Professional Documents
Culture Documents
Operating Sytem Answers
Operating Sytem Answers
In a workgroup:
• All computers are peers; no computer has control over another computer.
• Each computer has a set of user accounts. To use any computer in the workgroup,
you must have an account on that computer.
In a domain:
• One or more computers are servers. Network administrators use servers to control
the security and permissions for all computers on the domain. This makes it easy to
make changes because the changes are automatically made to all computers.
• If you have a user account on the domain, you can log on to any computer on the
domain without needing an account on that computer.
RIS can be used only for clean installations and can't be used to upgrade a previous version of
Windows. A RIPrep image can contain the operating system and applications. Computers that
are connected to the same network as the server and have PXE enabled, automatically start the
RIS sequence.
• Image Deployment
• Silent installation
Installation that does not display messages or windows during its progress. "Silent installation" is
not the same as "unattended installation", though it is often improperly used as such.
• Unattended installation
Installation that is performed without user interaction during its progress or, in a stricter sense,
with no user present at all, except eventually for the initial launch of the process. An installation
process usually requires a user who "attends" it to make choices at request: accepting an EULA,
specifying preferences and passwords, etc. In graphical environments, installers that offer
a wizard-based interface are common. However these installers may also provide command
line switches that allow performing unattended installations.
• Answer file
Some unattended installations can be driven by a script providing answers to the various choices
such as the answer file which can be used when installing Microsoft Windows on a large number
of machines.
• Self installation
Unattended installation, without the need of initial launch of the process (i.e. Vodafone Mobile
Connect USB Modem or Huawei E220'sMobile Partner software that self-installs from the USB
port).
• Headless installation
Installation performed without using a monitor connected to the destination computer (in
particular, on a computer with no video output at all). This can be an (attended) installation
performed from another machine connected via LAN or via a serial cable.
Unattended and headless installations are common tasks for system administrators.
• Clean installation
Given the complexity of a typical installation there are many factors that may interfere with its
successful completion. In particular files that are leftover from old installations of the same
program or an unstable situation of the operating system may all act to prevent a given program
from installing and working correctly. An installation performed in absence of such interfering
factors (which may vary from program to program) is called a clean installation. In particular, a
clean operating system installation can be performed by formatting its destination partition before
the actual installation process.
• Flat installation
An installation of a program performed from a copy (called a flat copy) of its original media
contents (mostly CDs or DVDs) to a hard drive, rather than directly from the media. This may help
in some situations where the target machine isn't able to cope with random access reads from
CD/DVD at the same time as performing the CPU-intensive tasks often required by an
installation, or where the target machine does not have an appropriate physical drive.
• Network Installation
An installation of a program from a shared network drive. This may simply be a copy of the
original media (as in a Flat Installation), but frequently, software publishers which offer site
licenses for institutional customers provide a version intended for installation over a network.
• Virtual installation
AmigaOS features a centalized standard installation utility called Installer since version 2.0 in
1991. It is driven by a LISP language interpreter, and users have the faculty of editing the
installation scripts as these are plain text files. Installer also features the unsurpassed chance for
users to perform virtual installations and verify any possible problem before committing the real
installation.
Q: What is Syprep?
The System Preparation tool (Sysprep) is a technology that you can use with other deployment
tools to install Microsoft Windows operating systems with minimal intervention by an administrator
or technician. Sysprep is typically used during large-scale rollouts when it would be too slow and
costly to have administrators or technicians interactively install the operating system on individual
computers.
The System Preparation tool (Sysprep) is a technology that you can use with
other deployment tools to install Microsoft Windows operating systems with
minimal intervention by an administrator or technician.
HIBERFIL.SYS
HIBERFIL.SYS is a file the system creates when the computer goes into hibernation mode. Windows uses the
file when it is turned back on. If you don't need hibernation mode and want to delete the file you need to
turn the hibernation option off before Windows will allow you to delete the file. The procedure for turning
hibernation off differs markedly between Windows XP and Vista. The file size depends largely on the size of
active RAM in the computer as the contents of the file are basically a RAM image.
Windows XP
• Procedure for Windows XP. This procedure makes use of the graphical user interface.
o Uncheck the Enable Hibernation box if you don't need the hibernation function.
Windows Vista
Procedure for Windows Vista and Windows 7. This procedure requires that you be an
o Right click on the Command Prompt entry and choose Run as Administrator from the
context menu that pops up (OK any UAC queries about doing this).
o At the command prompt (where the flashing cursor is) type powercfg.exe /hibernate off
o The box should flash and you'll be back at the Command Prompt; type exit and press the
o Hibernation should now be turned off and the file HIBERFILE.SYS deleted. If you want to
Q: What is registry?
The Windows Registry is a hierarchical database that stores configuration settings and options on
Microsoft Windows operating systems. It contains settings for low-level operating system
components as well as the applications running on the platform: the kernel, device drivers,
services, SAM, user interface and third party applications all make use of the Registry. The
registry also provides a means to access counters for profiling system performance.
Registry entries. To modify settings for other programs, use the following steps to make changes in the
Registry itself:
1. Start RegEdit and export the key you want to modify by following the steps in the "Backup
NOTE: if you are changing a path, verify that is correct before you change the Registry.
5. Click OK.
Q: Describe the three most common types of cabling media used in LANs.
The three most common types of cabling media used in LANs are:
Coaxial Cable. Coaxial cable comes in two versions: Thinnet and Thicknet. Thinnet
looks like regular TV cable.* It is about 1/4 inch in diameter and is very flexible and
easy to work with. In contrast, Thicknet is about 1/2 inch in diameter and not very
flexible. Thicknet is older and not very common anymore except as a backbone
within and between buildings. Coax transmits at 10 Mbps..
Twisted Pair. Twisted pair looks like telephone wire and consists of insulated strands
of copper wire twisted together. There are two versions of twisted pair cable:
Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP). STP is commonly
used in Token Ring networks and UTP in Ethernet networks where it is referred to as
"10baseT." Transmission rates vary between 10-100 Mbps..
*Don’t confuse Thinnet cable (RG 58) with cable TV cable (RG 59). They look alike
but they are not interchangeable.
Q: What are the recommended maximum segment lengths for each type of
cable?
The type of cable plays a role in how fast a signal will degrade as it is transmitted.
The following are the recommended maximum cable lengths:
Unshielded Twisted Pair (UTP) - maximum length of cable between hub and
computer is 100 meters (328 feet)
Q: What is a backbone?
In its most common form, a backbone is used to connect hubs. Each hub represents
a segment on which individual workstations are connected via UTP cable. The hubs
from different segments are then connected to each other with thinnet cable. In this
case, the thinnet cable functions as the backbone that links the hubs.
Networking
Q: What is an IP Address?
An Internet Protocol address (IP address) is a numerical label that is assigned to any
device participating in a computer network that uses the Internet Protocol for
communication between its nodes.
A subnet mask allows you to identify which part of an IP address are reserved for
the network, and which part is available for host use. If you look at the IP address
alone, especially now with classless inter-domain routing, you can't tell which part
of the address is which. Adding the subnet mask, or net mask, gives you all the
information you need to calculate network and host portions of the address with
ease. In summary, knowing the subnet mask can allow you to easily calculate
whether IP addresses are on the same subnet, or not.
Q: IP Address Series?
ARP stands for Address Resolution Protocol and was touched on in the previous question as a means of resolving a
IP address to an actual physical network card address.
All network cards have a unique 48 bit address, that is written as six hexadecimal pairs, e.g. 00-A0-24-7A-01-48, and
this address is hard coded into the network card. You can view your network cards hardware address by typing
ipconfig /all
Every computer in a LAN has 2 identifiers: IP and MAC address. IP is either entered by the user or dynamically
allocated by a server. But the MAC address is unique for any Ethernet card. For example, if you have 2 ethernet
cards, one for wired and the other for WiFi, you have 2 MAC addresses on your machine. The MAC address is a
hardware code for your ethernet card.
The communications between computers is done on the IP level. Means that if you want to send a file to a computer,
you need to know the other computer IP.
Now, ARP is the protocol that matches every IP with a certain MAC address in ARP table that is saved on your switch
in your LAN.
For Normal case, when a machine tries to connect to another machine. The first machine goes to the ARP table with
the other machine IP, the ARP table provide the MAC address for the other machine and the communication starts.
But if someone plays with the table, the first machine goes with the IP and the ARP table will provide a faulty MAC
address to a 3rd machine who wants to intrude through your communication.
A Default gateway is a node (a router) on a TCP/IP Network that serves as an access point to
another network. A default gateway is used by a host when the ip's packet destination address
belongs to someplace outside the local subnet.
Q: Can a workstation computer be configured to browse the Internet and yet NOT have a
default gateway?
Q: What is a Subnet?
Q: Benefits of Subnetting?
1. It provides security
In larger companies, employees must be able to communicate with other
employees from that department. Subnetting allows for the department to have its
own sub network. Depending on how many departments the company has, each
one can have its own private and secure sub network, independent from the other
networks.
A company has several departments or types of resources: sales, customer care, IT, executive and
research. With subnetting, these resources can be organized within the larger network.
Using subnets will decrease the size of the broadcast domain, allowing data to reach its destination
much faster.
A Windows-based computer that is configured to use DHCP can automatically assign itself an Internet
Protocol (IP) address if a DHCP server is not available. For example, this could occur on a network
without a DHCP server or on a network if a DHCP server is temporarily down for maintenance.
Windows 98/ME
You can also determine whether your computer is using APIPA by using the Winipcfg
tool in Windows Millennium Edition, Windows 98, or Windows 98 Second Edition:
Click Start, click Run, type "winipcfg" (without the quotation marks), and then click
OK. Click More Info. If the IP Autoconfiguration Address box contains an IP address
within the 169.254.x.x range, Automatic Private IP Addressing is enabled. If the IP
Address box exists, automatic private IP addressing is not currently enabled.
Windows 2000/XP/2003
For Windows 2000, Windows XP, or Windows Server 2003, you can determine
whether your computer is using APIPA by using the IPconfig command at a
command prompt:
Click Start, click Run, type "cmd" (without the quotation marks), and then click OK
to open a MS-DOS command line window. Type "ipconfig /all" (without the quotation
marks), and then hit the ENTER key. If the 'Autoconfiguration Enabled' line says
"Yes", and the 'Autoconfiguration IP Address' is 169.254.x.y (where x.y is the client's
unique identifier), then the computer is using APIPA. If the 'Autoconfiguration
Enabled' line says "No", then the computer is not currently using APIPA.
Q: What is an RFC Name a few if possible not necessarily the numbers just the idea behind
them?
A Request For Comments (RFC) document defines a protocol or policy used on the Internet. An RFC
can be submitted by anyone. Eventually, if it gains enough interest, it may evolve into an Internet
Standard Each RFC is designated by an RFC number. Once published, an RFC never changes.
Modifications to an original RFC are assigned a new RFC number.
RFC 1918 is Address Allocation for Private Internets The Internet Assigned Numbers Authority (IANA)
has reserved the following three blocks of the IP address space for private internets: 10.0.0.0 -
10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 -
192.168.255.255 (192.168/16 prefix) We will refer to the first block as "24-bit block", the second as
"20-bit block", and to the third as "16-bit" block. Note that (in pre-CIDR notation) the first block is
nothing but a single class A network number, while the second block is a set of 16 contiguous class B
network numbers, and third block is a set of 256 contiguous class C network numbers.
Q: You need to view at network traffic. What will you use? Name a few tools
Depends what type of traffic I want to monitor and the network design. I really liked using Fluke Networks
OptiView Network Analyzer. Software though I would say wireshark, sitrace, Iris Network Traffic Analyzer,
Airsnare, Packetcapsa. Backtrack (a linux live CD) has tons of different applications that you can use to
monitor and view network traffic.
Q: What is DHCP? What are the benefits and drawbacks of using it?
Benefits:
Disadvantage
Your machine name does not change when you get a new IP address. The DNS (Domain Name
System) name is associated with your IP address and therefore does change. This only presents a
problem if other clients try to access your machine by its DNS name.
Benefits:
Disadvantage
Your machine name does not change when you get a new IP address. The DNS (Domain Name
System) name is associated with your IP address and therefore does change. This only presents a
problem if other clients try to access your machine by its DNS name.
Q: Describe the steps taken by the client and DHCP server in order to obtain an IP address.
At least one DHCP server must exist on a network. Once the DHCP server software
is installed, you create a DHCP scope, which is a pool of IP addresses that the server
manages. When clients log on, they request an IP address from the server, and the
server provides an IP address from its pool of available addresses.
DHCP was originally defined in RFC 1531 (Dynamic Host Configuration Protocol,
October 1993) but the most recent update is RFC 2131 (Dynamic Host Configuration
Protocol, March 1997). The IETF Dynamic Host Configuration (dhc) Working Group is
chartered to produce a protocol for automated allocation, configuration, and
management of IP addresses and TCP/IP protocol stack parameters.
Requests are on UDP port 68, Server replies on UDP 67 double check. These are
reversed.
Go to... START-->Administrative Tools --> Server Manager --> Roles (Right Click)
--> Add Roles (Here a Add roles wizard will appear) --> Check the box of DHCP
Server --> click next --> Next --> In IPv4 DNS settings Give the parent domain
Name and DNS server
IP address and validate it... Click Next --> Add the DHCP scopes --> Disable
DHCPv6... Click
Q: What is NAT?
PAT translates ports, as the name implies, and likewise, NAT translates addresses.
Sometimes PAT is also called Overloaded NAT
IPv6 is 128 bits, can support up to 2128 addresses to fulfill future needs with better
security and network related features. Here are some examples of IPv6 address:
1050:0:0:0:5:600:300c:326b
ff06::c3
0:0:0:0:0:0:192.1.56.1
Pv4
IPv6
• Source and destination addresses are 128 bits (16 bytes) in length.
• IPSec support is required.
• IPv6 header contains Flow Label field, which identifies packet flow for QoS handling
by router.
• Only the sending host fragments packets; routers do not.
• Header does not include a checksum.
• All optional data is moved to IPv6 extension headers.
• Multicast Neighbor Solicitation messages resolve IP addresses to link-layer
addresses.
• Multicast Listener Discovery (MLD) messages manage membership in local subnet
groups.
• ICMPv6 Router Solicitation and Router Advertisement messages are used to
determine the IP address of the best default gateway, and they are required.
• IPv6 uses a link-local scope all-nodes multicast address.
• Does not require manual configuration or DHCP.
• Uses host address (AAAA) resource records in DNS to map host names to IPv6
addresses.
• Uses pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6
addresses to host names.
• Must support a 1280-byte packet size (without fragmentation).
Active Directory
Q: What is active directory?
The database that holds information about component locations, users, groups, passwords,
security, and other COM information. Some of this information is currently stored in the
Registry, but will eventually (with Windows 2000) be moved to the Active Directory.
The Lightweight Directory Access Protocol, or LDAP, is an application protocol for querying
and modifying data using directory services running over TCP/IP.
LDAP lets you "locate organizations, individuals, and other resources such as files and
devices in a network, whether on the Internet or on a corporate intranet," and whether or
not you know the domain name, IP address, or geographic whereabouts. An LDAP directory
can be distributed among many servers on a network, then replicated and synchronized
regularly. An LDAP server is also known as a Directory System Agent (DSA).
Q: Can you connect Active Directory to other 3rd-party Directory Services? Name a
few options.
A: All active directory data base security related information store in SYSVOL folder and its only
created on NTFS partition.
B: The Sysvol folder on a Windows domain controller is used to replicate file-based data among
domain controllers. Because junctions are used within the Sysvol folder structure, Windows NT file
system (NTFS) version 5.0 is required on domain controllers throughout a Windows distributed file
system (DFS) forest.