Pitanja IT
Pitanja IT
Pitanja IT
aspx
https://technet.microsoft.com/en-us/library/cc940018.aspx
https://www.techopedia.com/6/28587/internet/8-steps-to-understanding-ip-subnetting
http://computernetworkingnotes.com/ccna-study-guide/subnetting-tutorial-subnetting-
explained-with-examples.html
PITANJA!
Interne i eksterne komponente računara!
Dodavanje novog hardvera.
Instaliranje drajvera, i problemi koji nastanu prilikom instalacije.
Kako se prave PC NETWORKS?
Ruteri i mrežna oprema!
Razlike između rutera, switcha i huba.
Kako provjeriti da li postoji konekcija između dva računara?
Kako šerovati fajlove i permisije drugih korisnika?
Dodavanje korisnika i njihovih atributa?
1. Difference between switch and router (o glavu vazno!) :) - switch samo spaja kompjutere pomocu
kablova u mrezu, a router je mozak svega, on prevodi signale, salje informacije itd, iscitaj to dobro
2. At least 2 ways to launch Task Manager?
3. How do we share folders?
4. How do you change passwords of other users of PC?
5. How to check out if a remote device is online?
Workgroup:-
Domain: -
“ipconfig”
1
Which set wizard will run to do peer to peer networking in XP?
Which command is used to check the physical connectivity between two computers?
Ping
Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on
the local network have to go through before accessing information on the Internet. By using a proxy server, an organization
can improve the network performance and filter what users connected to the network can access.
NTDS
International Networking
In windows98 it is command.com
In XP it is NTLDR
Linux doesn’t support windows file system that contain partition scheme. It (Linux) has its own file system known as ext2,
and ext3. it will install only on it.In linux file system it will install on / (root) partition.
It’s the hard disk space that is used as RAM for fast processing. In window it’s known as virtual memory and could be set as
per retirement via this path
In Linux it’s known as SWAP space and generally taken the double size of physical RAM For example if you have 256 (MB)
DDR physical ram then swap space would be 512 MB.
2
Start ==> Run ==> Command ==>ipconfig
What is IP?
Internet Protocol (IP) is an unreliable, best effort delivery, connection-less protocol used for transmitting and receiving data
between hosts in a TCP/IP network
On server side
My computer ==> properties ==> remote ==> Tick mark on this check box allow user to connect this computer remotely ==>
select user.
On client
start ==> program ==> accessories ==> communication ==> remote desktop ==> Server ip ==> user name and password
configured on server.
Physical installation of modem ==> install modem driver ==> my network place ==> properties ==> Make new connection
==> next ==>connection to internet ==> setup my connection manually ==> Connect using a dial up modem
Install local printer on that pc which has physically attached printer. And then Right click on it ==> share ==> In xp if you run
small office set wizard it will be share automatically. On all other PC install network printer. While installing printer choose
network printer.
One that required user name and password to connect the internet like BSNL or Reliance for this type of connection
Physical installation of modem ==> my network place ==> properties ==> Make new connection ==> next ==> connection to
internet ==> setup my connection manually ==> Connect using a broadband connection that requires a user name and
password ==> ISP name ==> User name and password ==> add a short cut to desktop
If you are using other type of connection like Airtel for this type of connection you don't required any additional
configuration
64 MB
3
What is firewall?
The primary method for keeping a computer secure from unauthorized user. A firewall allows or blocks traffic into and out
of a private network or the user's computer. Firewalls are widely used to give users secure access to the Internet as well as
to separate a company's public Web server from its internal network.
XP pack 2 has a built in firewall that is enabled by default. To change the setting of it use this path
Active Directory is a network-based object store and service that locates and manages resources, and makes these
resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is
considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes
and its own security access control list (ACL).
Workers are not able to print from the printer, there user logon are correct and are allowed to print from that printer in
active directory. How would you resolve this issue?
Make sure no viruses present. Some Viruses can shut down IPC shares and printing services.
Where are the Windows NT Primary Domain Controller (PDC) and its Backup Domain Controller (BDC) in Server 2003?
The scheme of PDC and BDC is replaced by The Active Directory in server 2000 and further. Now all domain controllers
share a multi master peer-to-peer read and write relationship that hosts copies of the Active Directory.
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which
partition and hard drive to boot from.
I can't seem to access the Internet, don't have any access to the corporate network and on IP configuration on my address
is 169.254.*.*. What happened?
The 169.254.*.* net mask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The
name for the technology is APIPA (Automatic Private Internet Protocol Addressing).
4
What are the difference between hub and switch?
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its insert. It is unable to detect
the collision. It works on single collision and single broadcast domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices attached on its port. CAM table is
used to make the forwarding decision. It works on per port collision and single broadcast domain.
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how the information is travel form
one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by
a boot program, manages all the other programs in a computer. It provides a platform to application software.
The collection of mostly used software released in package Form Company. For Example Ms-Office that contain word,
power point, Excel, etc.
IN - 'IN' stands for India. The 'IN' is a 2-letter country code for India.
In a ring topology, device one connects to device two, device two connects to device three, and so on to the last device,
which connects back to device one.
STP cable is mostly used by IBM; it has an extra cover over each pair.
UTP cable is used in star topology. It has a single cover over all pair.
5
What is IEEE?
The Institute of Electrical and Electronics Engineers or IEEE (read eye-triple-e) is an international non-profit, professional
organization for the advancement of technology related to electricity. It has the most members of any technical
professional organization in the world, with more than 365,000 members in around 150 countries.
What is 802.3?
IEEE 802.3 is a collection of IEEE standards defining the physical layer and the media access control (MAC) of the data link
layer of wired Ethernet. Physical connections are made between nodes and infrastructure devices hubs, switches and
routers by various types of copper or fiber cable.
64MB RAM
10Base2— An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling,
with a contiguous cable segment length of 100 meters and a maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling,
with 5 continuous segments not exceeding 100 meters per segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and
twisted pair cabling.
What is the difference between an unspecified passive open and a fully specified passive open?
An unspecified passive open has the server waiting for a connection request from a client.
A fully specified passive open has the server waiting for a connection from a specific client.
A TCB is a complex data structure that contains a considerable amount of information about each connection.
A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that
contains information about the device's status, its performance, connections, and configuration. The MIB is queried by
SNMP.
Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses
a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only.
6
Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of
setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can
access.
A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no
connection can take place.
The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is
sent to the client from the server after reception of a client's request
External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not
system-dependent.
What is topology?
A topology defines how the devices are connected. Further it is divided in physical and logical topology.
1. Define Network?
A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more
nodes by a physical link or two or more networks connected by one or more nodes.
2. What is a Link?
At the lowest level, a network can consist of two or more computers directly connected by some physical medium such
as coaxial cable or optical fiber. Such a physical medium is called as Link.
3. What is a node?
A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or
optical fiber. Such a physical medium is called as Links and the computer it connects is called as Nodes.
A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards
message from one network to another.
7
If the physical links are limited to a pair of nodes it is said to be point-point link.
If the physical links are shared by more than two nodes, it is said to be Multiple Access.
a. Security/Encapsulation
b. Distributed database
c. Faster Problem solving
d. Security through redundancy
e. Collaborative Processing
8. What are the criteria necessary for an effective and efficient network?
a. Performance
It can be measured in many ways, including transmit time and response time. b. Reliability
It is measured by frequency of failure, the time it takes a link to recover from a failure, and the network's robustness.
c. Security
Security issues includes protecting data from unauthorized access and virues.
a. Number of Users
b. Type of transmission medium
c. Hardware
d. Software
10. Name the factors that affect the reliability of the network?
a. Frequency of failure
b. Recovery time of a network after a failure
11. Name the factors that affect the security of the network?
a. Unauthorized Access
b. Viruses
a. Connectivity
b. Cost-effective Resource Sharing
c. Support for common Services
d. Performance
8
15. Define Bandwidth and Latency?
Network performance is measured in Bandwidth (throughput) and Latency (Delay). Bandwidth of a network is given by
the number of bits that can be transmitted over the network in a certain period of time. Latency corresponds to how long
it t5akes a message to travel from one end off a network to the other. It is strictly measured in terms of time.
The process of determining systematically hoe to forward messages toward the destination nodes based on its address is
called routing.
The processes on each machine that communicate at a given layer are called peer-peer process.
It is possible that a switch receives packets faster than the shared link can accommodate and stores in its memory, for
an extended period of time, then the switch will eventually run out of buffer space, and some packets will have to be
dropped and in this state is said to congested state.
Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of
the underlying technology. The gap between what applications expects and what the underlying technology can provide
is called semantic gap.
The duration of time it takes to send a message from one end of a network to the other and back, is called RTT.
If the message is sent from a source to a single destination node, it is called Unicasting.
If the message is sent to some subset of other nodes, it is called Multicasting.
If the message is sent to all the m nodes in the network it is called Broadcasting.
Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data
link.
FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of
the signals to be transmitted.
When were OSI model developed and why its standard called 802.XX and so on?
9
OSI model was developed in February 1980 that why these also known as 802.XX Standard (Notice 80 means ==> 1980,
2means ==> February)
If you have not activated windows XP, you can do so at any time by clicking the windows Activation icon in the system tray
to initiate activation. Once you have activated windows XP, this icon disappears from the system tray.
For registration
In computer it's known as com port and could be available in 9 pin or 25 pin. On router it have 60 pins.
1. Open Network Connections by clicking the Start button , and then clicking Control Panel. In the search box, type
adapter, and then, under Network and Sharing Center, click View network connections.
2. Select an active network connection, and then, in the toolbar, click View status of this connection. (You might need
to click the chevron to find this command.)
3. Click Details.
My computer ==> right click ==> manage ==> disk management ==>
10
What is IP?
Three ranges of IP addresses have been reserved for private address and they are not valid for use on the Internet. If you
want to access internet with these address you must have to use proxy server or NAT server (on normal cases the role of
proxy server is played by your ISP.). If you do decide to implement a private IP address range, you can use IP addresses
from any of the following classes:
A public IP address is an address leased from an ISP (internet service provider) that allows or enables direct Internet
communication.
Reduce network traffic. Broadcast traffic can be isolated within a single logical network.
Provide a way to secure network traffic by isolating it from the rest of the network.
What are the differences between static ip addressing and dynamic ip addressing?
With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic
addressing, the IP address can change periodically and is managed by a centralized network service.
What is APIPA?
Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA enables clients to
still communicate with other computers on the same network segment until an IP address can be obtained from a DHCP
server, allowing the machine to fully participate on the network. The range of these IP address are the 169.254.0.1 to
169.254.255.254 with a default Class B subnet mask of 255.255.0.0.
11
The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the same way that the HOSTS file is a
static method of resolving domain names into IP addresses. An LMHOSTS file is a text file that maps NetBIOS names to IP
addresses; it must be manually configured and updated.
A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.
What is FQDN?
An FQDN contains (fully qualified domain name) both the hostname and a domain name. It uniquely identifies a host within
a DNS hierarchy
DNS servers often must communicate with DNS servers outside of the local network. A forwarder is an entry that is used
when a DNS server receives DNS queries that it cannot resolve locally. It then forwards those requests to external DNS
servers for resolution.
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
Start ==> administrative tools ==> service ==> windows audio ==> start up type ==> automatic
Start ==> administrative tools ==> service ==> IMAPI CD burning com service ==> start up type ==> automatic
Local Area Networks Local area networks (LANs) are used to connect networking devices that are in a very close
geographic area, such as a floor of a building, a building itself, or a campus environment.
Wide Area Networks Wide area networks (WANs) are used to connect LANs together. Typically, WANs are used when the
LANs that must be connected are separated by a large distance.
Metropolitan Area Networks A metropolitan area network (MAN) is a hybrid between a LAN and a WAN.
12
Content Networks Content networks (CNs) were developed to ease users’ access to Internet resources. Companies deploy
basically two types of CNs:
Storage Area Networks Storage area networks (SANs) provide a high-speed infrastructure to move data between storage
devices and file servers.
Advantage
Performance is fast.
Intranet An intranet is basically a network that is local to a company. In other words, users from within this company can
find all of their resources without having to go outside of the company. An intranet can include LANs, private WANs and
MANs,
Extranet An extranet is an extended intranet, where certain internal services are made available to known external users or
external business partners at remote locations.
Internet An internet is used when unknown external users need to access internal resources in your network. In other
words, your company might have a web site that sells various products, and you want any external user to be able to access
this service.
VPN A virtual private network (VPN) is a special type of secured network. A VPN is used to provide a secure connection
across a public network, such as an internet. Extranets typically use a VPN to provide a secure connection between a
company and its known external users or offices. Authentication is provided to validate the identities of the two peers.
Confidentiality provides encryption of the data to keep it private from prying eyes. Integrity is used to ensure that the data
sent between the two devices or sites has not been tampered with.
13