Professional Documents
Culture Documents
A, OS and N
A, OS and N
CONTENT
Hardware( A+)
Operating System
CONTENT
S.no Networking ( N+) Page no.
1 Networking Introduction 124
6 148
Media Connector
7 Cabling 150
10 TCP/IP 157
11 IP Addressing 165
12 Subnetting 171
14 Firewall 181
17 Cryptography 187
20 Li-Fi 201
Computer Introduction
Definition: Computer is an electronic device which takes data as an input, process
it and then gives out result as an output.
Input device
Mouse Keyboard Scanner
Output Device
UPS (Uninterrupted Power Supply): It is neither input device nor output device. It is just only a
power backup supplier.
Touch Screen:
Storage Device: Hard disk, Pen drive, CD/DVD, Floppy disk, tape drive, memory card etc.
Page |5
Memory unit
The smallest unit of memory is bits
1 bits = 0 or 1
4 bits = 1 Nibble
8 bits = 1 Byte
16 bits = 1 Word
Mini CD = 210 MB
Normal CD = 700 MB
Types of Computer
1) Desktop
2) Laptop
3) Palmtop (Tab)
Page |8
1) Desktop Types
Workstation Computer
Page |9
Super computer
P a g e | 10
Applications of computer:
Office Management.
Internet.
Digital video or audio composition.
Computers in Medicine.
Mathematical Calculations.
Banks.
Tour and Travel.
Telecommunications.
Defence
E-Learning.
Examinations.
Computers in Business.
ATM machines.
News Broadcast.
Aeroplanes.
Weather analysis.
Architechure of Computer:
P a g e | 12
1) Hardware
2) Software
3) Firmware
1) Hardware: All physical component of Computer system that we can see and touch it is
called computer hardware.
Software Types
System Software Application Software Utility Software
1) Translator : It is used to manage the
Interpreter Main software where we system.
Compiler works.
2) Operating System Eg: Antivirus
Used to create interface Anytime it can be added
between user and or removed from
hardware. computer
Provide platform for
other software to install Eg: MS office, Tally,
in it. Adobe photoshop,
Eg: Windows 7, Power iso etc.
Windows 10, Red hat
linux etc.
Example: Bus is computer, Driver is Operating System, Passengers are Application Software
and conductor is utility software.
P a g e | 13
Translater:
Machine code: Program written in 0's and 1's in binary, called the machine code.
Assembler:
An assembler is a program that takes basic computer instructions and converts them
into a pattern of bits that the computer's processor can use to perform its basic
operations.
Exercise :
1) Write some example of input and output device.
2) Write full form of GB, TB, PB, EB, ZB and YB.
3) Difference between interpreter and compiler ?
4) Difference between system software and application Software ?
5) Draw computer architecture ?
6) Write the disk capacity of CD, DVD, BRD and Archival disc.
7) Write the main components used in 1st, 2nd, 3rd, 4rth and 5th generation computer.
P a g e | 14
Computer Memory
Memory is a space to store data either temporary or permanently
Memory
Primary Memory Secondary Memory
RAM
RAM is also called as volatile memory because the memory can’t store the data
permanently.
RAM Types
DRAM Types
FPM DRAM: Fast page mode dynamic random access memory was the original form
of DRAM. It waits through the entire process of locating a bit of data by column and row and
then reading the bit before it starts on the next bit. Maximum transfer rate to L2 cache is
approximately 176 MBps.
EDO DRAM: Extended data-out dynamic random access memory does not wait for
all of the processing of the first bit before continuing to the next one. As soon as the address of
the first bit is located, EDO DRAM begins looking for the next bit. It is about five percent faster
than FPM. Maximum transfer rate to L2 cache is approximately 264 MBps.
RDRAM: Rambus dynamic random access memory use a special high-speed data bus
called the Rambus channel. RDRAM memory chips work in parallel to achieve a data rate of
800 MHz, or 1,600 MBps. Since they operate at such high speeds, they generate much more
heat than other types of chips. To help dissipate the excess heat Rambus chips are fitted with a
heat spreader, which looks like a long thin wafer.
P a g e | 16
2) What is FSB ?
Ans: Front Side Bus, FSB is also known as the Processor Bus, Memory Bus,
or System Bus and connects the CPU (chipset) with the main memory and L2 cache.
RAM Manufacturer
ROM
Read Only Memory.
It is non-volatile or permanent.
We can see the content but cannot do any changes ( Some options we can make up and
down)
It is secondary memory and used during the execution of Programs.
ROM Types
P a g e | 19
BIOS:
Basic Input Output System.
We can See Full System information here.
Booting Process can be modified from here.
At the initial of booting process check all enabled device in BIOS and load OS into RAM.
POST - Test the computer hardware and make sure no errors exist before loading the
operating system. Additional information on the POST can be found on our POST and
Beep Codes page.
Bootstrap Loader - Locate the operating system. If a capable operating system is
located, the BIOS will pass control to it.
BIOS drivers - Low level drivers that give the computer basic operational control
over your computer's hardware.
BIOS or CMOS Setup - Configuration program that allows you to configure
hardware settings including system settings such as computer passwords, time, and
date.
P a g e | 20
CMOS:
Complementary Metal Oxide Semiconductor.
Any changes done in BIOS setup is saved by CMOS memory.
To save configuration permanently, CMOS need power source.
A small 3 v lithium battery is used is give continuous power.
Date and time in System is maintained by this CMOS battery.
Problem -1: When I start my PC I get 12:00 time only. How to correct it?
Ans: CMOS battery may be expired. Change CMOS battery.
P a g e | 21
1) Supervisor Password or User password (setup) : This pswd will be asked if you enter
into
BIOS setup.
2) User password (always) : This password will be asked every time when system starts.
Cache Memory
It used by the central processing unit (CPU) of a computer to reduce the average cost (time
or energy) to access data from the main memory.
A cache is a smaller, faster memory, closer to a processor core, which stores copies of the
data from frequently used main memory locations.
P a g e | 23
P a g e | 24
Virtual memory:
Virtual memory is a memory management capability of an OS that uses
hardware and software to allow a computer to compensate for physical
memory shortages by temporarily transferring data from random access
memory (RAM) to disk storage.
Virtual memory is always being used, even when the memory that is required by all
running processes does not exceed the volume of RAM that is installed on the
system.
P a g e | 25
HARD DISK
Permanently Storage Magnetic device.
1)Platter (or disk) is the circular disk on which magnetic data is stored in a hard
disk.
P a g e | 26
d) Cylinder: Logical Grouping of each track from multiple plate is called ―Cylinder‖.
Stepper Motor:
Rotation speed:
1)5400
2)7200
4)10,000
5)15,000
PATA SATA
Old technology Latest technology
Parallel ATA Serial ATA
DTR : 532 mbps DTR : 1.5 gbps,3gbps,6gbps
39 pins 7pins
It is the total time it takes the computer to process a data request from the
processor and then retrieve the required data from a storage device.
Seek time:
Latency:
It is the average time for the sector being accessed to rotate into position under
a head, after a completed seek.
Fragmentation
P a g e | 30
The process of saving data is to save data in cluster and can leave some empty
sectors.
If we delete any data the data is deleted Randomly from any sector.
This creates fragmentation in hard disk that decreases hard disk performance.
How to do Defragmentation:
Path: Open my computer --> Right click on any disk(like C,D,E) --> Click on
properties -->Go to Tools --> Defragmentation
Recycle bin
1) Seagate
2) Western Digital
3) Hitachi
4) Samsung
5) Toshiba
P a g e | 31
Mother Board
The motherboard is a printed circuit board that is the foundation of a computer, located on
the back side or at the bottom of the computer chassis.
It allocates power and allows communication to the CPU, RAM, and all other
computer hardware components.
Motherboard specifically refers to a PCB with expansion capability
It is also called as ―Main Board‖.
P a g e | 32
Motherboard components
Back Panel
A) PS/2
Connector
B) VGA PORT
15 pins Female connector.
Called VGA(video Graphic
Array).
To connect Monitor or
Projector.
P a g e | 33
C) Serial Port
(D)Parallel Port
E) LAN Port
F) Audio Port
(E)USB Port
4 pins.
It is hot swappable in nature, means anytime you can plug-in or plug-out the
device.
Version Speed
1.1 12 mbps
3.1 10 gbps
Through one USB host we can connect multiple USB house and can add maximum
of 127 devices.
P a g e | 35
(a) PATA :
Old technology
Parallel ATA
P a g e | 37
39 pins
(b) SATA:
Latest technology
Serial ATA
7pins
(7)Expansion slot
P a g e | 39
Types
ISAIndustry Standard Architecture
Form factor is especially important if you build your own computer systems and
need to ensure that you purchase the correct case and components
Form Factor
BABY AT NLX Branded desktop system
ATX Mini-ITX having their own shape
Mini-ATX Nano-ITX and size. These system do
MicroATX Pico-ITX not follow standard size.
FlexATX DTX
LPX & Mini LPX
P a g e | 41
Motherboard Manufacturer:
1) Intel 2) Asus 3)HP 4)Gigabyte 5)BIO star
6) Samsung 7) Acer 8) AsRock 9) MSI 10) Foxcom
Adds on cards
Extra connectors to add in computer
1) LAN Card
2) Sound card
3) Serial Card
P a g e | 42
4) Parallel card
5) Graphics/VGA card
P a g e | 43
PROCESSOR
CPU History
Processor Architecture
1) 32 bit X86
2) 64 bit X64
P a g e | 45
1) AMD K series
2) SEMPRON
3) AMD PHENON
4) AMD ATHLON
5) Opteron
6) Turion
Data bus:
A Data bus carry information.
Connects all the internal components of a computer, such as CPU and memory, to
the motherboard.
Address bus:
Address bus to determine where it should be sent.
Used to transfer data between devices that are identified by the hardware address of
the physical memory (the physical address).
Control bus:
A Control bus to determine its operation.
Used by the CPU to communicate with devices that are contained within the
computer. This occurs through physical connections such as cables or printed
circuits.
P a g e | 46
Clock rate
The fundamental rate in cycles per second at which a computer performs its most basic
operations such as adding twonumbers or transfering a value fromone register to another.
The clock rate of a computer is normally determined by the frequency of a crystal.
For example:- A CPU with a clock rate of 1.8 GHz can perform 1,800,000,000 clock cycles
per second.
Hyper-Threading
Hyper-Threading is a technology used by some Intel microprocessor s that allows a single
microprocessor to act like two separate processors to the operating system and the
application program s that use it.
Turbo Boost
A feature in Intel's Core i7 CPUs and certain models of its i5 line. Turbo Boost enables
processor cores to run faster if power usage and temperatures are within limits.
P a g e | 47
Pipelining :
Pipelining is a process of arrangement of hardware elements of the CPU such that its overall
performance is increased.
Simultaneous execution of more than one instruction takes place in a pipelined processor.
MISC:
Minimal Instruction Set
Computer (MISC) is a processor
architecture with a very small
number of basic instruction
operations and corresponding
opcodes.
Processor Socket
CPU slot comprises one or more mechanical components providing mechanical and electrical
connections between a microprocessor and a printed circuit board (PCB).
This allows for placing and replacing the central processing unit (CPU) without soldering.
Types
1) DIP : Dual in-line package (Very old and obsolete)
2) PGA: Pin grid array (Available till pentium 4)
3) LGA: Land grid array (Modern)
P a g e | 48
Transistor count
The transistor count is the number of transistors on an integrated circuit (IC).
5 Pentium 4 42,000,000
6 Core 2 Duo 291,000,000
7 Quad-core + Core 1,750,000,000
i7
8 8-core Core i7 2,600,000,000
P a g e | 50
Monitor
A computer monitor is an output device which displays the information in pictorial
form.
Monochrome Monitor:
Color Monitor:
• Color monitors are sometimes called RGB monitors because they accept three
separate signals --red, green, and blue.
Types of Monitor:
•Less space
•Lighter
•Low power consumption
•Expensive
•Limited viewing angle
•Less space
•Lighter
•Very expensive
•Provide higher contrast and better viewing
angles than LCD monitor.
P a g e | 52
Monitor Features:
Screen Size:
•The actual amount of screen space that is available to display a picture, video or
working space.
•Desktop screens are usually 14 -25 inches by diagonal measurement.
Aspect Ratio:
•The aspect ratio of a display is the fractional relation of the width of the display area
compared to its height.
•Two common aspect ratio:
–4:3
–16:9
Display Resolution:
•The resolution of a monitor indicates how densely packed the pixels are.
•In general, the more pixels (often expressed in dots per inch), the sharper the
image.
•Most modern monitors can display 1024 by 768 pixels, the SVGA standard.
•Some high-end models can display 1280 by 1024, or even 1600 by 1200.
Color Depth:
•Color depth describes how many colors that can be displayed on a monitor's screen.
•Common color depths used by monitor:
–4-bit (EGA) = 16 colors
P a g e | 53
Brands of Monitor:
L.G
Samsung
Sony
AOC
Asus
BenQ
ViewSonic.
Keyboard
A computer keyboard is one of the primary input devices used with a computer .
Types Of Keyboard:
Keyboard interface:
a) DIN connector
b) PS/2 connector
P a g e | 55
c) USB connector
c) Wireless connector
Projection Keyboard
Some connect to Bluetooth devices, including many of the latest smartphone, tablet,
and mini-PC devices with Android, iOS or Windows platform.
P a g e | 56
Brands of keyboard:
Microsoft
L.G
Intex
i-ball
Dell
Logitech
Mouse
A computer mouse is an input device that is most often used with a personal
computer.
Moving a mouse along a flat surface can move the on-screen cursor to
different items on the screen. Items can be moved or selected by pressing the
mouse buttons (called clicking).
P a g e | 57
Types of Mouse:
Wireless Mouse:
The Mouse without wire or cord is called wireless mouse or cordless mouse.
Most wireless mice use radiofrequency (RF) technology to communicate
information to your computer.
Gstick Mouse:
Gordon Stewart designed the Stick to add a more authentic and natural feel to
artistic manipulations on both Macs and PCs.
Optical Mouse:
Trackball Mouse:
Speakers
•A hardware device connected to a computer's sound card that outputs sounds
generated by the computer.
•Speakers can be used for various sounds meant to alert the user, as well as music
and spoken text.
Headphones:
Projector
•An output device that can take the display of a computer screen and project a large
version of it onto a flat surface.
•Projectors are often used in meetings and presentations so that everyone in the
room can view the presentation.
Types of projector:
•In the early days of projectors, CRT projectors were commonly used.
•They utilized three tubes, one for each of the primary colors.
•Due to their large size, low light output and the frequent need to converge and align
the images projected from each of the three tubes, they are no longer commonly
used.
•Long service life; CRT tubes maintain good brightness to 10,000 hours.
•CRT projectors are both considerably larger and heavier than comparable LCD and
DLP projectors.
•CRT projectors require far more time to set up and adjust than LCD and DLP based
projectors.
P a g e | 60
•LCD projectors work by utilizing polarized mirrors that pass and reflect only certain
colors of light.
•This causes each channel of red, green and blue to be separated and later re-
converged via a prism after passing through an LCD panel that controls the intensity
and saturation of each color.
•An LCD projector can achieve greater brightness at a lower energy consumption
•Smaller than CRT projectors.
•An LCD projector can achieve greater brightness at a lower energy consumption
•Smaller than CRT projectors.
P a g e | 61
PRINTER
•Printer is an external hardware device responsible for taking computer data and
generating a hard copy of that data.
•Printers are one of the most used peripherals on computers and are commonly used
to print text, images, and photos.
P a g e | 62
Types of Printer:
•Impact Printer
•Non-Impact Printer
Impact Printer:
•It strikes paper and ribbon together to form a character, like a typewriter.
Advantages Disadvantages
Non-Impact Printer:
Advantages Disadvantages
Eg: Ink jet printer, Laser printer, Desk jet printer, Thermal printer etc.
Daisy-wheel:
•Similar to a ball-head typewriter, this type of printer has a plastic or metal wheel on
which the shape of each character stands out in relief.
•A hammer presses the wheel against a ribbon, which in turn makes an ink stain in
the shape of the character on the paper.
•Daisy-wheel printers produce letter-quality print but cannot print graphics.
P a g e | 63
Dot-Matrix:
Printer
Scanner
Photocopier
Fax
Ink-jet Printer:
•They are the most common type of computer printer used by consumers.
Printing Speed:
PLOTTER
•The plotteris a computer printer for printing vector graphics
•Plotters are used in applications such as computer-aided design such as diagrams,
layouts, specification sheets and banners
•The plotter is capable of producing color drawings in a matter of minutes
•Plotters differ from printers in that they draw lines using a pen
•Plotters are considerably more expensive than printers
P a g e | 66
SCANNER
A scanner is a device that captures images from photographic prints, posters,
magazine pages, and similar sources for computer editing and display.
Uses of scanner:
A flatbed scanner is the most common type of optical scanners used to scan
printed text and images and save into computer storage as a digital file.
We pickup the cover of the scanner and place the printed page on the glass
surface of the scanner.
It is widely used in offices, schools, colleges, universities and homes for
common scanning needs.
A sheet fed scanner works like a fax machine mechanism. In a sheet fed scanner,
pages are entered into scanner like a fax machine.
1. It requires separate pages to scan. But, it cannot scan a book because of its
binding.
2. It can scan normal papers with normal thickness only.
P a g e | 69
Hand Held scanner is a small, light weight scanner and portable scanner.
It is used to scan small amount of data like short articles from news papers.
It is held in hand and is moved over the text page or image slowly and
smoothly from start to end.
Its scan quality may be lower than flat bed or sheet fed scanner but it can used
to capture small amounts of text or small images, quickly.
This is a portable, cordless hand held scanner that is used to scan and save
important documents, letters, or pictures.
It records scanned documents in its memory card. you can transfer these
scanned documents on your computer for later use.
4. Drum Scanners:
Drum scanners are used by the Publishers to scan images with details.
Drum scanners use photomultiplier tube technology.
In drum scanners, the document to be scanned is mounted on a glass cylinder.
P a g e | 71
At the center of the cylinder is a sensor that splits light bounced from the
document into three beams.
Each beam is sent through a color filter into a photomultiplier tube where the
light is changed into an electrical signal.
And in this way a complete image with immense details can be obtained.
Drum scanners are widely used in publishing industry.
SMPS
The role of a power supply is convert the mains voltage into a lower DC voltage
which the components can run on.
The SMPS unit in PCs in responsible for converting the standard AC utility
power into a form that the computer can use.
It is responsible for powering every device in the computer.
P a g e | 72
Input rectifier:
The AC input from mains is first rectified in the SMPS using a rectifier to convert it
into DC.
The rectifier consisting of a full wave diode bridge or module that produces an
unregulated DC voltage to the Smoothing capacitor.
The input AC passing into the rectifier has AC voltage pulses that may reduce the
power factor.
So control techniques are used to force the average input current to follow the sine
wave.
Inverter:
This stage converts the rectified DC into AC using a power oscillator. The power
oscillator has a small output transformer with a few windings at the frequency
20-100 kHz. Switching is controlled by MOSFET amplifier. The output AC voltage
is usually isolated optically from the input AC by using an Optocoupler IC for
safety reasons.
Off line UPS passes the AC Mains Supply directly to the output load if the AC
Mains Supply is present.Only in the case of power failure, it switches to
inverter within few miliseconds to give power to load until mains supply
returns.
P a g e | 75
ON Line UPS:-
On the other hand On Line UPS always charges battery from incoming AC
mains supply and supplies power to load via the inverter.Even if the mains
supply fails, there is no interruption to the output load at all.
Generally On Line UPS unlike off line UPS are expensive and inefficient as
Inverter is continuously in operation. However it provides greater quality of
power as compared to offline UPS.
Solution:
a) Check Power board first ( power source).
b) Check the Power Cable ( loose or no connection or replace cable and check
)
c) Open cabinet---- de assemble all the connector of SMPS ---clean all slots
and assemble again.
P a g e | 77
c) Open cabinet –open RAM ---clean it ---clean the slot--- insert RAM again
and check
c) Check processor fan heat sink contact with processor---thermal paste may be
dry.
P a g e | 83
c) Check available free space in Operating System Drive (at least 20% free).
Problem 5: System start with an error Message “Please select proper boot
Media”?
Solution:
a) Restart the PC-- Press Ctrl+Alt+Delete and go to “ BIOS” Setup and check
boot device --hard disk is Connected or not.
b) Open the Cabinet and check hard disk “SATA” connector and power
connector is properly connector or not.
Solution:
a) Check printer is properly on or not (green LED must blink)
d) Check printer cartridge properly on or not (and also check page setup).
d) In display board of printer, check error message.
P a g e | 92
b) Restart the PC –press F8 at the initial of booting – select safe mode ---
Log on with admin user -- and restore the PC to earlier time.
In Windows 7:
a) At the initial of booting Press F8 next > Safe Mode > Log on with admin user >
Start >System Restore > Restore My Computer to earlier Time > Next > Choose
back date > Next > Next ………………….> System Restore > Ok.
or boot system with Windows 7 bootable media -----next --repair your
computer –
P a g e | 94
P a g e | 95
P a g e | 96
Solution:
Solution:
a) Boot Into Safe Mode:
Operating System
An operating system (OS) is system software that manages computer hardware and software
resources and provides common services for computer programs. All computer programs,
excluding firmware, require an operating system to function.
WINDOWS
CLIENT O.S SERVER O.S LINUX O.S
MS-DOS (1980s) Windows NT Server Redhat Linux
Windows 1.0 Windows Server 2000 Fedora
Windows 3.0 Windows Server 2003 Centos
Windows 95 Windows Server 2008 Ubuntu
Windows 98 Windows Server 2012 Mandriva
Windows ME Windows Server 2016 Kalilinux
Windows NT Slackware Linux
Windows 2000 Free linux
Windows XP (2000)
Windows Vista
Windows 7
Windows 8/8.1
Windows 10 (25thjuly 15)
Before starting the installation we should make sure that the computer meets all the
Hardware requirements for installing Windows .
boot on. Consult a manual or the internet for help if you're stuck.
9) Decide on which hard drive and partition you want to install Windows on.
A hard drive is a physical part
of your computer that stores
data, and partitions "divide"
hard drives into separate parts.
If the hard drive has data on it,
delete the data off of it,
or format it.
Select the hard drive from the
list of hard drives.
Click Drive options
(advanced).
Click Format from Drive
options.
If your computer doesn't have
any partitions yet, create one to
install Windows on it.
Select the hard drive from the
list of hard drives.
Click Drive options (advanced).
Select New from Drive options.
Select the size, and click OK.
P a g e | 103
Installation will finish with creating user name, computer name, selecting time zone etc.
After Installation necessary work:
1) Start – Control Panel- Windows update- check or uncheck windows update depend on your
licence.
2) Install motherboard driver. ( VGA or graphics, Audio or sound, LAN, WLAN, Bluetooth etc.)
3) Customize desktop icon.
4) Install Basic Software :
a) MS office
b) Adobe Reader
c) Google chrome
d) VLC media player
e) Winrar
f) Any good antivirus.
22TDK-F8XX6-YG69F-9M66D-PMJBM
5. If the key is genuine, you will be asked to accept the license agreement. Click on I accept button
and then Upgrade button to continue. If you have any running applications you will be asked to
save your work and close all running programs.
6. Wait for a while and let the Windows complete the upgrade process. You are done! You have
just upgraded Windows 7 Home Premium edition to Professional.
P a g e | 106
OS Upgradation
Changing OS version without deleting data and system setting as well as without uninstalling
application software.
Online upgradation
Step 1 Preparation:
Please run Windows Update first before install the upgrade. (This step will require a connection
to the Internet)
1
1.1 . Press Start → All
Programs.
1 When the program list
shows,1find ―Windows
Update‖
. and click to execute.
1
P a g e | 108
1Some of the updates will require you to restart the computer. Please follow the instruction and re-
.start your computer. Repeat step 1.1-1.4 to obtain all essential updates until no new important
4updates are available.
1
.
P a g e | 109
5
Installing Windows 8 or Windows 10 .
Ans: Same process as Windows 7 but you have to give online email ID to create a user.
If you want to create a local user then disconnect internet connection while installing Windows 8
or 10.
File System
File system is the way to organizing and keeping track of data that is stored in hard disk.
P a g e | 110
2) FAT32
Introduce with Windows 95
Also have week file & folder security
Support maximum 32 GB hard disk partition
File Encryption
Same as file security but it takes text file only.
Process:-
File Quota
It is used to give the limited access of drive space to the different users.
Process:-
Right click on drive Properties Quota Quota entries Quota New Quota entry
Advance Find now Select users Ok Ok Select limit disc space to (eg. 100 Gb)
Set warning level to (eg. 80 Gb ) Ok
Also select all options of Quota Apply Ok
P a g e | 112
Disc Compression
It is used to compress the data storage capacity of Drive.
Process:-
Right click on Drive Properties Select compress this drive to save disk space Select allow
files on this device to have contents indexed in addition to file properties.
Batch File
Command written in Batch file will be executed if you double click on it.
Ans:-
Open Notepad type command Go to file Save as mybatchfile.bat ( File name ) Save as
type ( all type )
Ans:-
Ans:-
Ans:-
Del d:\song\*.mp3
Start d:\movie\tubelight.avi
or
Ans:-
Ans:-
Command @ echo
: top
mkdir %random%
goto top
VIRUS
Vital Information Resources Under Seize
What is VIRUS ?
Computer viruses are small software programs that are designed to spread from one
computer to another and to interfere with computer operation.
A computer virus is a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.
Viruses spread by reproducing and inserting themselves into programs, documents, or e-mail
attachments.
In the process a virus has the potential to cause unexpected or damaging effects, such as harming
the system software by corrupting or destroying data.
1971 The Creeper A message displayed that ―I’m the creeper, catch me if you can!‖.
1974 Wabbit (Rabbit) Make multiple copies of itself on a computer clogging the system
reducing the performance of the computer.
1981 Elk Cloner Created to infect Apple DOS 3.3 . spread through files and folders
that are transferred to other computers by floppy disk.
1984 Brain Affecting boot sector area of operating System. Developed by two
Pakistani brothers named ―Farooq Alvi brothers‖.
1990 Symantec launched one of the first antivirus programs called the
Norton Antivirus, to fight against the infectious viruses.
1) Computer slows down without any reason. 8) Unable to install new antivirus
4) Changed Hard Drive name or Volume name. 11) Unknown programs or files are being
created.
5) Slower Internet and Processing 12) Social networking Profiles, or Your Email
account automatically send messages With
the virus to your contacts.
.
6) Hardware and Accessory Problems 13) Automatic files deleting
5) Don't open unknown attachments in emails or do a virus scan after opening them.
P a g e | 120
1) Download free antivirus from Internet : This will give normal security .
2) Buy registered antivirus from computer shop or through online : This will give
very high security.
1 PC 1 year or
1 PC 3 year or
Multiple PC 1 year or 3 year
P a g e | 121
Group Policy
Group Policy allows administrators to define options for what users can do on a
network – including what files, folders and applications they can access.
The collections of user and computer settings are referred to as Group Policy Objects .
We can apply GP for users and computers only
Exercise
1) Block “Task manager” option for all users of Account department OU.
Start -Run - gpedit.msc -ok
User configuration Policies Administrative Templates system Ctrl
+Alt + Del options --Double click “Remove Task manager” Select
“enable” Apply ok.
Start Run gpupdate OK
User configuration Admin templates Start menu & Task bar select “Remove all
programs list from the start menu select “Enable” Apply Ok
d:\wallpaper\poster.jpg
Networking
P a g e | 124
Networking Introduction
Definition: Networking is the interconnection of two or more devices that makes inter
communication among them to share the resource.
Advantages
Disadvantages
Classification of Network
On the basis of distance
COMPUTERS
1) Laptops 2)Desktops 3)Palmtops
WINDOWS
CLIENT O.S SERVER O.S LINUX O.S
DOS (1980s) Windows NT Server Redhat Linux
Windows 1.0 Windows Server 2000 Fedora
Windows 3.0 Windows Server 2003 Centos
Windows 95 Windows Server 2008 Ubuntu
Windows 98 Windows Server 2012 Mandriva
Windows ME Windows Server 2016 Kali linux
Windows NT Debian
Windows 2000 Arch Linux
Windows XP (2000) Free Linux
Windows Vista Scientific Linux
Windows 7 Mint Linux
Windows 8/8.1
Windows 10
P a g e | 129
Client computers:
Server computers:
Server Type
Transmission Media
UTP STP
(Unshielded Twisted Pair) (Sheilded Twisted Pair)
Less cost Costly
Normally used everywhere Used in sensitive places only
Having 8 wires of different colours same
Only one outer shield Outer shield as well as separate shield in
each pair
To protect from electromagnetic
disturbance in common wiring STP will be
used.
P a g e | 131
Coaxial Cable
Coaxial cable is an electrical cable consisting of a round conducting wire, surrounded by an
insulating spacer, surrounded by a cylindrical conducting sheath, and usually surrounded
by a final insulating layer.
Most common use of coaxial cable today is in standard cable TV. A copper conductor lies in
the center of the cable, which is surrounded by insulation. A braided or mesh outer covering
surrounds the insulation. This is also a conductor.
1) ThickNet, or RG-6:
It is older and one of the first types of coaxial cable used in networks. Its thick shielding, very
rigid and difficult to work with.
2) ThinNet or RG-59:
It is far more flexible than ThickNet and much easier to work with.
P a g e | 133
Advantages :
Disadvantages:
A technology that uses glass (or plastic) threads (fibers) to transmit data.
Fiber optic cables provide higher bandwidth and can transmit data over longer distances.
Fiber optic cables support much of the world's internet, cable television and telephone
systems.
Fiber cables rated at 10 Gbps, 40 Gbps and even 100 Gbps are standard.
Fiber optic cables carry communication signals using pulses of light generated by small
lasers or light-emitting diodes (LEDs).
Speed of light 3 x 10^8 m/s , 30000 km/s.
P a g e | 134
In sender side Electrical signal is converted in light signal by the help of transducer and at
receiver side light signal is again converted into electrical signal by using transducer.
2.) Multimode:
Multi-mode optical fiber is a type of optical fiber mostly used for communication over
short distances, such as within a building or on a campus. Typical multi-mode links have
data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters (2000 feet).
P a g e | 135
Wireless Media
Microwaves:
Microwave link. A microwave link is a communications system that uses a beam of radio waves in
the microwave frequency range to transmit video, audio, or data between two locations, which can
be from just a few feet or meters to several miles or kilometers apart.
Radio wave:
Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic
spectrum longer than infrared light. Radio waves have frequencies as high as 300 GHz to as low as
3 kHz.
A wireless network uses radio waves, just like cell phones, televisions and radios.
Infrared wave:
Method of transferring data without the use of wires. A common example of an
infrared (Ir) device is a TV remote. However, infrared is also used with computers and devices like
a cordless keyboard or mouse, wifi
routers.
Bluetooth:
Bluetooth is a wireless technology standard for exchanging data over short distances (using short-
wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile
devices, and building personal area networks(PANs).
Bluetooth refers to a wireless technology which allows digital devices to easily transfer files at high
speed. Bluetooth is common in many portable devices such as laptops, PDAs, mobile phones,
smartphones and tablets.
P a g e | 139
Networking devices
1. Repeater: This is used to convert weak signals into strong signals.
HUB SWITCH
1. It is layer 1 device of OSI mode. 1. It is layer 2 device of OSI mode. Some
switch are layer 3 devices.
Transmission Modes:
1) Simplex:- In this mode, the communication between sender and receiver occur only in one
direction.
That means only the sender can transmit the data to receiver but receive can’t.
2) Half- Duplex:- In this mode, the communication between sender and receiver occurs in both
the directions but, one at a time.
The sender and receiver both can transmit and receive the information but, only one is allowed
to transmit at a time.
3) Full-Duplex:- In this mode, the communication between sender and receiver can occur
simultaneously.
Sender and receiver both can transmit and receive simultaneously at the same time.
4. Bridge:
P a g e | 141
5. Router:
It is used to connect from two different networks.
6. Brouter:
P a g e | 142
7. Gateway:
Networking Topology
It is the physical arrangement of networking devices to make a network.
Types of Topology:-
1) Bus 2) Star 3)Ring 4)Mesh 5)Tree 6)Wireless
BUS TOPOLOGY:
Star Topology:
Twisted pair cable is used.
Ring Topology
Here we require separate NIC card which supports Ring Topology.
P a g e | 145
1) This type of network topology is very organized. Each node gets to send the data when it receives
an empty token. This helps to reduces chances of collision.
2) Even when the load on the network increases, its performance is better than that of Bus
topology.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
Mesh Topology
A network setup where each computer
and network device is interconnected
with one another, allowing for most
transmissions to be distributed, even if
one of the connections go down.
Partial mesh topology: Some nodes are connected to all the others, but others are only
connected to those nodes with which they exchange the most data.
Tree Topology
It is the combination of multiple topologies.
Scalable as leaf nodes can accommodate more nodes in the hierarchical chain.
A point to point wiring to the central hub as each intermediate node of a tree topology
represents a node in the bus topology
Other hierarchical networks are not affected if one of them gets damaged.
Easier maintenance and fault finding.
Wireless Topology
It shows how the computers connect and interact each other when there is no physical
connection, no cables connecting the computers.
The computers communicate each other directly, using the wireless devices.
Ad hoc network
The network is ad hoc because it does not rely on a pre-existing infrastructure, such
as routers in wired networks or access points in managed (infrastructure) wireless
networks.
Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes are
free to move.
P a g e | 148
Media Connector
ST (Straight Tip) :
A fiber-optic cable connector that uses a push-pull latching mechanism similar to common
audio and video cables.
For bi-directional transmission, two fiber cables and two SC connectors (Dual SC) are used.
SC connector ST connector
BNC Connector:
The BNC (Bayonet Neill–Concelman) connector is a quick connect/disconnect radio
frequency connector used for coaxial cable.
BNC connector commonly used plug and socket for audio, video and networking
applications that provides a tight connection.
A 15 pin connector found on Ethernet cards that can be used for attaching coaxial, fiber
optic, or twisted pair cable.
Straight cable is used to connect different type of devices. This type of cable will be used most of
the time and can be used to:
If you need to check how straight cable looks like, it's easy. Both side (side A and side B) of
cable have wire arrangement with same color.
P a g e | 151
2) Crossover Cable:
If you need to check how crossover cable looks like, both side (side A and side B) of cable
have wire arrangement with following different color .
P a g e | 152
In case you need to make a crossover cable yourself! You can use crimper to do it.
Note: If there is auto MDI/MDI-X feature support on the switch, hub, network card or other
network devices, you don't have to use crossover cable in the situation. This is because crossover
function would be enabled automatically when it's needed.
3) Rollover Cable:
A rollover cable is a network cable that connects a computer terminal to a network router’s
console port to make programming changes to the device.
It is also referred to as a Cisco console cable and is normally flat and light blue so as to
distinguish it from other network cable types.
Rollover cables are also known as Yost cables or Yost Serial Device Wiring Standard
connectors.
Pin 1 of connector A would be connected to Pin 8 of connector B.
Pin 2 of connector A would be connected to Pin 7 of connector B and so on.
P a g e | 153
OSI Layer
Open System Interconnect (OSI) developed by ISO in 1970.
Defines a networking framework to implement protocols in seven layers.
Communication over network is understandable through this OSI model.
OSI having 7 layers and each layers has its own responsibilities.
Hardware and software work together.
Troubleshooting is easier by separate networks.
OSI Layer
Protocol:-
A protocol protocol is a set of rules in which computers communicate with each other.
The protocol says what part of the conversation comes at which time.
It also says how to end the communication.
Framing : Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver.
The layer provides an interface for the user interact with the application such as Email, HTTP,
FTP, Remote file access.
Networking Protocol
A protocol is set of rules that must be followed while communicating two networking
devices.
A protocol is the special set of rules that end points in a telecommunication connection use
when they communicate.
Protocols specify interactions between the communicating entities.
Organizations use FTP to allow employees to share files across different locations and
branch offices.
Employees use FTP to securely share files with coworkers and external business partners.
P a g e | 158
TFTP is implemented using UDP, it generally works only on local area networks (LANs).
The POP3 protocol is simple and does not offer many features except for download.
Its design assumes that the email client downloads all available email from the server, deletes
them from the server and then disconnects.
We can use only one computer to check your email (no other devices).
The IMAP protocol is designed to let users keep their email on the server.
IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are
stored on the server
P a g e | 160
Dynamic Host
Telnet:Terminal Network
It is used to access remote device through
command mode.
SSH:Secured Shell
Same as Telnet but it is a Secured Communication.
Transport layer
INTERNET PROTOCOL
IP: Internet protocol
It is the method or protocol by which data is sent from one computer to another on the
internet.
Each Computer (known as host) on the internet has at least one IP address that uniquely
identifies it from all other Computers on the internet.
FRAME DELAY
Frame relay is a data link layer, digital packet switching network protocol technology
designed to connect Local Area Networks (LANs) and transfer data across Wide Area Networks
(WANs).
It also supports variable-length packet sizes for more efficient utilization of network
bandwidth.
Frame Relay operates over fiber optic or ISDN lines and can support different higher level
network protocols including Internet Protocol (IP).
2.Switched Virtual Circuits(SVC): For temporary connections that last only for the duration of a
single session.
P a g e | 165
IP ADDRESSING
It is a unique address used to identify a device (like computer, smart phone, router, IP based
phone, network printer etc) in network.
IP Address
IP v4 IP v6
IPv1, 2, & 3 would actually be part of the TCP/IP protocols, of which there were 3 versions.
P a g e | 166
IPv5 is an experimental TCP/IP protocol called the Internet Stream Protocol that never
really went anywhere because increases in bandwith made streaming over IPv4 feasible. So
IPv5 was never finalized and they skipped to IPv6.
IP V4
Example:-
192 . 168 . 1. 1
11 00 00 00 .10 10 10 00 .00 00 00 01 . 00 00 00 01
8 8 8 8
32 bits
Network ID Host ID
8 bits = 28= 256
Therefore the value we can write in each octet is from 0 – 255 only.
IP v4
Classful Classless
Range of IPv4
A 1.0.0.0 126.255.255.255
B 128.0.0.0 191.255.255.255
C 192.0.0.0 223.255.255.255
D 224.0.0.0 239.255.255.255
E 240.0.0.0 255.255.255.255
Note : 127.0.0.1 is reserved for local host and called loopback address.
Range: 127.0.0.1 – 127.255.255.254
To Remember
Class Range
A 1 - 126
B 128 – 191
C 192 – 223
D 224 – 239
E 240 – 255
Subnet Mask
Subnet Mask
Subnet Mask
Types of IP Address:
Unicast Address
Multicast Address
Broadcast Address
Loop-back Address:
It is a special class A IP address (127.0.0.1-127 255.255.255.0),reserved for
loopback or diagnostic functions.
Link-Local Address:
DHCP is automatically assign the IP Address to a computer.
Calculation of IP Address:
Formula:-
Reserved bits :
1) Class - A :
n = 8, h = 24 , r = 1
No. of network = 2n-r = 28-1 = 27 = 128
No. of host network = 2h-2 = 224-2 = 16,777,214
2) Class – B :
n = 16, h = 16 , r = 2
No. of network = 2n-r = 216-2 = 214 = 16384
No. of host network = 2h-2 = 216-2 = 65,536-2 = 65,534
3) Class – C :
n = 24, h = 8 , r = 3
No. of network = 2n-r = 224-3 = 221 = 2,097,152
No. of host network = 2h-2 = 28-2 = 256-2 = 254
Ans:
192.168.1.0 Network ID
192.168.1.1
192.168.1.2
. Valid host = 254
.
192.168.1.254
192.168.1.255 Broadcast ID
P a g e | 170
192.168.2.0 Network ID
192.168.2.1
192.168.2.2
. Valid host = 254
.
192.168.2.254
192.168.2.255 Broadcast ID
192.168.3.0 Network ID
192.168.3.1
192.168.3.2
. Valid host = 92
.
192.168.3.92
192.168.2.255 Broadcast ID
Public IP Private IP
Assinged by ISP Assigned by user from a given range
Private IP Range:
0.5 billions used by Private IP, Lookback address and APIPA address.
SUBNETTING
Subnetting enables the network administrator to further divide the host part of the
address into two or more subnets.
Subnet mask is a mask used to determine what subnet an IP address belongs to.
The subnetting process allows the administrator to divide a single Class A, Class B,
or Class C network number into smaller portions. The subnets can be subnetted again
into sub-subnets.
Subnetting advantages
Reduces the network traffic by reducing the volume of broadcasts
Saving unused IP addresses
Enables users to access shared data within their network.
Security can be maintained
Easy to troubleshoot network problems.
P a g e | 172
Classless Inter-Domain Routing (CIDR) merges or combine network addresses of same class into
one single address to reduce the size of the routing table.
It is done on core router to reduce the size of routing table.
It is implemented by ISP (internet service providers).
FLSM : Example-- 1
Req = 40 hosts using C-class address network 192.168.1.0/24
1. 2h - 2 >= req
26 – 2 >= 40
64 – 2 >= 40
62 >= 40
Host bits required (h) = 6
2.Converted network Bits (n) = Total. H. Bits -- req. H. Bits
= 8 --- 6 = 2 (n)
4.Total . Network Bits =total network bits + converted bits = 24 + 2 = /26
subnet mask = (/26)= 255.255.255.192
5.Blocksize = 2h = 26 = 64
6.Subnets = 2n = 22 = 4 Subnets
7.Range :
Network ID --- Broadcast ID
192.168.1.0/26 ----- 192.168.1.63/26
192.168.1.64/26 ----- 192.168.1.127/26
192.168.1.128/26 ----- 192.168.1.191/26
192.168.1.192/26 ----- 192.168.1.255/26
FLSM : Example-- 2
1.Req = 500 hosts using B-class address network 172.16.0.0/16
2h - 2 >= req
29 – 2 >= 500
512 – 2 >= 500
510 >= 500
2.Host bits required (h)= 9
3. Converted network Bits (n) = Total. H. Bits -- req. H. Bits
= 16 --- 9 = 7 (n)
3. Total . Network Bits = total network bits + converted bits = 16 + 7 = /23
subnet mask = (/23)= 255.255.254.0
6. Blocksize = = 2h = 29 = 512
7.Subnets = 2n = 27 = 128 Subnets
Range
Network ID --- Broadcast ID
172.16.0.0/23 ---- 172.16.1.255/23
172.16.2.0/23 ---- 172.16.3.255/23
P a g e | 174
WIRELESS NETWORK
Wireless network allows to a communication between 2 or many computers without
using physical wire.
What is IEEE ?
IEEE 802 : IEEE 802 is a family of IEEE standards dealing with local area networks and
metropolitan area networks.
Full Form
NMT - Nordic Mobile Telephone
3) WPA2
The current standard is WPA 2, some hardware cannot support WPA2 without
firmware upgrade or replacement.
WPA 2 uses an encryption device that encrypts the network with a 256-bit key, the
longer key length improves security over WEP.
1) WPA2-TKIP
TKIP is actually an older encryption protocol introduced with WPA to replace the very-
insecure WEP encryption at the time.
TKIP is actually quite similar to WEP encryption.
TKIP is no longer considered secure, and is now deprecated.
2) WPA2-AES
AES is a more secure encryption protocol introduced with WPA2.
AES isn’t some creaky standard developed specifically for Wi-Fi networks, either.
It’s a serious worldwide encryption standard that’s even been adopted by the US
government
IP = 192.168.1.1
B) Wireless Security
SSID = RTS
Mode: 802.11n
Encryption = AES
C) LAN setting
IP = 192.168.1.1
SM= 255.255.255.0
E) Parental Control
Firewall
A firewall is a network security system designed to prevent unauthorized access to or from a
private network.
1) Inbound Rule
2) Outbound Rule
Inbound rules: These are to do with other things accessing your computer. If you are
running a Web Server or RD server on your computer then you will have to tell the Firewall
that outsiders are allowed to connect to it.
Outbound rules: These are so that you can let some programs use the Internet, and Block
others. You will want to let your Web Browser (Internet Explorer, Firefox, Safari, Chrome,
Opera...) have access to the Internet, so you will tell Windows Firewall that it's allowed.
1) Zone Alarm
2) Comodo free firewall 3) Peer Block 4)Tiny wall
P a g e | 182
1) Install this Software Normally and add users one by one and configure it.
P a g e | 183
Select permit category and Auth Type then click on new to add new user
TCP/IP UTILITY
1) Ping:
2) Tracert:
Tracert is very similar to Ping, except that Tracert identifies pathways taken along each hop,
rather than the time it takes for each packet to return (ping).
If we have trouble connecting to a remote host we will use Tracert to see where that
connection fails.
P a g e | 185
3) ARP:
The ARP utility helps diagnose problems associated with the Address Resolution Protocol
(ARP).
TCP/IP hosts use ARP to determine the physical (MAC) address that corresponds with a
specific IP address. Type arp with the – a option to display IP addresses that have been
resolved to MAC addresses recently.
Open cmd mode arp -a
4) Netstat:
Netstat (Network Statistics) displays network connections (both incoming and outgoing),
routing tables, and a number of network interface statistics.
It is a helpful tool in finding problems and determining the amount of traffic on the network as
a performance measurement.
Open cmd mode netstat ( it shows connection ) or netstat –s ( it shows traffic )
5) Nbtstat:
Nbtstat (NetBios over TCP/IP) enables you to check information about NetBios names.
It helps us view the NetBios name cache (nbtstat -c) which shows the NetBios names and the
corresponding IP address that has been resolved (nbtstat -r) by a particular host as well as the
names that have been registered by the local system (nbtstat –n).
Open cmd mode nbstat
6) NSLookup:
NSLookup provides a command-line utility for diagnosing DNS problems. In its most basic
usage, NSLookup returns the IP address with the matching host name.
Open cmd mode nslookup
P a g e | 186
7) IPConfig:
Not part of the TCP/IP utilities but it is useful to show current TCP/IP settings.
The IPConfig command line utility will show detailed information about the network you are
connected to. It also helps with reconfiguration of your IP address through release and renew.
Open cmd mode ipconfig or ipconfig /all
CRYPTOGRAPHY
Cryptography is a method of storing and transmitting data in a particular form so that only those
for whom it is intended can read and process it.
1. Privacy/confidentiality: Ensuring that no one can read the message except the intended
receiver.
2. Authentication: The process of proving one's identity.
3. Integrity: Assuring the receiver that the received message has not been altered in any way
from the original.
4. Non-repudiation: A mechanism to prove that the sender really sent this message.
5. Key exchange: The method by which crypto keys are shared between sender and receiver.
Plain Text:
Ciphertext:
1) Secret Key Cryptography (SKC): Uses a single key for both encryption and
decryption; also called symmetric encryption. Primarily used for privacy and
confidentiality.
2) Public Key Cryptography (PKC): Uses one key for encryption and another for
decryption; also called asymmetric encryption. Primarily used for authentication, non-
repudiation, and key exchange.
PC 1 PC 2
1. Open network setting 1. Open network setting
Local area connection Local area connection
tcp/Ipv4 tcp/Ipv4
IP= 192.168.2.1 IP= 192.168.2.2
S.M= 255.255.255.0 S.M= 255.255.255.0
2. Remote Desktop:-
PC1 PC2
Right click on my computer Start - Remote Desktop connection:
Properties Remote setting Type PC1 IP --connect --then type
Allow connection from computer user and password of PC1
running any version of remote
desktop Apply Ok.
User must have password on PC.
Windows firewall must be off.
3. Folder Sharing:-
PC1 PC2
Right click on folder Properties Start Run
Sharing Advance sharing Select \\192.168.2.1(IPaddress of PC1).
share this folder Permissions
Select full control Apply Ok
Apply Ok.
Security Edit Add Advanced We can get the share folder of PC1.
Find now Select Everyone
Ok Ok Apply Ok Close.
Open to advance Network Sharing
Turn all options only turn off
password protected option.
4. Drive Mapping:-
5. Remote Assistance:-
PC1 PC2
Start Type Remote Windows Open the share folder Double
remote assistance Invite someone click on invitation file Enter the
your trust to help you Save this password.
invitation as a file in a folder
share the folder.
Note down the password. Click on request control.
Right click on computer
Properties Remote setting
allow remote assistance
Advance Set time duration Ok.
Any user can download the shared data by using web browser.
Process:-
1) Install IIS
2) After Installing IIS . It create a default path in ―c:/‖ drive.
(c:/inetpub/wwwroot), keep your html web page here.
3) Open IIS manager Right click on sites Add website site name (Test 1)
Physical path (C:\inetpub\wwwroot) IP address (192.168.5.1 or server
IP address) Ok.
4) Now in client PC open any web browser and write http://192.168.5.1 (server
IP).
Windows 7 Internet Connection Sharing (ICS) feature on computer (host computer) in order to
share Internet connection with other computers.
The benefit of this approach is no router is required to share Internet, but the drawback is this host
computer needs to be on for other computers to access Internet.
1) Open Network and Sharing Center will appear, click on Change adapter settings.
2) Right click on the network adapter that has Internet connection and click Properties.
P a g e | 192
3) Click on Sharing tab and then tick on Allow other network users to connect through this
computer’s internet connection.
4) You will see there is a Shared wording on that network adapter after the sharing.
automatically. Then those computers will be assigned IP address in the 192.168.137.x range and able
to access Internet through this ICS host computer. Good luck!
ACTIVE DIRECTORY
1) Active directory is the directory Service provided by Microsoft.
2) It is the centralize data base used to manage and control the users and computers of whole
organization.
3) It is the collection of objects ( users, computers, group, OU, printers, contact etc)
4) It authenticates users to log on in network PC.
Elements of AD
Logical Elements Physical Elements
Domain Domain Controller
Users Sites
Organizational Unit
Forest
Q: What is AD Partitions ?
Ans: Directory partition is where the AD information is segregated and logically stored.
Schema information Configuration information
Domain information Application Partition.
a. Domain: It a logical group of network objects (computers, users, devices) that share the
same Active Directory database.
Functional levels determine the available Active Directory Domain Services (AD DS) domain or
forest capabilities.
They also determine which Windows Server operating systems you can run on domain controllers in
the domain or forest.
The functional level of a domain or forest controls which advanced features are available in the
domain or forest.
If W.S. 2003 is selected as domain or forest functional level then all higher version of server 2003
will be supported.
Installation Process
Start Rundcpromo
ok nextSelect ― Create a
new domain in new forest -
………………………………………
………………Finish
How to uninstall AD ?
Ans: Start
P a g e | 195
Ans: 1) Check proper connectivity with server and having same DNS address as server.
2) Right Click on Computer – Properties – Change setting – change – select domain and type
domain name – ok – Type Server user name ( administrator) and password – ok – ok --------
Restart the PC
P a g e | 196
A) Creating User
B) Modifying User
properties
Ans: Right click user(e.g. prabhas) proprerties account logon hour set time
hourok
P a g e | 197
Local profile
Roaming profile
Mandatory profile
1) Local profile:
2) Roaming profile:
3) Mandatory Profile:
Mandatory user logon in client PC and can do any changes with the local PC data and
settings , when he Logoff , all changes will be restored(previous state).
Now log on in client PC – Do any changes with settings and data and log off
P a g e | 198
GROUPS
TYPE SCOPE
Security (Full access of network resource) Domain
Distribution(Limited access) Global
Universal
How to create Group ?
Ans: - Open active directory user and computers Expand domain nameRight click on
created usersNewGroupgive group name(e.g. ―Technical‖) OK.
Builtin Group:-
These groups are already created with active directory, each group have its own power.
a) Administrator
b) Domain Admin
c) Enterprise Admin
Domain User:
Limited access. All A.D users are by default member of this group.
The users of this group can take remote desktop connection of server.
How to give full power to any A.D user (to make admin user) ?
Now with this user logon to any client PC and do some system setting changes.
In the same way we can add our created group to built-in group to give special permissions.
OU creation way
How to Create O.U ?
Li-Fi
Advantages of LiFi
Disadvantages of LiFi
1) Internet can be used only where light of source device is available. Moreover light can not penetrate from
walls and it works only in line of sight path. This limits access of internet whereever one requires. Moreover
its range is limited.
2) It cannot be used in outdoor environment like RF signal. This is because of interference caused by
sunlight and other optical sources present nearby. Moreover it can be intercepted by the unwanted people if
used outdoors.
3) Though the installation is simple, Lifi system requires whole new infrastructure. This will add cost to the
companies/people wanting to take LiFi Internet service.
4) Though it draws low power, in order to avail lifi internet services, lights need to be kept ON throughout
day and night. As internet is need of the hour, this will waste energy more than any other internet system.
5) One cannot watch games and videos on internet in the dark during night before sleeping on the bed.
P a g e | 204
Port Number
Network ports are provided by the TCP or UDP protocols at the Transport layer.
They are used by protocols in the upper layers of the OSI model.
Port numbers are used to determine what protocol incoming traffic should be directed to.
Port use is regulated by the Internet Corporation for Assigning Names and Numbers (ICANN).
By ICANN there are three categories for ports:
From 0 to 1023 – well known ports assigned to common protocols and services
From 1024 to 49151 – registered ports assigned by ICANN to a specific service
From 49152 to 65 535 – dynamic (private, high) ports range from 49,152 to 65,535. Can
be used by any service on an ad hoc basis. Ports are assigned when a session is
established, and released when the session ends.
23 Telnet TCP
50, 51 IPSec
135-
NetBIOS TCP and UDP
139
443 HTTP with Secure Sockets Layer (SSL) TCP and UDP
IPv4 vs IPv6
IPv6 addresses use eight sets of four hexadecimal addresses (16 bits in each set),
separated by a colon (:),like this: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx (x would
be a hexadecimal value). This notation is commonly called string notation.
Hexadecimal values can be displayed in either lower- or upper-case for the numbers A–F.
If you have successive fields of zeroes in an IPv6 address, you can represent them as two
colons (::). For example, 0:0:0:0:0:0:0:5could be represented as ::5;
and ABC:567:0:0:8888:9999:1111:0 could be represented
as ABC:567::8888:9999:1111:0
Dual Stack Transition Mechanism (DSTM) : Used to make communication between IPv4
to IPv6
Q: How can you view all of the ipv4 and ipv6 addresses of your workstation from cmd ?
OSI QUESTIONS
7. What is the function of the Application Layer as described by the OSI reference model?
A. Provides network services to user applications B. Provides desktop connectivity to the LAN
9. What are some of the common standards that are implemented at the Application Layer?
10. What is the function of the Presentation Layer, as described by the OSI reference model?
P a g e | 208
11. The upper layers of the OSI model are, in correct order -
12. True or False: The network layer uses physical addresses to route data to destination hosts.
A. True B. False
15. Layer that are used to deal with mechanical and electrical specifications are
17.TCP/IP model does not have ______ layer but OSI model have this layer.
a) Session layer b) presentation layer
c) Application layer d) both (a) and (b)
18. Which layer links the network support layers and user support layers
23. On _______ layer every device has a logical address know as IP address.
24. _______ defines the protocol to set up and terminate a connection between two directly
connected nodes over a link/medium.
25. OSI model was introduced by ISO (International Organization for Standardization) in
28.______ layer establishes, manages and terminates the connections between the local and
remote application.
30. The layer deals with electrical and specifications of the data connection is
TCP/IP QUESTIONS
2. Which of the following components of the TCP/IP protocol stack are end to end layers (also
know as host to host layers) ?
3. Which of the following does not describe the IP packet delivery layer?
4. Which of the following fields in the header of an IP packet will be decremented by one at each
router?
5. Which of the following fields in the IP header identifies the type of data (payload) that the IP
packet is carrying?
8. Which of the following default masks for the major class numbers is incorrect?
C. Resolves the TYPE field to the MAC address D. Resolves the MAC address to the TYPE field
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
12.What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
13.You want to implement a mechanism that automates the IP configuration, including IP address,
subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish
this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
14. Which of the following is private IP address?
A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
15.Which of the following allows a router to respond to an ARP request that is intended for a
remote host?
A. Gateway DP
B. Reverse ARP (RARP)
P a g e | 213
C. Proxy ARP
D. Inverse ARP (IARP)
15.The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is
equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
16.Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A
B. Class B
C. Class C
D. Class D
17.If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
A. Application
B. Presentation
C. Session
D. Transport
18.Which of the following is the decimal and hexadecimal equivalents of the binary number
10011101?
A. 155, 0x9B
B. 157, 0x9D
C. 159, 0x9F
D. 185, 0xB9
19.Which statements are true regarding ICMP packets?
1. 1.They acknowledge receipt of a TCP segment.
2. 2.They guarantee datagram delivery.
3. 3.They can provide hosts with information about network problems.
4. 4.They are encapsulated within IP datagrams.
A. 1 only
B. 2 and 3
C. 3 and 4
D. 2, 3 and 4
P a g e | 214
Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP
works at layer3. Telnet uses TCP at layer 4