Académique Documents
Professionnel Documents
Culture Documents
Basic IT Questions
Questions related to DHCP?
Q. What is DHCP?
A. DHCP stands for "Dynamic Host Configuration Protocol". DHCP (Dynamic Host Configuration
Protocol) is a communications protocol that lets network administrators centrally manage and
automate the assignment of Internet Protocol (IP) addresses in an organization's network.
DHCP assigns IP address to computers and other devices that are enabled as DHCP Clients.
Deploying DHCP servers on the network automatically provides computers and other TCP/IP based
network devices with valid IP addresses and the additional configuration parameters these devices
need, called DHCP options, which allow them to connect to other network resources, such as DNS
servers, WINS servers and routers.
Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses and other network
configuration information (subnet mask, broadcast address, etc) to computers on a network. A client
configured for DHCP will send out a broadcast request to the DHCP server requesting an address.
The DHCP server will then issue a "lease" and assign it to that client. The time period of a valid
lease can be specified on the server. DHCP reduces the amount of time required to configure clients
and allows one to move a computer to various networks and be configured with the appropriate IP
address, gateway and subnet mask.
With a DHCP server installed and configured on your network, DHCP-enabled clients can obtain
their IP address and related configuration parameters dynamically each time they start and join the
network. DHCP servers provide this configuration in the form of an address-lease offer to requesting
clients.
A. With a DHCP server installed and configured on your network, DHCP-enabled clients can obtain
their IP address and related configuration parameters dynamically each time they start and join the
network. DHCP servers provide this configuration in the form of an address-lease offer to requesting
clients.
Page |2
1. The DHCP client requests an IP address by broadcasting a DHCP Discover message to the
local subnet.
2. The client is offered an address when a DHCP server responds with a DHCP Offer message
containing IP address and configuration information for lease to the client. If no DHCP server
responds to the client request, the client can proceed in two ways:
• If it is a Windows 2000–based client, and IP auto-configuration has not been disabled, the client
self-configures an IP address for its interface.
• If the client is not a Windows 2000–based client, or IP auto-configuration has been disabled, the
client network initialization fails. The client continues to resend DHCP Discover messages in the
background (four times, every 5 minutes) until it receives a DHCP Offer message from a DHCP
server.
3. The client indicates acceptance of the offer by selecting the offered address and replying to the
server with a DHCP Request message.
4. The client is assigned the address and the DHCP server sends a DHCH ACK message,
approving the lease. Other DHCP option information might be included in the message.
5. Once the client receives acknowledgment, it configures its TCP/IP properties using any DHCP
option information in the reply, and joins the network.
In rare cases, a DHCP server might return a negative acknowledgment to the client. This can
happen if a client requests an invalid or duplicate address. If a client receives a negative
acknowledgment (DHCP Nack), the client must begin the entire lease process again.
Q. What is DORA?
A. Finally, the chosen DHCP server sends the lease information (the IP address, potentially a subnet
mask, DNS server, WINS server, WINS node type, domain name, and default gateway) to the
workstation in a message called the DHCP ACK (data communications jargon for acknowledge). You
can remember the four parts of a DHCP message by the mnemonic DORA - Discover, Offer,
Request, and ACK.
3. The DHCP client requests an IP address by broadcasting a DHCP Discover message to the
local subnet.
4. The client is offered an address when a DHCP server responds with a DHCP Offer message
containing IP address and configuration information for lease to the client. If no DHCP server
responds to the client request, the client can proceed in two ways:
• If it is a Windows 2000–based client, and IP auto-configuration has not been disabled, the client
self-configures an IP address for its interface.
• If the client is not a Windows 2000–based client, or IP auto-configuration has been disabled, the
client network initialization fails. The client continues to resend DHCP Discover messages in the
background (four times, every 5 minutes) until it receives a DHCP Offer message from a DHCP
server.
6. The client indicates acceptance of the offer by selecting the offered address and replying to the
server with a DHCP Request message.
7. The client is assigned the address and the DHCP server sends a DHCH ACK message,
approving the lease. Other DHCP option information might be included in the message.
8. Once the client receives acknowledgment, it configures its TCP/IP properties using any DHCP
option information in the reply, and joins the network.
In rare cases, a DHCP server might return a negative acknowledgment to the client. This can
happen if a client requests an invalid or duplicate address. If a client receives a negative
acknowledgment (DHCP Nack), the client must begin the entire lease process again.
Q. What is VLAN?
A. A virtual LAN, commonly known as a vLAN or as a VLAN, is a method of creating independent
logical networks within a physical network.
A VLAN consists of a network of computers that behave as if connected to the same wire - even
though they may actually be physically connected to different segments of a LAN. Network
administrators configure VLANs through software rather than hardware, which make them extremely
flexible.
A DHCP relay agent supports DHCP/BOOTP message relay as defined in RFC (Request for
Comment) 1541 & 2131. The DHCP relay agent service is managed using Routing & Remote
Service.
Q. Option Classes?
A. The two option class types: User Class and Vendor Class. User Classes assign DHCP options to a
group of clients that require similar configuration; Vendor Classes typically assign vendor-specific
options to clients that share a common vendor type. For example, with Vendor Classes you can
assign all Dell computers DHCP options that are common to those machines. The purpose of option
classes is to group DHCP options for similar clients within a DHCP scope.
A. A super-scope is actually a collection of individual scopes. When you group different scopes
together into a single superscope, you can do the following:
• Place DHCP clients from multiple network IDs on the same physical segment
• Allow remote DCHP clients from multiple network IDs to obtain an address from a DHCP Server
• Place multiple DHCP Servers on the same physical segment, with each DCHP Server being
responsible for a different scope.
The superscope will allow the DHCP Server to answer requests from DHCP clients from different
network IDs.
Q. What is Multicast?
Page |6
A. A range of class D addresses from 224.0.0.0 to 239.255.255.255 that can be assigned to computers
when they ask for them. A multicast group is assigned to one IP address. Multicasting can be used
to send messages to a group of computers at the same time with only one copy of the message.
The Multicast Address Dynamic Client Allocation Protocol (MADCAP) is used to request a multicast
address from a DHCP server.
Q. What is WSUS?
A. It is Microsoft Software Update Server, and it is designed to automate the process of distributing
Windows operating system patches.
It works by controlling the Automatic Updates applet already present on all Windows machines.
Instead of many machines at UVA all going to Microsoft's website to download updates, the SUS
server downloads all updates to an ITC-owned server and workstations then look there for updates.
Windows Server Update Services server: The server component that is installed on a computer
running a Microsoft Windows 2000 Server with Service Pack 4 (SP4) or Windows Server 2003
operating system inside the corporate firewall. WSUS server provides the features that
administrators need to manage and distribute updates through a Web-based tool, which can be
accessed from Internet Explorer on any Windows computer in the corporate network. In addition, a
WSUS server can be the update source for other WSUS servers.
Automatic Updates: The client computer component built into Microsoft Windows Server 2003,
Windows XP, and Windows 2000 with SP3 operating systems. Automatic Updates enables both
server and client computers to receive updates from Microsoft Update or from a server running
WSUS.
Q. What are the basic requirements (Hardware/Software) to implement the Windows SUS
server?
A. Server Hardware Requirements:
WSUS requires a single server for basic operation, although you can scale your WSUS
implementation to larger numbers of servers if you wish. For a basic implementation of up to 500
users, hardware requirements, per Microsoft, are:
• 1GHz CPU
• 1GB RAM
You also need a network card, and around free disk space (described below)
Page |7
Server Software Requirements:
You need the following software components:
• A supported Windows Server operating system - Windows Server 2003 is the preferred OS, but
Windows 2000 is also supported. WSUS is supported on all editions of Windows Server 2003,
but there are some restrictions of you use the Web Edition (See [WUS Restrictions With2k3
Web].
• IIS - WUS is operated via IIS, so your WUS Server needs to have IIS loaded. You need at least
IIS 5.0.
• .NET Framework 1.1 SP1 - get this 7.982MB download from the Microsoft download site. The
.NET Framework 1.1 SP1 is delivered as a hot fix installation file (see KB article KB867460 for
details). This expands to 55.6 MB (58,335,654 bytes) on disk prior to installation. The installation
of this hot fix also stops IIS, and requires a reboot.
• Background Intelligent Transfer Service 2.0 (BITS 2.0 English.zip) - this is a new version of BITS,
at present only available to beta testers, or those on the OEP. This is a 1.34MB download.
• WSUS Setup (WSUSSetup.exe) - Like BITS V2, this is available only to beta testers or members
of the OEP at present. This is download is over 100mb.
• SQL Database server. For Windows Server 2003 MSDE is installed during setup. For Windows
2000 it is not and MSDE or SQL server must be installed prior WUS setup.
Microsoft recommends that you have at least 6GB free disk space to store WUS content. At present,
typical usage is around 1-2GB/language, although this does depend on what updates you specify
and is likely to grow over time. The WSUS service installs (by default) into C:\Program Files\Update
Services\. This folder takes up 365MB (371MB on disk) after the initial installation. The WSUS
Database is managed by MDSE, and is installed by default into C:\WSUS\MSSQL$WSUS. This
folder takes up 216 MB after the initial install, synchronize and with only 2 clients. The size of the DB
grows as you add more computers, and as you manage more updates.
• 0 - Disabled.
• 1 - Enable the Automatic Update client to use the SUS Server specified by the "WUServer"
value.
Page |8
If you have domain login on client, then we also enable auto update on client side through group
policy.
Q. What is DNS?
A. DNS stands for Domain Naming System which provides name resolution for TCP/IP network. In
addition it is a distributed database and hierarchal structure which ensures that each hostname is
unique across a local and wide area network.
A. DNS is the name resolution system of the Internet. Using DNS allows clients to resolve names of
hosts to IP addresses so that communication can take place. DNS is the foundation upon which
Active Directory is built.
Step 1: A client (or “resolver”) passes its request to its local name server. For example, the URL term
www.idgbooks.com typed into Internet Explorer is passed to the DNS server identified in the client
TCP/IP configuration. This DNS server is known as the local name server.
Step 2: If, as often happens, the local name server is unable to resolve the request, other name
servers are queried so that the resolver may be satisfied.
Step 3: If all else fails, the request is passed to more and more, higher-level name servers until the
query resolution process starts with far-right term (for instance, com) or at the top of the DNS tree
with root name servers
Q. What are the basic requirements (Hardware/Software) to implement the Windows DNS
server?
A. Server Hardware Requirements:
Microsoft's suggested minimum hardware requirements (and some Microsoft recommendations) for
Windows Server 2003 (Standard) is listed here:
• CPU speed: 133MHz (550MHz recommended)
• RAM: 128MB (256MB recommended; 4GB maximum on Standard Server)
• Disk space for setup: 1.5GB
• CD-ROM drive: 12X
• Monitor: Super VGA capable of providing 800 x 600 resolution
NS: Name server resource record specifies the authoritative DNS server for the particular zone.
SOA: This resource record specifies the DNS server providing authoritative information about the
zone.
CNAME: This resource record allows you to use more than one name to point a single host.
MX: This resource record is used by e-mail applications to locate a mail server within a zone.
PTR: Used to map IP address to their associated hostnames. These records are only used in
reverse lookup zones.
SRV: This resource records is used to specify the location of specific services in a domain.
Without DNS, Active Directory couldn’t function, because client computers wouldn’t be able to locate
these domain controllers and resources.
Bottom line is, Active Directory is dependent on DNS. Active Directory can’t be implemented until the
DNS server service is installed.
Q. What is WINS?
A. WINS (Windows Internet Naming Service) resolves’ Windows network computer names (also known
as NetBIOS names) to Internet IP addresses, allowing Windows computers on a network to easily
find and communicate with each other.
Q. What are the basic requirements (Hardware/Software) to implement the Windows WINS
server?
A. Hardware Requirement:
Pentium 4 - 2.8 GHz with 2 GB RAM
80 GB Hard drive/7200RPM
Recommended hard drive division: 20 GB System Partition and 60 GB Data partition
100 Mbps Network adaptor or better
Screen Resolution: - 1024 X 768 pixels, 256 colours (65,536 colours recommended)
Software Requirement:
Windows® Server 2003 Standard Edition SP1 or higher installed.
Application Server Role installed:
Internet Information Server 6.0
ASP.NET
Q. What is Firewall? What are the essential settings are used in Firewall?
A. A system designed to prevent unauthorized access to or from a private network. Firewalls can be
implemented in both hardware and software, or a combination of both. Firewalls are frequently used
to prevent unauthorized internet users from accessing private networks connected to the internet,
especially intranets. All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques; the 3 basic are as given below:
• Packets filter: Looks at each packet entering or leaving the network and accepts or rejects it
based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is
difficult to configure. In addition, it is susceptible to IP spoofing.
• Application gateway: Applies security mechanisms to specific applications, such as FTP and
Telnet servers. This is very effective, but can impose performance degradation.
• Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is
established. Once the connection has been made, packets can flow between the hosts without
further checking.
• Proxy server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
Q. What is VPN?
A. VPN gives extremely secure connections between private networks linked through the Internet. It
allows remote computers to act as though they were on the same secure, local network.
This first domain in a forest, called the forest root domain, is special because it holds the schema
and controls domain naming for the entire forest. It cannot be removed from the forest without
removing the entire forest itself. Also, no other domain can ever be created above the forest root
domain in the forest domain hierarchy.
Q. What is Object?
A. Active Directory objects are the entities that make up a network. An object is a distinct, named set of
attributes that represents something concrete, such as a user, a printer, or an application. For
example, when we create a user object, Active Directory assigns the globally unique identifier
(GUID), and we provide values for such attributes as the user's given name, surname, the logon
identifier, and so on.
Q. What is Schema?
A. The schema defines the type of objects and the attributes that each object has. The schema is what
defines a user account for example. A user account must have a name, a password, and a unique
SID. A user account can also have many additional attributes, such as location, address, phone
number, e-mail addresses, terminal services profiles, and so on.
Q. What is LDAP?
A. LDAP stands for Lightweight Directory Access Protocol is a networking protocol for querying and
modifying directory services running over TCP/IP. And the TCP port for LDAP is 389. LDAP Version
5.
NOTE: You must perform this step if you are not on the domain controller to which you want to
transfer the role. You do not have to perform this step if you are already connected to the domain
controller whose role you want to transfer.
3. Do one of the following:
P a g e | 18
•
In
th
e
En
ter
th
e
na
m
e
of
an
ot
he
r
do
m
ai
n
co
nt
rol
ler
bo
x,
ty
pe
th
e
na
m
e
of
th
e
do
m
ai
n
co
ntr
oll
er
th
at
wil
l
be
th
e
ne
w
rol
P a g e | 19
4. In the console tree, right-click Active Directory Domains and Trusts, and then click Operations
Master.
5. Click Change.
6. Click OK to confirm that you want to transfer the role, and then click Close.
NOTE: You must perform this step if you are not on the domain controller to which you want to
transfer the role. You do not have to perform this step if you are already connected to the domain
controller whose role you want to transfer.
3. Do one of the following:
P a g e | 20
•
In
th
e
En
ter
th
e
na
m
e
of
an
ot
he
r
do
m
ai
n
co
nt
rol
ler
bo
x,
ty
pe
th
e
na
m
e
of
th
e
do
m
ai
n
co
ntr
oll
er
th
at
wil
l
be
th
e
ne
w
rol
P a g e | 21
4. In the console tree, right-click Active Directory Users and Computers, point to All Tasks, and then
click Operations Master.
5. Click the appropriate tab for the role that you want to transfer (RID, PDC, or Infrastructure), and
then click Change.
6. Click OK to confirm that you want to transfer the role, and then click Close.
Q. What are the basic requirements (Hardware/Software) to implement the Windows ADS
server?
A. Minimum requirements:
Processor: Single 550 MHz PIII or comparable
Memory: 512 MB of RAM
Hard Disks: Two 9 GB - Mirrored
Network: 100 Megabit Ethernet
Systems: 2 Windows 2000 SP4 Servers- Redundancy
Recommended requirement Processor: Dual Intel Xeon or comparable
Memory: 1 GB of RAM
Hard Disks: Three 9 GB - RAID5
Network: 100 Megabit Ethernet
Systems: 2 Windows 2000 SP4 Servers- Redundancy
Desktop/Member Server Requirements:
P a g e | 22
Windows desktop OS should be at least Windows 2000 and have hardware to support such to
receive benefit from the GTAD service.
Windows member servers should be at the Windows 2000 level and have hardware to support
such.
Intrasite Intersite
Traffic is uncompressed. Traffic is compressed (to save bandwidth).
Replication partners notify each other Replication partners do not notify each other (to save
when changes must be replicated (to bandwidth).
reduce latency).
Replication partners poll one another Replication partners poll one another during scheduled
periodically. intervals only.
Replication connections can be created Replication connections can only be created between
between any two domain controllers in the bridgehead servers. A bridgehead server is designated by
same site. the KCC. A bridgehead server is a domain controller that
has been designated to perform all intersite replication for
a particular site.
Q. What is GROUPS?
A. Groups are Active Directory (or local computer) objects that can contain users, contacts, computers,
and other groups. In Windows 2003, groups are created in domains, using the Active Directory
Users and Computers tool. You can create groups in the root domain, in any other domain in the
forest, in any organizational unit, or in any container class object (such as the default Users
container). Like user and computer accounts, groups are Windows 2000 security principals; they are
directory objects to which SID’s are assigned at creation.
A. Group policy is an administrative tool for managing users’ settings and computer setting across
domain network.
Q. What is LSDO?
A. LSDO - Local policies first, then Site based policies, then Domain level policies, then OU polices,
then nested OU polices (OUs within OUs). Group polices cannot be linked to a specific user or
group, only container objects.
Q. What is the difference between FAT, FAT32 & NTFS & what is it?
A. Following are Microsoft's Windows Glossary definitions for each of the 3 file systems:
1. File Allocation Table (FAT): A file system used by MS-DOS and other Windows-based
operating systems to organize and manage files. The file allocation table (FAT) is a data
structure that Windows creates when you format a volume by using the FAT or FAT32 file
systems. Windows stores information about each file in the FAT so that it can retrieve the file
later.
2. FAT32: A derivative of the File Allocation Table (FAT) files system. FAT32 supports smaller
cluster sizes and larger volumes than FAT, which results in more efficient space allocation on
FAT32 volumes.
3. NTFS: An advanced file system that provides performance, security, reliability, and advanced
features that are not found in any version of FAT. For example, NTFS guarantees volume
consistency by using standard transaction logging and recovery techniques. If a system fails,
NTFS uses its log file and checkpoint information to restore the consistency of the file system. In
Windows 2000 and Windows XP, NTFS also provides advanced features such as file and folder
permissions, encryption, disk quotas, and compression.
NTFS File System:
1. NTFS is the best file system for large drives. Unlike FAT and FAT32, performance with NTFS
isn't corrupted as drive size increases.
P a g e | 24
2. One of the major security features in NTFS is encryption or, in other words, the process of
disguising a message or data in such a way as to hide its substance.
3. Another feature in NTFS is disk quotas. It gives you the ability to monitor and control the amount
of disk space used by each user.
4. Using NTFS, you can keep access control on files and folders and support limited accounts. In
FAT and FAT32, all files and folders are accessible by all users no matter what their account
type is.
5. Domains can be used to tweak security options while keeping administration simple.
6. Compression available in NTFS enables you to compress files, folders, or whole drives when
you're running out of disk space.
7. Removable media (such as tapes) are made more accessible through the Remote Storage
feature.
8. Recovery logging helps you restore information quickly if power failures or other system
problems occur.
9. In NTFS we can convert the file system through:
1. Back up all your data before formatting:
So you want to start with a 'clean' drive but can't afford losing your precious files? Very
simple. All you need to do is back up your files to an external hard-drive or a partition other
than the one you want to convert, or burn the data onto CDs. After you're done you can
format a drive with NTFS.
2. Use the convert command from command prompt:
This way, you don't need to back up. All files are preserved as they are. However, I
recommend a backup. You don't know what might go wrong and besides what would you
lose if you do back-up? When I converted to NTFS using convert.exe, everything went
smooth. Chances are your conversion will be equally smooth.
IMPORTANT NOTE: This is a one-way conversion. Once you've converted to NTFS, you
can't go back to FAT or FAT32 unless you format the drive.
1. Open Command Prompt
Start | All Programs | Accessories | Command Prompt
OR
Start | Run | type "cmd" without quotes | OK
2. Type "convert drive letter: /fs:ntfs" and press Enter. For example, type "convert C:
/fs:ntfs" (without quotes) if you want to convert drive C.
3. If you're asked whether you want to dismount the drive, agree.
Q. What is Backup?
A. To copy files to a second medium (a disk or tape) as a precaution in case the first medium fails.
Attention: Restoring system state in a situation other than system recovery is not recommended.
You must have administrative authority to restore System State information. To restore the Windows
Server 2003 system state using the GUI:
1. Click Restore from the GUI main window. The Restore window appears.
2. Expand the directory tree by clicking the plus sign +. To display files in a folder, click the folder
icon.
P a g e | 26
3. Locate the System State node in the directory tree. You can expand the System State node to
display the components.
4. Click the selection box next to the System State node to restore the entire system state. You
can restore the System State node only as a single entity because of dependencies among the
system state components. By default, all components are selected; you cannot back up
individual system state components.
5. Click Restore. The Task List window displays the restore processing status.
On the command line, use the restore system state command to restore a backup of a system
state. See Restore System state for more information.
Considerations:
• You can restore System State data to an alternate machine.
• If you are upgrading from a Windows 2000 machine to a Windows Server 2003 machine, you
cannot restore the Windows 2000 system objects that were backed up to the server.
• Your Windows Server 2003 client must be connected to a Tivoli Storage Manager Version 5.2.0
or higher server.
• If Active Directory is installed, you must be in Active Directory restore mode.
• See Performing a Windows XP or Windows Server 2003 system recovery for procedures on
how to perform the following tasks:
o Your operating system is still functioning, but a complete system restore is required.
o A complete recovery is required, including an operating system re-installation.
System services components include the following:
• Background Intelligent Transfer Service (BITS)
• Event logs
• Removable Storage Management Database (RSM)
• Cluster Database (cluster node only)
• Remote Storage Service
• Terminal Server Licensing
• Windows Management Instrumentation (WMI)
• Internet Information Services (IIS) metabase
• DHCP database
• Wins database
To restore the system services using the GUI:
1. Click Restore from the GUI main window. The Restore window appears.
2. Expand the directory tree by clicking the plus sign +. To display files in a folder, click the folder
icon.
3. Locate the System Services node in the directory tree. You can expand the System Services
node to display the components.
4. Click the selection box next to the system services component(s) that you want to restore.
5. Click Restore. The Task List window displays the backup processing status.
On the command line, use the restore system services command to restore a backup of the
system services. See Restore System services for more information.
Q. What is a Cluster?
A. A cluster is a group of independent computers that work together to run a common set of
applications and provide the image of a single system to the client and application. The computers
P a g e | 27
are physically connected by cables and programmatically connected by cluster software. These
connections allow computers to use problem-solving features such as failover in Server clusters and
load balancing in Network Load Balancing (NLB) clusters.
Q. What is RAID?
A. RAID (Redundant Array of Independent Disks). A collection of disk drives that offers increased
performance and fault tolerance. There are a number of different RAID levels. The three most
commonly used are 0, 1, and 5: Level 0: striping without parity (spreading out blocks of each file
across multiple disks). Level 1: disk mirroring or duplexing. Level 2: bit-level striping with parity Level
3: byte-level striping with dedicated parity.
Q. What is Raid-0?
A. RAID Level 0 is not redundant, hence does not truly fit the "RAID" acronym. In level 0, data is split
across drives, resulting in higher data throughput. Since no redundant information is stored,
performance is very good, but the failure of any disk in the array results in data loss. This level is
commonly referred to as striping.
Q. What is RAID-1?
A. RAID Level 1 provides redundancy by writing all data to two or more drives. The performance of a
level 1 array tends to be faster on reads and slower on writes compared to a single drive, but if
either drive fails, no data is lost. This is a good entry-level redundant system, since only two drives
are required; however, since one drive is used to store a duplicate of the data, the cost per
megabyte is high. This level is commonly referred to as mirroring.
Q. What is RAID-5?
A. RAID Level 5 is similar to level 4, but distributes parity among the drives. This can speed small
writes in multiprocessing systems, since the parity disk does not become a bottleneck. Because
parity data must be skipped on each drive during reads, however, the performance for reads tends
to be considerably lower than a level 4 array. The cost per megabyte is the same as for level 4.
Q. What is IP?
A. The Internet Protocol (IP) is a data-oriented protocol used for communicating data across a packet-
switched internet-work.
IP is a network layer protocol in the internet protocol suite and is encapsulated in a data link layer
protocol (e.g., Ethernet).
Q. What is TCP?
A. Transmission Control Protocol, and pronounced as separate letters. TCP is one of the main
protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two
hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and
also guarantees that packets will be delivered in the same order in which they were sent.
Q. What is UDP?
P a g e | 29
A. UDP, a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP
provides very few error recovery services, offering instead a direct way to send and receive
datagram’s over an IP network. It's used primarily for broadcasting messages over a network.
Q. How can we assign Static IP & dynamic IP using command prompt utility?
A. Yes. Through netsh command.
Q. What is Gateway?
A. A gateway is either hardware or software that acts as a bridge between two networks so that data
can be transferred between a numbers of computers.
A. VLSM - Variable Length Subnet Masking. Several new methods of addressing were created so that
usage of IP space was more efficient. The first of these methods is called Variable-Length Subnet
Masking (VLSM). Sub-netting had long been a way to better utilize address space. Subnets divide a
single network into smaller pieces. This is done by taking bits from the host portion of the address to
use in the creation of a “sub” network. For example, take the class B network 147.208.0.0. The
default network mask is 255.255.0.0, and the last two octets contain the host portion of the address.
To use this address space more efficiently, we could take all eight bits of the third octet for the
subnet.
One drawback of sub-netting is that once the subnet mask has been chosen, the number of hosts on
each subnet is fixed. This makes it hard for network administrators to assign IP space based on the
actual number of hosts needed. For example, assume that a company has been assigned
147.208.0.0 and has decided to subnet this by using eight bits from the host portion of the address.
Assume that the address allocation policy is to assign one subnet per department in an organization.
This means that 254 addresses are assigned to each department. Now, if one department only has
20 servers, then 234 addresses are wasted.
Using variable-length subnet masks (VLSM) improves on subnet masking. VLSM is similar to
traditional fixed-length subnet masking in that it also allows a network to be subdivided into smaller
pieces. The major difference between the two is that VLSM allows different subnets to have subnet
P a g e | 31
masks of different lengths. For the example above, a department with 20 servers can be allocated a
subnet mask of 27 bits. This allows the subnet to have up to 30 usable hosts on it.
CIDR: - Classless Inter-Domain Routing. CIDR is also called super-netting. It's an IP addressing
scheme that replaces the older system based on classes A, B, and C. With CIDR, a single IP
address can be used to designate many unique IP addresses. A CIDR IP address looks like a
normal IP address except that it ends with a slash followed by a number, called the IP prefix. For
example: 172.200.0.0/16.
The IP prefix specifies how many addresses are covered by the CIDR address, with lower numbers
covering more addresses. An IP prefix of /12, for example, can be used to address 1,048,576 former
Class C addresses.
CIDR addresses reduce the size of routing tables and make more IP addresses available within
organizations.
Q. What is Difference between Windows NT, Windows 2000 & Windows 2003?
A. The major difference between in NT, 2000 & 2003 are as follows:
1) In winnt server concept pdc and bdc but there is no concept in 2000.
2) In winnt server sam database r/w format in pdc and read only format in bdc, but in 2000 domain and
every domain controller sam database read/writer format.
3) 2000 server can any time any moment become server or member of server simple add/remove
dcpromo. But in winnt you have to reinstall operating system.
A) In 2000 we cannot rename domain whereas in 2003 we can rename Domain
B) In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) whereas in 2003
supports up to 64 processors and max of 512GB RAM
C) 2000 Supports IIS 5.0 and 2003 Supports IIS6.0
D) 2000 doesn't support Dot net whereas 2003 Supports Microsoft .NET 2.0
E) 2000 has Server and Advance Server editions whereas 2003 has Standard, Enterprise, Datacentre
and Web server Editions.
F) 2000 doesn't have any 64 bit server operating system whereas 2003 has 64 bit server operating
systems (Windows Server 2003 X64 STD and Enterprise Edition)
G) 2000 has basic concept of DFS (Distributed File systems) with defined roots whereas 2003 has
Enhanced DFS support with multiple roots.
H) In 2000 there is complexality in administering Complex networks whereas 2003 is easy
administration in all & Complex networks
I) in 2000 we can create 1 million users and in 2003 we can create 1 billion users.
J) In 2003 we have concept of Volume shadow copy service which is used to create hard disk snap
shot which is used in Disaster recovery and 2000 doesn't have this service.
K) In 2000 we don't have end user policy management, whereas in 2003 we have a End user policy
management which is done in GPMC (Group policy management console).
L) In 2000 we have cross domain trust relation ship and 2003 we have Cross forest trust relationship.
M) 2000 Supports 4-node clustering and 2003 supports 8-node clustering.
N) 2003 has High HCL Support (Hardware Compatibility List) issued by Microsoft
O) Code name of 2000 is Win NT 5.0 and Code name of 2003 is Win NT 5.1
P) 2003 has service called ADFS (Active Directory Federation Services) which is used to communicate
between branches with safe authentication.
P a g e | 32
Q) In 2003 their is improved storage management using service File Server Resource Manager
(FSRM)
R) 2003 has service called Windows Share point Services (It is an integrated portfolio of collaboration
and communication services designed to connect people, information, processes, and systems both
within and beyond the organizational firewall.)
S) 2003 has Improved Print management compared to 2000 server
T) 2003 has telnet sessions available.
U) 2000 supports IPV4 whereas 2003 supports IPV4 and IPV6
In windows 2003 support SHADOW COPIES. A NEW TOOLTO RECOVER FILES
Window 2003 server includes IIS server in it. That is the biggest advantage on top of better file system
management
In 2003 server u can change the domain name at any time without rebuilding the domain where as in
2000 u have to rebuild the entire domain to change the domain name.
In windows 2000 support maximum 10 users’ access shared folder at a time through network.
But in win2003 no limitation
Q. What is the difference between Windows XP Home Edition & Professional Edition?
A. Windows XP Home Edition:
• Contains basic support for security among multiple users.
• Built-in support for peer-to-peer networking, but only for up to five computers.
• The backup utility is not installed by default, but is included on the CD.
Windows XP Professional Edition:
• Includes extended support for security between multiple users on the same machine.
• Better support for peer-to-peer networking, plus support for joining a "Windows NT domain."
• The backup utility is installed by default.
• The Professional edition includes the following components not found in the Home edition:
o Administrative Tools (in the Start Menu and Control Panel)
o Automated System Recovery (ASR)
o Boot Configuration Manager
P a g e | 33
o DriverQuery
o Group Policy Refresh Utility
o Multi-lingual User Interface (MUI) add-on
o NTFS Encryption Utilitiy
o Offline Files and Folders
o OpenFiles
o Performance Log Manager
o Remote Desktop
o Scheduled Tasks Console
o Security Template Utility
o Taskkill
o Tasklist
o Telnet Administrator
• Provides support for multi-processor systems (2 or 4 CPUs), Dynamic Disks, Fax.