Académique Documents
Professionnel Documents
Culture Documents
/flushdns Release All IP Address Connections: ipconfig /release Renew All IP Address Connections: ipconfig /renew Re-Register the DNS connections: ipconfig /registerdns Change/Modify DHCP Class ID: ipconfig /setclassid Network Connections: control netconnections Network Setup Wizard: netsetup.cpl Test Connectivity: ping whatismyip.com Trace Route: tracert Displays the TCP/IP protocol sessions: netstat Display Local Route: route Display Resolved MAC Addresses: arp Display Name of Computer Currently on: hostname Display DHCP Class Information: ipconfig /showclassid NameServer Lookup: nslookup whatismyip.com Read more: http://www.whatismyip.com/faq/dos-windows-ip-commands.asp#ixzz0z5kFdSif
1.What is TCP/ip
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Today's IP networking represents a synthesis of several developments that began to
evolve in the 1960s and 1970s, namely the Internet and LANs (Local Area Networks), which emerged in the mid- to late-1980s, together with the advent of the World Wide Web in the early 1990s. The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. The TCP/IP model consists of four layers (RFC 1122).[1][2] From lowest to highest, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.
2. TCP/ip layers
TCP/IP is a protocol stack used for data transmission from source to destination. In the physical layer all the physical connections like LAN cards, cables etc will b there which will send data in the form of bits. layer 2 operates with frames where the switches comes into picture. in the network layer which operates on packets.routing takes places, routers are the devices used for this. transport layer is above the network layer and it uses mainly TCP/ UDP for transport of data. the application layers is on top of this layer. application layer | transport layer[tcp/udp] | network layer[routers] | datalink layer[switches] | physical layer[Network Interface card, cables etc] for any transfer of data between 2 systems this TCP/IP stack comes into picture, whether it is file transfer or uploading something,sending an email etc. any application based on web will use TCP/IP
Network layer.
5. What are the networking protocol options for the Windows clients if for some reason
you do not want to use TCP/IP?
A socket is an abstraction that represents an endpoint of communication. Most applications that consciously use TCP and UDP do so by creating a socket of the appropriate type and then performing a series of operations on that socket. The operations that can be performed on a socket include control operations (such as associating aport number with the socket, initiating or accepting a connection on the socket, or destroying the socket) datatransfer operations (such as writing data through the socket to some other application, or reading data from some other application through the socket) and status operations (such as finding the IP address associated with the socket).
Ip is just a protocol which used to carry data,packets over the network in the manner which the n/w components can understand. ip is a identity of n/w devices .
7. What is the full form of OSI and TCP/IP model?
* OSI stands for = Open Systems Interconnection (OSI) model * TCP/IP stands for = Transmission Control Protocol/ Internet Protocol
PDU for Network Layer is: "Packet" and PDU for Data Link Layer is :"Frame"
They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.
You shouldn't use IP addresses that have been assigned to some other organisation, because if knowledge of your network ever gets leaked onto the Internet they may disrupt that innocent organisation's activity. RFC 1918 provides a solution for this problem by allocating several IP address ranges specifically for use on private networks. These addresses will never be assigned to any organisation and are never supposed to appear on the Internet.
RFC 1918 is the official document on which IP addresses are to be used in a nonconnected or "private" network. There are 3 blocks of numbers set aside specifically for this purpose. The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 We will refer to the first block as "24-bit block", the second as "20-bit block", and the third as "16-bit" block". Note that the first block is nothing but a single class A network number, while the second block is a set of 16 continuous class B network numbers, and the third block is a set of 255 continuous class C network numbers. For the record, my preference is to use the 192.168.0.0 network with a 255.255.255.0 Class-C subnet mask and thus this HOWTO reflects this. Any of the above private networks are valid, but just be SURE to use the correct subnet-mask. So, if you're using a Class-C network, you should number your TCP/IP enabled machines as 192.168.0.1, 192.168.0.2, 192.168.0.3, .., 192.168.0.x
192.168.0.1 is usually set as the internal gateway or Linux MASQ machine which reaches the external network. Please note that 192.168.0.0 and 192.168.0.255 are the Network and Broadcast address respectively (theseaddresses are RESERVED). Avoid using these addresses on your machines or your network will not function properly.
11. DNS uses which protocol? Why?
DNS uses both TCP or UDP or both. UDP can handle only 512bytes. If data size is withing 512 bytes UDP is used, otherwise, TCP is used.
12. Which layer of OSI is responsible for end-to-end communication?
Transport layer.
13. Where do I find assigned port numbers?
The IANA allocates and keeps track of all kinds of arbitrary numbers used by TCP/IP, including well-known port numbers. The entire collection is published periodically in an RFC called the Assigned Numbers RFC, each of which supersedes the previous one in the series. The current Assigned Numbers RFC is RFC 1700.
15. You are in home. But you need to access the office server router. How can you do that?
By using "Telnet"
16. What are the differences between OSI and TCP/IP model?
OSI is a reference model and TCP/IP is an implementation of OSI model. OSI has 7 layers whereas TCP/IP has only 4 layers The upper 3 layers of the OSI model is combined on the TCP/IP model. OSI has: physical layer, data link layer, network layer, transport layer, session layer, presentation layer andapplication layer TCP/IP has : Network layer, Internet layer, transport layer and application layer.
All of the protocols in the TCP/IP suite are defined by documents called Requests For Comments (RFC's). An important difference between TCP/IP RFC's and other (say, IEEE or ITU) networking standards is that RFC's are freely available online.
18. What are the differences among router, switch, bridge and hub?
All of them are devices and are used in network. Their differences are: * * * * Router: Layer 3 device, can work on physical, data and network layer. Switch: Layer 2 device, can work on data link layer Bridge: Layer 2 device, can work on data link layer. Hub: Layer 1device, just a multi-port repeater and works on physical layer
OSI model is a reference model containing 7 layers such as physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.
20.ARP resolves what? Address or IP?
ARP stands for Address Resolution Protocol. It helps to find the hardware address or MAC address when IP address is known.
21.Why we have to use router?
To communicate several networks, routers are used. Routers have both broadcast domain and collision domain. router is used to :-for path determination -for forwarding information -for call set up messages
IANA Internet Assigned Numbers Authority What Is DNS?: Domain Name System(DNS)
Network Topologies
Topology in Network Design Think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there. Network topologies are categorized into the following basic types: bus ring star tree mesh More complex networks can be built as hybrids of two or more of the above basic topologies. Bus Topology Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.
y y y y y
Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable. Illustration - Bus Topology Diagram Ring Topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses. Illustration - Ring Topology Diagram Star Topology Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch orrouter. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.) Illustration - Star Topology Diagram Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone. Illustration - Tree Topology Diagram Mesh Topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others. Illustration - Mesh Topology Diagram Summary Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.
Windows Taskbar
Internet Explorer 8
Windows Search
Open the programs and files you use most in just a click or two
Easily share files, photos, and music among multiple PCs at home
HomeGroup
HomeGroup
Device Management
Libraries
Performance Improvements
Domain Join
64-bit Support
Windows Defender
BitLocker
Parental Controls
Windows XP Mode
Power Management
DirectX 11
Play To
Connect to music and photos on your home PC while away from home
Touch and tap instead of point and click = Included in this version of Windows = Improved in Windows 7
Windows Touch
y y y y
y y
Ultimate PC vs Mac
Windows 7
Windows 7 Professional
Windows 7 Ultimate
Buy now$199.99
Buy now$219.99
Make the things you do every day easier with improved desktop navigation.
Start programs faster and more easily, and quickly find the documents you use most often.
Make your web experience faster, easier and safer than ever with Internet Explorer 8.
on your PC.
Easily create a home network and connect your PCs to a printer with HomeGroup.
Connect to company networks easily and more securely with Domain Join.
In addition to full-system Backup and Restore found in all editions, you can back up to a home or business network.
Help protect data on your PC and portable storage devices against loss or theft with BitLocker.
Work in the language of your choice and switch between any of 35 languages.
Data\Microsoft\Outlook Rules (.rwz) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Note: If you upgraded from a version of Outlook prior to Outlook 2002, you may have a .rwz file on your computer hard disk drive. The file is no longer needed and the rules information is now kept on the server for Microsoft Exchange e-mail accounts, and within the personal folders file (.pst) for POP3 and IMAP e-mail accounts. You can delete the file. Rules import or export (.rwz): If you use the rules import or export feature, the default location for .rwz files is: drive:\Documents and Settings\\My Documents. Print styles (Outlprnt with no extension) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Signatures (.rtf, .txt, .htm) drive:\Documents and Settings\\Application Data\Microsoft\Signatures Stationary (.htm) drive:\Documents and Settings\\Application Data\Microsoft\Stationary Custom forms drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Forms Dictionary (.dic) drive:\Documents and Settings\\Application Data\Microsoft\Proof Templates (.oft) drive:\Documents and Settings\\Application Data\Microsoft\Templates Send/Receive settings (.srs) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Message (.msg, .htm, .rtf) drive:\Documents and Settings\\My Documents
Install the client as you would any other application. Start the Notes client to begin its configuration. If it is an upgrade, be sure to install to the same directory where Notes is currently installed. 1) Enter your netid, Domino Server name and check the box indicating that you want to connect to a Domino server, as shown here:
Click on the Browse button and find the ID file that was mailed to you. 3) A pop-up box will ask if you want to copy the file to the data directory.
Click Yes. 4) Enter the password that was given to you and click OK.
Click OK.
.nsf extension