Networking Computer UAF TTS Topics
Networking Computer UAF TTS Topics
Seven Layers
2:-TRANSPORT LAYER
The Transport Layer provides the means for the transport of data segments across
the Internet Layer. The Transport Layer is concerned with end-to-end (host-to-host)
communication.
Transmission Control Protocol provides reliable, connection-oriented transport of data
between two endpoints (sockets) on two computers that use Internet Protocol to
communicate.
User Datagram Protocol provides unreliable, connectionless transport of data between two
endpoints (sockets) on two computers that use Internet Protocol to communicate.
The Transport Layer sends data to the Internet layer when transmitting and sends data to
the Application Layer when receiving.
INTERNET LAYER
The Internet Layer provides connectionless communication across one or more
networks, a global logical addressing scheme and packetization of data. The
Internet Layer is concerned with network to network communication.
The Internet Layer is responsible for packetization, addressing and routing of
data on the network. Internet Protocol provides the packetization, logical
addressing and routing functions that forward packets from one computer to
another.
The Internet Layer communicates with the Transport Layer when receiving and
sends data to the Network Access Layer when transmitting.
NETWORK ACCESS LAYER
The Network Access Layer provides access to the physical network.
This is your network interface card. Ethernet, FDDI, Token Ring, ATM, OC, HSSI,
or even Wi-Fi are all examples of network interfaces. The purpose of a network
interface is to allow your computer to access the wire, wireless or fiber optic
network infrastructure and send data to other computers.
The Network Access Layer transmits data on the physical network when sending
and transmits data to the Internet Layer when receiving.
What is Media Access Control Method?
A way to allow computers to transmit signals over network cabling, while ensuring
that only one computer transmits at a time. If two computers simultaneously place
signals on the wire, a collision can occur and data might be corrupted unless a
method is used to resolve the collision gracefully. Media access control methods
act like traffic lights by permitting the smooth flow of traffic on a network, and
they prevent or deal with collisions. Media access control methods are
implemented at the data-link layer of the Open Systems Interconnection (OSI)
reference model.
Four main media access control methods are used in networking:
a. Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is used in
Ethernet networking
b. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which is used in
AppleTalk networking
c. Token passing, which is used in Token Ring and Fiber Distributed Data Interface (FDDI)
networking
d. Demand priority, which is used in 100BaseVG networking
ICMP (Internet Control Message Protocol) is an error-reporting protocol
network devices like routers use to generate error messages to
the source IP address when network problems prevent delivery of
IP packets. ICMP creates and sends messages to the source IP
address indicating that a gateway to the Internet that a router,
service or host cannot be reached for packet delivery. Any IP
network device has the capability to send, receive or process
ICMP messages.
ICMP is not a transport protocol that sends data between systems.
While ICMP is not used regularly in end-user applications, it is used by network
administrators to troubleshoot Internet connections in diagnostic utilities
including ping and traceroute.
One of the main protocols of the Internet Protocolsuite, ICMP is used by routers,
intermediary devices or hosts to communicate error information or updates to other
routers, intermediary devices or hosts. The widely used IPv4 (Internet Protocol version
4) and the newer IPv6 use similar versions of the ICMP protocol (ICMPv4 and ICMPv6,
respectively).ICMP messages are transmitted as datagramsand consist of an IP header
that encapsulates the ICMP data. ICMP packets are IP packets with ICMP in the IP data
portion. ICMP messages also contain the entire IP header from the original message,
so the end system knows which packet failed
UDP (User Datagram Protocol)
UDP (User Datagram Protocol) is an alternative communications protocol to Transmission
Control Protocol (TCP) used primarily for establishing low-latency and loss-tolerating
connections between applications on the internet. Both UDP and TCP run on top of the Internet
Protocol (IP) and are sometimes referred to as UDP/IP or TCP/IP. But there are important
differences between the two.
Where UDP enables process-to-process communication, TCP supports host-to-host
communication. TCP sends individual packets and is considered a reliable transport medium;
UDP sends messages, called datagrams, and is considered a best-effort mode of
communications.
In addition, where TCP provides error and flow control, no such mechanisms are supported in
UDP. UDP is considered a connectionless protocol because it doesn't require a virtual circuit to
be established before any data transfer occurs.
UDP provides two services not provided by the IP layer. It provides port numbers to help
distinguish different user requests and, optionally, achecksum capability to verify that the data
arrived intact.
TCP has emerged as the dominant protocol used for the bulk of internet connectivity due to its
ability to break large data sets into individual packets, check for and resend lost packets, and
reassemble packets in the correct sequence. But these additional services come at a cost in
terms of additional data overhead and delays called latency.
1.Security at the core
Exchange 2019 runs on Windows Server 2019 Core, providing the most secure and reliable
platform possible for your messaging infrastructure.
2.Improved Performance
Exchange Server 2019 uses available processor cores, memory and storage more effectively than
ever before, as well as more intelligently managing internal system resources to help improve
end-user performance.
3.Simpler Administration 4.Mobile productivity
Exchange Server 2019 makes Connect, organize, get things done on the go.
administration easier for common tasks Outlook mobile is the most secure and compliant
such as calendar and delegate way to access Exchange Online on your mobile
management. device.
Updates for Exchange :
Exchange follows a quarterly delivery model to release Cumulative Updates (CUs) that
address customer-reported issues and to possibly add new functionality and/or features.
Critical product updates (packages that address a Microsoft-released security bulletin or
contain a change in time zone definitions) are released as needed on a monthly basis for
the most recently released CU and the preceeding CU.
ISA SERVER
Microsoft's ISA Server (Internet Security and Acceleration Server) is the successor to
Microsoft's Proxy Server 2.0 (see proxy server) and is part of
Microsoft's .NET support. ISA Server provides the two basic services of
an enterprise firewall and a Web proxy/cache server. ISA Server's firewall screens
all packet-level, circuit-level, and application-level traffic. The Web cache stores and
serves all regularly accessed Web content in order to reduce network traffic and
provide faster access to frequently-accessed Web pages. ISA Server also schedules
downloads of Web page updates for non-peak times.
ISA Server allows administrators to create policies for regulating usage based on user, group,
application, destination, schedule, and content type criteria. ISA Server is designed to work
with Windows 2000 and later operating systems and to take advantage of
Windows' Kerberos security. ISA Server includes a software development kit (SDK).
ISA Server comes in two editions, Standard Edition and Enterprise Edition. Standard Edition is
a stand-alone server that supports up to four processors. Enterprise Edition is for large-scale
deployments, server array support, multi-level policy, and computers with more than four
processors. Licenses are based on the number of processors.