2. Network Administration:
Network administration is about how to handle a network. A network
administrator has full rights, access and authorities to control network.
A network administrator is responsible for keeping an organization's
computer network up-to-date and operating as intended. Any
company or organization that uses multiple computers or software
platforms needs a network admin to coordinate and connect the
different systems.
3. Network:
A network is collection of different computing devices that are
connected in various ways in order to communicate and share available
resources. A computer network is defined as interconnection of two or
more computers. The well-known computer network is Internet. It is a
telecommunications network that allows computers to exchange data.
4. What is the main purpose of computer
networking?
▪ It enhances communication and availability of information.
▪ It allows for more convenient resource sharing.
▪ It makes file sharing easier.
▪ It is highly flexible.
▪ It is an inexpensive system.
▪ It increases cost efficiency.
▪ It boosts storage capacity.
5. Applications of Network:
▪ Sharing of resources such as printers.
▪ Sharing of expensive software and database.
▪ Communication from one computer to another computer.
▪ Exchange of data and information among users via network.
▪ Sharing of information over geographically wide areas.
Components of Computer Network:
▪ Two or more computers.
▪ Cables as links between the computers.
▪ A “Network Interface Card” (NIC) on each computer.
▪ Hub or Switch.
▪ “Operating System” on each computer.
6. Advantages of a network:
Following are some important advantages of computer networks:
▪ Networks are established to share different hardware resources. So, it
reduces costs and make it possible to take advantage of expensive
computer equipment.
▪ One copy of software can be shared over a network to multiple users.
So, it is money saving and increases productivity.
▪ On a network many programmers, developers and database
administrators can work on a same project by using remote
repositories.
▪ Computers and other computing devices on a network can exchange
their information and also be able to share their data.
7. Disadvantages of a network:
Following are some disadvantages of computer networks:
▪ If the network is not secure the user can get unauthorized access to
any computer connected on that network. Therefore, it poses a
security risk.
▪ If the network administrator did not conduct regularly checkups. It
allows many viruses such as malware or ransomware to corrupt the
files stored in a network.
▪ It is very expensive to setup in case of large networks.
▪ In some type of networks, we need a computer (super computer)
with high storage & processing speed to fulfil the requirements of a
server which is costly at all.
8. Uses of a network:
Following are some important uses of computer network:
▪ Networks are used to access shared data.
▪ Networks are used to share different devices such as printers and
hard disks etc.
▪ Networks are used to send email with attachments of files etc.
▪ Networks are used to interconnect computers and other computing
devices for exchange of information.
▪ Networks are used to communicate with different people all over
world easily.
▪ In some type of networks, one damaged computer or computing
device effects the whole network.
9. Roles of the Network:
▪ Network role is to provide the security to the hosts.
▪ Network role is to make the coordination between the different
hosts.
▪ Network role is to make efficient and reliable communication
between the hosts.
10. Types of Network:
Networks are categorized according to their size, covering area and
architecture.
Types according to their size & covering area:
▪ PAN (Personal Area network)
▪ LAN (Local Area network)
▪ WAN (Wide Area network)
▪ MAN (Metropolitan Area network)
11. LAN (Local Area network):
A type of network in which different computing devices are connected
in a limited geographical area in order to communicate and share
available resources is known as local area network.
12. For example, a locally placed network of home, office, computer lab of
a school (college or university) and the network of closely positioned
group of buildings are all the examples of local area network.
MAN (Metropolitan Area network):
A type of network in which different computing devices are connected
within city in order to communicate and share available resources is
known as metropolitan area network. This type of network covers an
area of a city. It is usually used to connect two or more LANs in a city.
For example, a network placed within any city or the network
connecting different branches of a company in the same city are
examples of metropolitan area network.
13. PAN (Personal Area network):
A type of network in which different personal computing devices and
different technological devices are connected in a limited
geographical area (that typically extends to 10 meters) for
communication is known as personal area network.
14. For example, a network established for communication between
different personal devices, such as computers, laptops and mobiles are
all the examples of personal area network.
15. WAN (Wide Area network):
WAN stands for Wide Area Network. This type of network covers a
large geographical area. It connects computers and other devices in
different cities and countries. WAN usually consists of several LANs
connected together. It is relatively larger than LAN and extends across a
city or a metropolitan. The best-known wide area network is the
internet.
16. Introduction to Client and Server Environment:
A client is basically a consumer of service and Server is a provider of
services . A client requests some service from the server and the server
provides the required services to the client.
Client Server
Request
Response
17. Terminal Computer (User or Client Computer):
Every computer that is part of a computer network is called a terminal
or node. The users (clients) using different terminal computers can
share information and send or receive data from one terminal to
another.
Server Computer:
A server computer in a computer network is used as a central
computer. It controls other computers in the network. Server computer
is more powerful than terminals.
18. Different Network Models:
Types according to Network Architecture:
There are two models (architectures) of computer networks. These are as
follows:
▪ Client Server Architecture.
▪ Peer-to-Peer Architecture.
▪ Hybrid Architecture.
Client Server Architecture:
In client-server model, one or more computers work as servers and other
computers work as clients. The server computer controls the whole network.
The client computer requests a service from the server computer. The server
computer provides the requested service to the client computer.
19. The client server architecture is based on hardware and software
components that interacts to form system.
Client server architecture includes three
components:
▪ Client
▪ Server
▪ Communication middleware
Client:
The client is any computer process that requests services from the server.
The client is a terminal that accesses the resources available on a server.
20. Server:
The server is any computer process providing services to the clients.
The server is a terminal with high processing power which provides
services for the other computers on the network.
Communication middleware:
It is any computer process through which clients and servers
communicate. It is mode up of several layers of software that aid the
transmission of data and control information between clients and
servers.
Middleware Standards:
Some popular middleware standards are as under:
▪ CORBA (Common Object Request Broker Architecture).
▪ COM or DCOM.
21. CORBA:
CORBA (Common Object Request Broker Architecture) used de facto
network standard. CORBA is being promoted by Object Management
Group (OMG).
COM or DCOM:
COM/DCOM is being promoted by Microsoft alone.
Types of client server architecture:
▪ One-Tier Client Server.
▪ Two-Tier Client Server.
▪ Three-Tier Client Server.
22. One-Tier Client Server:
One tier architecture involves putting all of the required components
for the software application or technology on a single server or
platform. One-tier architecture is also known as single tier architecture.
Two-Tier Client Server:
The simplest way to connect clients and servers is a two-tier
architecture. In a two-tier architecture, any client can get service from
any server by initiating a request over the network. With two-tier
client-server architecture, the user interface is located in the user's
desktop and the services are usually supported by a machines that can
service many clients.
23. Three-Tier Client Server:
The three-tier architecture overcomes the important limitations of the
two-tier architecture. In the three-tier architecture, a middleware was
added between the user system interface client environment and the
server environment. The middleware keeps track of all server locations.
It also translate clients requests into server understandable form.
Advantages of Client Server Architecture:
Some important advantages of client-server architecture (model) are as
follows:
24. ▪ It reduces the volume of data traffic on the network.
▪ It also provides faster responses to the clients.
▪ It can use less powerful computers as clients because most of the
processing is done by the server computer.
Disadvantages of Client Server Architecture:
▪ It is expensive model because server computers are costly.
▪ The operations stop all over the network when server goes down.
25. Peer-to-Peer Architecture:
In a peer-to-peer architecture every computer is a client and every
computer is a server. All computers in peer-to-peer model
(architecture) have same status. There is no server computer to control
other computers. Each computer in this network can have access to the
devices and files on the other computers. Each computer
independently store its own software and information. Each node on
this network has full control over the network resources.
26. Advantages of Peer-to-Peer Architecture:
Some important advantages of peer-to-peer architecture (model) are as
follows:
▪ It is easy to setup.
▪ It is easy to maintain.
▪ It not require expensive server computer.
▪ It is suitable for small office of ten or less computers.
Disadvantages of Peer-to-Peer Architecture:
▪ Heavy use can slow down the network speed.
▪ It also provides less security of data because files are stored at different
locations in the network.
27. Hybrid Architecture:
Hybrid model is a combination of “client and server architecture” and
“peer-to-peer architecture”. Many networks use a mixture of both
network architectures. This model can provide the advantages of both
architectures.
28. Some Important Concepts:
Internet:
Internet is a huge collection of computers all over the world that are all
connected to one another. It is a global network of computers. It is an
example of WAN.
Intranet:
Intranet is a private and secure business network. It uses Internet technology
to provide information to the employees of the organization. It is a network
within an organization.
Extranet:
Extranet is a collection of two or more intranets. It is a network outside an
organization.
29. Network Protocol:
Network protocol or communication protocol is a set of rules for
exchanging information between computers on a network. The devices
in a network cannot communicate without a protocol.
30. Physical Structure of Network:
Topology:
Shape of a network is known as topology. The physical layout or
arrangement of connected devices in a network is called topology. A
network topology is the arrangement with which computer systems or
network devices are connected to each other. Topologies may define
both physical and logical aspect of the network. Different network
topologies are as follows:
▪ Bus Topology.
▪ Ring Topology.
▪ Star Topology.
▪ Mesh Topology.
▪ Tree Topology (Hybrid Topology).
31. Bus topology (Line Topology):
Bus topology is the simplest type of network. It supports a small
number of computers. In bus topology, all computers or network nodes
are connected to a common communication medium. This medium is
often a central wire known as “bus” or “backbone cable”. The
terminators are used at the end of a bus to absorb signals. A collision
can occur in bus topology if two computers transmit data at same time-
Bus topology is mostly used in peer-to-peer networks.
32. Working of Bus Network:
The sending computer sends the data and destination address through
the bus. The data and address move from one computer to the other in
the network. Each computer checks the address. If it matches with the
address of a computer, the computer keeps the data. Otherwise the
data moves to the next computer.
33. Disadvantages of Bus Network:
▪ It is difficult to troubleshoot.
▪ It only supports small number of computers.
▪ The network speed slows down as the number of computers
increases.
Advantages of Bus Network:
▪ It is simple and easy to use.
▪ It requires small length of cable to connect computers.
▪ It is less expensive.
▪ It is easy to extend a bus. It allows more computers to join network.
▪ If one node fails, it does not affect the rest of the network.
34. Ring topology:
In ring topology, each computer is connected to the next computer
with the last one connected to the first. Thus, a ring of computers is
formed.
35. Working of Ring Network:
Every computer is connected to next computer in a ring. Each
computer receives message from the previous computer and transmits
it to the next computer. The message flows in one direction. The
message is passed around the ring until it reaches the correct
destination computer.
36. Disadvantages of Ring Network:
▪ Failure of one computer in the ring can affect the whole network.
▪ It is difficult to troubleshoot.
▪ Adding or removing computers affect the whole network.
Advantages of Ring Network:
▪ It is less expensive than star topology.
▪ Every computer has equal access to the network.
37. Star topology:
All computers in Star topology are connected With central device called
"hub" or "switch". Star topology is mostly used in client-server
networks.
38. Working of Star Network:
The sending computer sends the data to hub. The hub sends data to
the receiving computer. Each computer in star network communicates
with a central hub.
39. Disadvantages of Star Network:
▪ If central hub fails, the entire network breaks down.
▪ It requires a large length of cable to connect computers.
▪ It is more expensive.
Advantages of Star Network:
▪ It is easy to maintain and modify network
▪ Adding or removing computers can be done without disturbing the
network.
▪ Finding faults becomes very simple.
▪ Single computer failure does not bring down the whole network.
▪ It is more flexible than other topologies.
40. Mesh topology with its working:
In a mesh topology, every device in the network is physically connected
to every other device in the network. A message can be sent on
different possible paths from source to destination. Mesh topology
provides improved performance and reliability. Mesh networks are not
used much in local area networks. It is mostly used in wide area
networks.
41. Disadvantages of Mesh Network:
▪ A full mesh network can be very expensive.
▪ It is difficult to install and reconfigure.
Advantages of Mesh Network:
▪ The use of dedicated link guarantees that each connection can carry
its own data load. It eliminates traffic problem.
▪ If one link becomes unusable, it does not harm the entire system.
▪ It is easy to troubleshoot.
42. Tree topology with its working (Hybrid Topology):
A tree topology combines the characteristics of bus and star topologies.
It consists of different groups of computers attached in star topology.
The groups are then connected to a bus backbone cable. Tree topology
is used for the expansion of an existing network.
43. Disadvantages of Tree Network:
▪ Overall length of each segment is limited by the type of cabling used.
▪ If the backbone line breaks, the entire segment down.
▪ It is more difficult to configure and wire than other topologies.
Advantages of Tree Network:
▪ It provides point-to-point wiring for individual segments.
▪ It is supported by several hardware and software vendors.
44. Types of Server:
▪ Web Server.
▪ File Server.
▪ Print Server.
▪ Application Server.
▪ Mail Server.
▪ Proxy Server.
▪ Message Server.
▪ Database Server.
45. Web Server:
A web server is a computer that runs website. The basic objective of
the web server is to store, process and deliver web pages to the users.
This intercommunication is done using Hypertext Transfer Protocol
(HTTP).
File Server:
A file server is a server that provides access to files. It acts as a
central file storage location that can be accessed by multiple systems.
The main function of a file server is to enable multiple users to access
the stored files and free storage space.
46. Print Server:
A print server, or printer server, is a device which provide us printing
services which connects printers to computers over a network.
All print jobs are sent from the computer to the server, which then
sends the print job out to a printer.
Application Server:
An application server is designed to install, operate and host
applications in a network or in an organization. It helps the clients in a
network to run the applications in an easy and the effective way.
47. Mail Server:
A mail server (or email server) is a computer system that sends and
receives email. For example, the SMTP protocol sends messages and
handles outgoing mail requests.
Proxy Server:
A proxy server provides a gateway between users and the internet. It is
a server, referred to as an “intermediary” because it goes between
end-users and the web pages they visit online. Enhanced
security: Proxy servers can act like a firewall between your system and
the internet. So that hackers cannot access your system.
48. Message Server:
It is used to co-ordinate the interaction between users, documents and
applications. The data can be used in audio, video, binary, text or
graphics.
Database Server:
It is a type of application server. It allows the user to access the
centralized strong database.
49. Major Features and functions of the windows
server 2008:
▪ Active Directory.
▪ Server manager.
▪ Server Core.
▪ Windows Server 2008 Hyper-V.
▪ The Failover Cluster Management tool.
▪ The Disk Management console.
50. Active Directory:
Active Directory provides the structure to centralize the network and
store information about network resources across the entire
domain. Active Directory uses Domain Controllers to keep this
centralized storage available to network users.
Server Manager:
Server Manager is a single solution that is used as a single source for
managing identity and system information. Server Manager is enabled
by default when a Windows 2008 server is installed.
53. Server Core:
▪ Server Core is such a feature in which you can perform your tasks by
entering the commands.
▪ Less resources are require to install server core version.
▪ But you have to type a command to perform the every task in the
server 2008.
56. Windows Server 2008 Hyper-V:
Windows Server 2008 Hyper-V is the hypervisor-based virtualization
feature included as a role of Windows Server 2008. It contains
everything needed to create a virtual network. These virtual networks
enable IT organizations to reduce costs, to improve server utilization.
57. Failover Cluster Management tool:
▪ Failover support ensures that a business intelligence system remains
available for use if an application or hardware failure
occurs. Clustering provides failover support in two ways: Load
redistribution: When a node fails, the work for which it is responsible
is directed to another node or set of nodes.
▪ The Failover Cluster Management tool included with Windows Server
2008 allows you to create and manage server clusters. ...
A cluster allows you to establish high availability for general services
or for specific applications.
58. Disk Management Console:
The Disk Management console in Windows Server 2008 lets you
manage not only the local hard disks but also drives on other
computers running any version of Windows 2000, Windows XP,
Windows Server 2003, Windows Vista, or Windows Server 2008,
allowing an administrator to manage disk tasks and space allocations
from a workstation without having to sit at the computer that is being
administered.
80. IP address and its versions:
IP address stands for Internet Protocol Address IP address is the unique
Identification of a device over the internet. It is also called logical
address. There are now two versions of IP address.
▪ IPv4 addresses are 32 bits long.
▪ IPv6 addresses 128 bits long.
83. What is the static and the dynamic IP?
▪ Static means staying the same. It is the IP which administrator have to
configure in every computer.
▪ Dynamic IP is that IP which is given by the DHCP. It is changed with
the time. Dynamic IP is more secure because it is changed according
to time.
90. MAC address:
A MAC(Media Access Control Address) address is a hardware
identification number that uniquely identifies each device on a
network. The MAC address is assigned by the company of a device
91. Classes of IP Address:
IP address:
IP Address is a “Unique Identification” of a device over the internet. IP
address is 32 bit.
There are basically five classes of IP address:
▪ Class A
▪ Class B
▪ Class C
▪ Class D
▪ Class E
94. Subnet Mask:
Subnet mask tell us that how many networks and host bit in the IP
address subnet mask is used to divide an IP address into two parts.
One part identifies the host (computer), the other part identifies the
network to which it belongs.
95. NAT (Network Address Translation):
NAT stands for the “Network Address Translation”. It is a process in
which private IP address is converted into public IP address, so that,
private IP address can also be used in internet. We use NAT so that we
can save IP address.
Translation (NAT) is a process in which one or more local IP address is
translated into one or more global IP address and vice versa in order to
provide Internet access to the local hosts.
96.
97.
98. Static NAT: In static NAT one Private IP address is converted into one
Public IP address.
Dynamic NAT: Dynamic network address translation (Dynamic NAT) is a
technique in which multiple public Internet Protocol (IP) addresses are
mapped and used with an internal or private IP address.
Use dynamic NAT to translate a set of unregistered IP addresses to a
smaller set of registered addresses.
Static vs Dynamic NAT:
Static NAT provides a permanent mapping between the internal and
the public IP address.
Dynamic NAT is used when you have a “pool” of public IP addresses
that you want to assign to your internal hosts dynamically.
99. Advantages of NAT:
▪ IP address spaces can be saved because many hosts connect to the
global Internet by using a single dynamic external IP address.
▪ Private IP addresses can be reused.
▪ The security of private networks can be enhanced by hiding the
internal addresses from external networks.
100. Disadvantages of NAT:
▪ Network Address Translation (NAT) consumes the processor and
memory because NAT need to translate IPv4 addresses for all
incoming and outgoing IPv4 datagram and to keep the translation
details in memory.
▪ It slows down the network performance, therefore it creates a
problem in real-time protocols.
101. What is print management?
Microsoft Management Console (MMC) that enables you to install,
view and manage all of the printers in your organization from any
computer running Windows Server.
102. Active directory:
An active directory is the Database of users groups, services and
resources. It is basically centralized database of users, groups, services
and resources. These are also known as the object and the collection of
these objects is called active directory.
103. Benefits of Active directory:
▪ Multimaster Authentication and Multimaster Replication (The ability
to access and modify the ADDS from multiple points of
administrations).
▪ A single point of access to the network resources.
▪ Ability to create trust relationship with external network.
104. Active directory 2008 new features:
▪ Introduction to read-only domain controller.
▪ Introduction to Server Core (Change Services through the CMD means
that which is only operated by using the command).
▪ Auditing of the Active directory modifications and deletions.
▪ Ability to start active directory as a services(You don't have to down
the domain controller).
▪ Active Directory Recycle Bin.
▪ Active Directory Administrative Center.
▪ Active Directory Web Services.
▪ Offline Domain Join.
▪ Managed Service Accounts.
105. What is the difference between a domain
controller and Active Directory?
They are two separate things. A domain controller is the main
computer/server that runs your domain. Active Directory is the system
that runs on your domain controller and runs your domain. It stores all
the users, computers on your domain.
106. Active directory Domain Controller(ADDC):
The server where the active directory is installed is called active
directory domain controller. A domain controller is a server that
responds to authentication requests and verifies users on computer
networks.
107. Categories of active directory objects:
▪ Container Objects.
▪ Leaf Objects.
Container objects:
Container objects are the such objects which can contain the other
objects.
For example:
▪ Forest.
▪ Tree.
▪ Domain.
▪ OU.
108. Leaf Objects:
Leaf Objects are the objects which cannot contain the other objects in
it.
For example:
▪ User.
▪ Computer.
▪ Printer. Etc.
109. What is active directory domain?
In Active Directory terms, a domain is an area of a network organized
by a single authentication database. In other words, an Active
Directory domain is essentially a logical grouping of objects on a
network. Domains are created so IT teams can establish administrative
boundaries between different network entities.
110. Domain:
▪ Domain is the logical groups of the computers.
▪ Share a central active directory database.
▪ Running different versions of Microsoft operating systems on the
computers .
▪ Domain is represented by the triangle.
A domain is defined as a logical group of network objects (computers,
users, devices) that share the same Active Directory database.
Doma
in
Domain
112. What are the tree objects?
▪ Tree objects are logical group of network resources and devices.
▪ Can contain one or more domains configured in the parent child
relationship. (by using same name namespaces)
▪ It is the collection of two or more domain which uses same name
spaces and there is a parent child relationship within the tree.
114. Active directory forest:
Active directory forest is the collection of one or more tree and it is the
largest container object in the active directory environment.
User can access the all forest in the active directory by using the single
username and password.
116. What is OU?
OU is stands for the Organizational Unit. It is the
smallest container object in the active directory.
OUs are Active Directory (AD) containers that hold
other AD objects.
Organizational Units are useful when you want to
deploy group policy settings to a subset of users,
groups, and computers within your domain. OU
OU
OU OU OU
OU
Domain
117. What is FQDN?
A fully qualified domain name (FQDN) is the complete domain
name for a specific computer or host on the internet.
The FQDN consists of two parts: the hostname and the domain name.
118. What is “User” in Active Directory?
User accounts are created and stored as objects in Active
Directory Domain Services. User accounts can be used by
human users or programs such as system services use to log on to a
computer. Each user or application that accesses resources in a
Windows domain must have an account in the Active Directory server.
119. What is meant by Exchange Server?
Microsoft Exchange Server is a mail server and
calendaring server developed by Microsoft. It mostly runs on
Windows Server operating systems.
120. What is the difference between Windows
server and Exchange server?
The main difference between Windows Server and Exchange Server is
that Windows Server refers to Microsoft server operating system
while Exchange Server is a mail server and calendaring server that runs
on Windows Server Operating Systems. Windows Server and Exchange
Server are two Microsoft products.
121. What is the mailbox server?
▪ Mailbox servers contain mailbox databases that process, render, and
store data.
▪ Mailbox Server role hosts mailbox databases where user and
resource mailboxes are stored.
123. What is the mailbox management?
▪ Email management is a systematic approach to
maximizing the efficiency of email practices and
minimizing the negative effects that email handling
can have on an individual's productivity and job
satisfaction.
▪ This tool lets you check for messages that are older
than a specified age and move those messages into a
folder. Mailbox Manager can then automatically
delete the messages the next time it runs.
141. What is PUBLIC folder?
Public folders are designed for shared access and
provide an easy and effective way to collect, organize,
and share information with other people in your
workgroup or organization. Public folders help organize
content in a deep hierarchy that's easy to browse.
143. What is address list?
An address list is a collection of mail-enabled recipient objects in
exchange Online. Address lists are based on recipient filters. You can
filter by recipient type (for example, mailboxes and mail contacts) and
recipient properties (for example: Company or State or Province).
144.
145. What is exchange management shell?
The Exchange Management Shell is built on Windows Power
Shell technology and provides a powerful command-line interface that
enables the automation of Exchange administration tasks
146. Steps to open Exchange Management Shell:
▪ Open the Exchange Management Shell in Windows Server 2016.
▪ Click Start > Microsoft Exchange Server 2016 > Exchange
Management Shell.
147.
148. Benefits of exchange management shell:
▪ The Exchange Management Shell also provides a “robust”(The Ability
to remove errors during the execution of the program) and flexible
scripting platform.
▪ Reduce the complexity of current Microsoft Visual Basic scripts,
improving the efficiency of the tasks being run. Tasks that previously
required many lines in Visual Basic scripts can now be done by using
as little as one line of code.
▪ By taking advantage of the Exchange Management Shell's capabilities,
you are now able to create new email accounts and configure store
database properties.
149. What is RBAC?
Role Based Access Control (RBAC) is the permissions model used in
Microsoft Exchange Server 2013. In Exchange 2013, RBAC
now controls both the administrative tasks that can be performed and
the extent to which users can now administer their own mailbox and
distribution groups.
150. What is the RBAC?
Role-based access control (RBAC) restricts network access based on a
person's role within an organization and has become one of the main
methods for advanced access control. The roles in RBAC refer to the
levels of access that employees have to the network.
151. Benefits Of RBAC:
With hundreds or thousands of employees, security is more easily
maintained by limiting unnecessary access to sensitive
information based on each user's established role within the
organization. Other advantages include: Reducing administrative work
and IT support.
152. What is the Load Balancing?
Load balancing is the process of distributing network traffic across
multiple servers. This ensures no single server bears too much demand.
It also increases availability of applications and websites for users.
153. What is RAS?
A remote access service connects a client to a host computer, known as
a remote access server. The most common approach to this service
is remote control of a computer by using another device which needs
internet or any other network connection.
For example we control our home computer by sitting in our office by
using internet connection.
154. What is DNS and its purpose?
DNS stands for Domain Name System. The main function of DNS is to
translate domain names into IP Addresses, which computers can
understand. It also provides a list of mail servers which accept Emails
for each domain name.
155. What is the difference between DNS and
WINS?
WINS stands for Windows Internet Name Service and DNS stands for
Domain Name System. As the name suggests, WINS is specifically for
devices based on Windows, like PC’s or laptops or NT servers. On the
other hand, DNS is mainly for servers and network devices.
156. What is an event viewer?
The Event Viewer is a tool in Windows that displays detailed
information about significant events on your computer. Event Viewer
can be helpful when troubleshooting problems and errors in windows
and the other programs.
159. Types of events:
▪ Application event.
▪ Security event.
▪ Setup event.
▪ System event.
▪ Forwarded event.
Event is every thing that occurs in a computer system.
Something that happens is an event. For example the pressing the
keyboard button and movement of the mouse.
160. What is the application event?
Application event is used to record events written by applications and
services. The applications may be commercial applications, like SQL
Server or Exchange server.
What is the purpose of an security event?
Security event is used to record events related to security, such as
logon attempts and resource access.
161. What is the purpose of the setup event?
Setup event creates log files for all actions that occur during
installation. If you are experiencing problems installing Windows,
consult the log files to troubleshoot the installation.
What is the purpose of the system event?
System log files may contain information about device changes, device
drivers and system changes or events.
Example: For example if we change our system time then log file will be
created in the system event about changing the time.
162. What is the purpose of forwarded event in
event viewer?
Forwarded event records events written by other computers in the
same network. By using the Forwarded Events log, you can keep track
of the event logs of several other computers from one central location.
163. What is troubleshooting?
Troubleshooting is the process of diagnosing the source of a problem.
It is used to fix problems with hardware, software, and many other
products.
Troubleshooting is a form of problem solving, often applied to repair
failed products or processes on a machine or a system.