protocol) ‘Echo Request’ messages.
Ping is used to troubleshoot connectivity, reach-ability, and name resolution.
Usage:

      1. C:\> Ping 192.168.0.1 –t                                Or
      2. C:\> Ping localhost –t                                    Or
      3. C:\> Ping www.lan.com –t

2.         Tracert:
It determines the path taken to a destination by sending ICMP ‘Echo Request’ message, to the destination with incrementally increasing Time to Live (TTL) field values.
3.         Ipconfig:
Displays all current TCP/IP network configuration values (IP Address, Hostname, Physical Address, Subnet Mask and Default Gateway etc.).
It can refresh DHCP and DNS settings also. Ipconfig actually display the IP address, subnet mask, and default gateway for all adapters with no parameters.

Usage:  
c:\>ipconfig    Or 
c:\>ipconfig /all
Note:
IP address and DNS problem can be solved by running this command as follows:

C:\> Ipconfig /renew
       (to get correct IP address from DHCP  server)

   C:\> Ipconfig /flushdns
            (to solve DNS querying problem

4. Finger:
It displays information about a user or users on a specified remote computer (running UNIX).


5.         What is “APIPA” IP address?

Automatically Provide IP Address or APIPA is assign to a TCP/IP host machine when no DHCP server is available.

5.                                          ‘Net’ command line tool

Net share: (Usage:  Net view 192.168.0.1)
Net View: (Usage:  Net view)
Net Send: (Usage:  Net send 192.168.0.1 “Hello!”)

7. Arp:

ARP is defined at the network layer of ISO/OSI.
RARP mean to convert physical address into an IP address.

Addressing in a Computer Network

1          What is IP Address?
Communication in TCP/IP network is based on sending messages back & forth between the computers and network. The message contains a server and recipients address known as IP address. TCP/IP based hosts uses 32 bit IP address to uniquely identify themselves and the network to which they belong. IP address is in an octet based form such as, [192.108.168.5]
In IP Address each octet is in the range of 0-255 decimal number. The left-most one/two/three octet dictates the “class” of a network and the remaining is host address. As such they are in Class A, Class B, Class C, Class D and Class E.


Example (TCP/IP based LAN)











192.168.10.1
 




192.168.10.2
 

192.168.10.3
 
 












192.168.10.4
 










192.168.10.5
 
2          What is the MAC address/Physical address?

In computer networking, the Media Access Control (MAC) address is every bit as important as an IP address. The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter (Workstation) on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written as following:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half contains the ID number of the adapter manufacturer, regulated by an Internet standards body. The second half represents the serial number assigned to the adapter by the manufacturer. MAC addresses function at the data link layer.
Usage:
1. Novell “NetWare LAN” based on IPX/SPX communication protocols.
2. DHCP relies on MAC addresses to manage the unique assignment of IP addresses to devices.

MAC vs. IP Addressing

MAC Address
IP Address
1. It is uniquely assigned to Network Adapter.
It is uniquely assigned to a machine.
2. It exists in Hexadecimal format
It exits in Decimal format
3. It is 12 Hexadecimal characters and 48 bits lengthy
It is 4 set of Octets in the range of 0-255 and 32 bits lengthy
4. It works at Data Link layer
It works at Network layer
5. It is Hardware implementation
It is software implementation
6. It is fixed to NIC
It is not fixed ( dynamic or static)
7. Physical address has no network classes
IP address has different network classes i.e., Class A, Class B etc.



Network Device


1. NIC: It is the acronym for Network Interface Card. It is a hardware device used to connect the PC with another computer e.g., Server, Workstation or any other network device such as HUB or Switch etc. It is responsible for transmitting and receiving the signal from network media (cable) in a LAN. The NIC is defined at the physical layer of ISO/OSI network reference model.

2. Bridge: In networking, a hardware device used to connect local area network (even networks using different wiring or network protocols) together so that can exchange data. A bridge operates at the data-link layer of the ISO/OSI network reference model. A bridge manages the flow of traffic between the two local area networks by reading the address of every packet of data that it receives.





3. Router: A router is similar to a bridge, but maintains a table of pathways in a large WAN. In networking, an intelligent connecting device that can send packets to the correct local area network-segment to take them to their destination. Routers link dissimilar  (different protocols & addressing mechanism) network segments at the network-layer of ISO/OSI networking reference model.






4. Gateway: In networking, a Gateway is basically a shared connection between a LAN and a larger system such a mainframe computer or a large ‘packet switching’ network. It is the combination of both hardware and software. It is a highly sophisticated and more advanced computer system. A Gateway is defined at the 'application layer' of ISO/OSI network reference model. It provides protocol conversion facility to the networks. It accepts the messages between two different networks then data is converted as well as reformatted into other network understandable format and protocol. The messages are forwarded to the final destination network like a router.

A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes.

In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet

Examples:- VSNL(TATA), Sify, Relaince , BSNL and MTNL etc.

5. HUB: A HUB is simply a device that accepts multiple connections. In a digital network e.g., LAN or WAN it is the central location as well as central host or controlling and connecting device between clients and servers. A HUB is either passive (only accepts connections) or active (monitors and control the flow of signals).




9. Switches:

The LAN Switch Mechanism and Its Advantages

A LAN switch is a local area networking device that prevents data packet collision, and maximizes transmission speed as well as bandwidth allocation. This is a good replacement to a network hub and solves problems associated with expanding networks.

In a network where a LAN switch is used, each node gets a direct connection to a switch. That is, a node gets a dedicated connection to the switch which only it (the node or the computer) and the switch use. This dedicated connection makes it possible for one node to maximize use of the bandwidth available to it. After all, no other node is competing with it for bandwidth. This means speedy data transmission.

Moreover, the connection between the node and the switch can be made using cabling which has a separate route for data that the node is sending out and a separate route for data that the switch is forwarding to the node. This eliminates problems of data collision.

The LAN switch is especially a vast improvement over the network hub since it has the ability to “read” the source and destination node of a data packet and forward the packet only to the destination node.

Whenever the node transmits data meant for another node in the local area network, the switch intercepts the data, determines the destination and forwards the transmission to its intended destination. Since a data packet does not get broadcasted to unnecessary segments, network congestion is minimized and network bandwidth is conserved.

6. Repeater: In networking, it is used to extend the length of the network transmission medium beyond the standard cable length. It is also used to move packets from one LAN to another. It actually amplifies and reduces interference for digital signal before relay. It is defined at the physical layer of network.

7. MODEM: It is the abbreviation for modulator and demodulator. It is used to connect a telephone line with the computer system so that digital signal is converted into analog and vice versa, for the Dial-Up networking. A modem id defined at the Data-Link layer of network.

8. Port: A computer system has many interface devices to connect peripherals. A port is also the interface device. It is used to connect other communicating devices to CPU, such as the TERMINAL. A port is of two types: serial (COM1, COM2) or parallel (LPT1, LPT2). A serial port is used to connect MOUSE or TERMINALS but the parallel port connects a PRINTER or another PC.



IP Address Classess

    1.Class A IP network/Address:

In this class, the first octet is used for Network Address and the remaining 3 octets are host (client) address. Therefore, One Class A network may have 224(8x3)= 1,67,77,216 number of clients.
10.202.56.0
           
Network Address         Host Address                 
In this IP Address class, the first octet is always in the range of 0-127(Practically 1-126). The first bit of 32-bit IP address is “0”. This type of IP address is used by very large networks, ISPs and Internet Gateways such as ARPAnet, ANSnet, MILnet, NFSnet, SuperNet and CompuServ(AOL) etc mostly in USA.

2. Class B IP Address/Network:
This type of IP address is used by medium sized wide area networks such as Govt. owned networks, regional ISPs, large telecommunication organizations and Web Portals (Companies on Internet). In class B network, first two octets are called network address and the last two are host address. The first octet is always in the range of 128-191 (first 2 bits of 32-bit IP address is “10”).

Example IP Address:
135.202.56.02
Network Address      Host Address        

There are 214(16-2) = 16384 Class B networks on the Internet. Each Class B network may have 65534 clients.

3. Class C IP address/Network:
A Class C type of IP address is used by the small network such as LAN, Intranet, a company network, college/university campus network etc. In this class first three octets are called network address and last octet is host/client address.
Example IP Address:
213.202.56.02
Network Address   Host Address
One class C network on the Internet may hay 28-2=254 hosts/clients. The First octet is always in the range of 192-223 (first 3 bits of 32-bit IP address is “110”). 224-3= 2097152 is the count of Class C networks on the Internet.

3. Class D IP Address Network
The first octet is in the range of 224-239. It is only used by Internet Organization themselves (e.g., IESG, ITF, IAB etc). This is reserved for some emergency and in restoration of Internet services due to router and gateway faults (first 4 bits are “1110” in 32-bit IP Address).

4. Class E IP Address
This type of IP Address class is in the range of 240-247(first 5 bits are “11110” in 32-bit IP Address). It has been reserved for future Internet problems.

IPv4 – 32-BITS (old)    IPv6 – 128 BITS (new)
                                    4 – Octet                                                                                  16 - Octet
-------------------------------------------
Note: 192.168.0.0
      192.168.10.255
Is the IP address pool that is not used and available to public.

Administrator

This is a built-in user-id in Windows Family of Operating systems. This user-id created by Windows Setup itself to manage the PC system. An “Administrator” account has all the rights, permission and privileges to create or remove or Edit users, groups and sharing as well Install/Uninstall software or hardware. This user-id is also responsible for “networking” on the computer system.
Common administrative tasks


·         Backing up and restoring data
·         Changing group memberships
·         Checking event logs
·         Creating administrative scripts
·         Creating logon scripts
·         Creating user and group accounts
·         Deploying and upgrading software
·         Installing a DHCP server
·         Installing a domain controller
·         Managing applications on a local computer
·         Managing applications remotely
·         Managing directory replication
·         Managing disks and volumes
·         Managing files and folders
·         Managing network printers
·         Managing servers remotely
·         Managing services
·         Monitoring network traffic
·         Monitoring security-related events
·         Monitoring server performance
·         Resetting user passwords
·         Safeguarding your system
·         Scheduling tasks
·         Setting up DNS
·         Setting up TCP/IP
·         Setting user and group security



What is Network Administration?

A computer network is the collection of computers, servers and other peripheral devices in a business and organization etc. Administrator is actually the skilled, trained and qualified person. Who use “Administrator” user-id, to build the computer network in any environment as LAN, WAN, Intranet and Virtual Private Network (VPN).
In the beginning, servers and workstations are arranged and setup by a LAN topology such as BUS and STAR. Then according to the need and requirement of business Operating systems and Applications are installed and configured either on Server system or at local host. A network and its resources are then made available to users across the network with different logins (user-id). Users, network, Domain and devices are all controlled, run and managed by Administrator on the Network Operating System (NOS) e. g., Windows Server 2003/2008 or NetWare and Linux etc.

Network administration is very much responsible and execution of intelligence for better control, management and running day-to-day business. This task includes many roles, activities and jobs. Such as:
1.                  Creating Groups and group policies
2.                  Installing, configuration and managing Active Directory
3.                  Installing, configuration and managing Domain and DNS
4.                  Installing, configuration and managing Web Sites and FTP  sites (IIS Web Server)
5.                  Working on Sharing of Files/Folders and devices
6.                  Solving problems related to permissions, rights and storage etc.
7.                  Setting up Safe and Secure Internet connection with the help of Proxy Server and Firewall.
8.                  Troubleshooting, Preparing and managing IP addresses, Cable and NIC
9.                  Extending LAN through HUB or Switch
10.  Knowledge of UTP and Coaxial cable wiring and tools.



It is plastic connector used to plug UTP cable wiring in 4 pairs. It is a basic component in computer networking as ARCNet (Attached Resources Computer Network) and STAR topology. RJ45 needs at both ends of the UTP cable to insert the media to be connected to an NIC, Switch or HUB. RJ45 cabling has two methods known as Straight-through and Cross-over.


BNC

BNC or Bus Network Connection is the copper device. It enables the coaxial cable to connect to NIC, HUB or Switch. This device has transceiver capable of transmitting and receiving digital/analog signal to and fro the media (thin or thick coaxial cable).

Windows Server 2003

Introduction (Overview)
Microsoft Windows 2003 Advanced Server is basically a network operating system (NOS) designed to setup, configure, manage and to run the Client/Server network based on Windows platforms ( Windows 2000, Windows XP and Windows Vista). This is very much similar to other Multiuser operating systems such as LINUX, UNIX and NetWare etc. Windows 2003 Advanced Server operating system has become popular to setup the LANs, Intranet and Internet Servers (ISP) as well as Web Servers. This Operating system is available in following categories:
1. Enterprise Edition
2. Standard Edition
3. Web Edition
4. Datacenter Edition

Windows 2003 Advanced Server can be  confugured in many different roles, which are as follows:
1. File Server
2. Application Server (IIS)
3. Active Directory (Domain Controller)
4. Print Server
5. DHCP Server
6. Terminal Server
7. Mail Server
8. Streaming Media Server


What is Active Directory
It is a Windows-based directory service. Active Directory stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources (ftp site, Web site and printer etc.) anywhere on the network using a single logon process.
It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.

DHCP Overview
DHCP is the abbreviation for Dynamic Host Configuration Protocol. It is a TCP/IP service protocol that offers dynamic leased configuration of host IP addresses. DHCP provides safe, reliable, and simple TCP/IP network configuration.It  prevents address conflicts, and helps conserve the use of client IP addresses on the network.
DHCP uses a client/server model where the DHCP server maintains centralized management of IP addresses that are used on the network. DHCP clients request and obtain lease of an IP address as part of their network boot process.
DHCP terminology
1. scope: A scope is the full consecutive range of possible IP addresses for a network. Scopes typically define a single physical subnet in our network (Class C/B/A).
2. Address pool: In a DHCP scope, the remaining addresses are eligible for dynamic assignment by the server to DHCP clients on your network--leaving exclusion ranges.
3. Lease: A lease is a length of time that a DHCP server specifies, during which a client computer can use an assigned IP address. When a lease is made to a client, the lease is active. Before the lease expires, the client typically needs to renew its address lease assignment with the server. A lease becomes inactive when it expires or is deleted at the server. The duration for a lease determines when it will expire and how often the client needs to renew it with the server









Post a Comment

0 Comments

';