Vous êtes sur la page 1sur 17

Display Connection Configuration: ipconfig /all Display DNS Cache Info: ipconfig /displaydns Clear DNS Cache: ipconfig

/flushdns Release All IP Address Connections: ipconfig /release Renew All IP Address Connections: ipconfig /renew Re-Register the DNS connections: ipconfig /registerdns Change/Modify DHCP Class ID: ipconfig /setclassid Network Connections: control netconnections Network Setup Wizard: netsetup.cpl Test Connectivity: ping whatismyip.com Trace Route: tracert Displays the TCP/IP protocol sessions: netstat Display Local Route: route Display Resolved MAC Addresses: arp Display Name of Computer Currently on: hostname Display DHCP Class Information: ipconfig /showclassid NameServer Lookup: nslookup whatismyip.com Read more: http://www.whatismyip.com/faq/dos-windows-ip-commands.asp#ixzz0z5kFdSif

1.What is TCP/ip
The Internet Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Today's IP networking represents a synthesis of several developments that began to

evolve in the 1960s and 1970s, namely the Internet and LANs (Local Area Networks), which emerged in the mid- to late-1980s, together with the advent of the World Wide Web in the early 1990s. The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. The TCP/IP model consists of four layers (RFC 1122).[1][2] From lowest to highest, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.

2. TCP/ip layers
TCP/IP is a protocol stack used for data transmission from source to destination. In the physical layer all the physical connections like LAN cards, cables etc will b there which will send data in the form of bits. layer 2 operates with frames where the switches comes into picture. in the network layer which operates on packets.routing takes places, routers are the devices used for this. transport layer is above the network layer and it uses mainly TCP/ UDP for transport of data. the application layers is on top of this layer. application layer | transport layer[tcp/udp] | network layer[routers] | datalink layer[switches] | physical layer[Network Interface card, cables etc] for any transfer of data between 2 systems this TCP/IP stack comes into picture, whether it is file transfer or uploading something,sending an email etc. any application based on web will use TCP/IP

3. You have one IP: 192.168.10.29. In which layere this IP works?

Network layer.

4. What is the port number of ftp(data) and ftp?

ftp(data) = 20 and ftp=21

5. What are the networking protocol options for the Windows clients if for some reason
you do not want to use TCP/IP?

NWLink (Novell), NetBEUI, AppleTalk (Apple).

5. What are sockets?

A socket is an abstraction that represents an endpoint of communication. Most applications that consciously use TCP and UDP do so by creating a socket of the appropriate type and then performing a series of operations on that socket. The operations that can be performed on a socket include control operations (such as associating aport number with the socket, initiating or accepting a connection on the socket, or destroying the socket) datatransfer operations (such as writing data through the socket to some other application, or reading data from some other application through the socket) and status operations (such as finding the IP address associated with the socket).

Socket is the combination of IP address and Port no. in TCP/IP network.

6. How Is IP Carried On A Network?

Ip is just a protocol which used to carry data,packets over the network in the manner which the n/w components can understand. ip is a identity of n/w devices .
7. What is the full form of OSI and TCP/IP model?

* OSI stands for = Open Systems Interconnection (OSI) model * TCP/IP stands for = Transmission Control Protocol/ Internet Protocol

8. What is the PDU of "Network layer" and "Data link layer".

PDU for Network Layer is: "Packet" and PDU for Data Link Layer is :"Frame"

128 bit in tcp ip 9.Should we deploy IPSEC-based security or certificate-based security?

They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.

10. What IP addresses should I assign to machines on a private internet?

You shouldn't use IP addresses that have been assigned to some other organisation, because if knowledge of your network ever gets leaked onto the Internet they may disrupt that innocent organisation's activity. RFC 1918 provides a solution for this problem by allocating several IP address ranges specifically for use on private networks. These addresses will never be assigned to any organisation and are never supposed to appear on the Internet.

RFC 1918 is the official document on which IP addresses are to be used in a nonconnected or "private" network. There are 3 blocks of numbers set aside specifically for this purpose. The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 We will refer to the first block as "24-bit block", the second as "20-bit block", and the third as "16-bit" block". Note that the first block is nothing but a single class A network number, while the second block is a set of 16 continuous class B network numbers, and the third block is a set of 255 continuous class C network numbers. For the record, my preference is to use the 192.168.0.0 network with a 255.255.255.0 Class-C subnet mask and thus this HOWTO reflects this. Any of the above private networks are valid, but just be SURE to use the correct subnet-mask. So, if you're using a Class-C network, you should number your TCP/IP enabled machines as 192.168.0.1, 192.168.0.2, 192.168.0.3, .., 192.168.0.x

192.168.0.1 is usually set as the internal gateway or Linux MASQ machine which reaches the external network. Please note that 192.168.0.0 and 192.168.0.255 are the Network and Broadcast address respectively (theseaddresses are RESERVED). Avoid using these addresses on your machines or your network will not function properly.
11. DNS uses which protocol? Why?

DNS uses both TCP or UDP or both. UDP can handle only 512bytes. If data size is withing 512 bytes UDP is used, otherwise, TCP is used.
12. Which layer of OSI is responsible for end-to-end communication?

Transport layer.
13. Where do I find assigned port numbers?

The IANA allocates and keeps track of all kinds of arbitrary numbers used by TCP/IP, including well-known port numbers. The entire collection is published periodically in an RFC called the Assigned Numbers RFC, each of which supersedes the previous one in the series. The current Assigned Numbers RFC is RFC 1700.

14. Which layer is closer to the user?

Upper layer i.e. Application layer is closer to the user.

15. You are in home. But you need to access the office server router. How can you do that?

By using "Telnet"

16. What are the differences between OSI and TCP/IP model?

OSI is a reference model and TCP/IP is an implementation of OSI model. OSI has 7 layers whereas TCP/IP has only 4 layers The upper 3 layers of the OSI model is combined on the TCP/IP model. OSI has: physical layer, data link layer, network layer, transport layer, session layer, presentation layer andapplication layer TCP/IP has : Network layer, Internet layer, transport layer and application layer.

17. Name 4 example of application layer?

DNS, FTP, Telnet, http

18. How is TCP/IP defined?

All of the protocols in the TCP/IP suite are defined by documents called Requests For Comments (RFC's). An important difference between TCP/IP RFC's and other (say, IEEE or ITU) networking standards is that RFC's are freely available online.
18. What are the differences among router, switch, bridge and hub?

All of them are devices and are used in network. Their differences are: * * * * Router: Layer 3 device, can work on physical, data and network layer. Switch: Layer 2 device, can work on data link layer Bridge: Layer 2 device, can work on data link layer. Hub: Layer 1device, just a multi-port repeater and works on physical layer

19.What is OSI model?

OSI model is a reference model containing 7 layers such as physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.
20.ARP resolves what? Address or IP?

ARP stands for Address Resolution Protocol. It helps to find the hardware address or MAC address when IP address is known.
21.Why we have to use router?

To communicate several networks, routers are used. Routers have both broadcast domain and collision domain. router is used to :-for path determination -for forwarding information -for call set up messages

IANA Internet Assigned Numbers Authority What Is DNS?: Domain Name System(DNS)

UDP (User Datagram Protocol) What Is Ports


- A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at aserver. For the Transmission Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to a message unit. This port number is passed logically between client and server transport layers and physically between the transport layer and theInternet Protocol layer and forwarded on. For example, a request from a client (perhaps on behalf of you at your PC) to a server on the Internet may request a file be served from that host's File Transfer Protocol (FTP) server or process. In order to pass your request to the FTP process in the remote server, the Transmission Control Protocol (TCP) software layer in your computer identifies the port number of 21 (which by convention is associated with an FTP request) in the 16-bit port number integer that is appended to your request. At the server, the TCP layer will read the port number of 21 and forward your request to the FTP program at the server. Some services or processes have conventionally assigned permanent port numbers. These are known as well-known port numbers. In other cases, a port number is assigned temporarily (for the duration of the request and its completion) from a range of assigned port numbers. This is called anephemeral port number.

Network Topologies

Topology in Network Design Think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there. Network topologies are categorized into the following basic types: bus ring star tree mesh More complex networks can be built as hybrids of two or more of the above basic topologies. Bus Topology Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.

y y y y y

Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable. Illustration - Bus Topology Diagram Ring Topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses. Illustration - Ring Topology Diagram Star Topology Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch orrouter. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.) Illustration - Star Topology Diagram Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone. Illustration - Tree Topology Diagram Mesh Topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others. Illustration - Mesh Topology Diagram Summary Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.

Comparison xp, vista, win7


e why Windows 7 is better

Makes everyday tasks simpler and easier

Windows Windows Windows XP Vista 7

Multi-task more easily

Windows Taskbar

Communicate and share with free photo, e-mail, and IM programs

Windows Live Essentials

Browse the web easily and more safely

Internet Explorer 8

Find files and programs instantly

Windows Search

Open the programs and files you use most in just a click or two

Pin Jump Lists

Navigate lots of open windows more quickly

Snap Peek Shake

Easily share files, photos, and music among multiple PCs at home

HomeGroup

Print to a single printer from any PC in the house

HomeGroup

Simplify managing printers, cameras, music players, and other devices

Device Management

Organize lots of files, documents, and photos effortlessly

Libraries

Connect to any available wireless network in just three clicks

View Available Networks

Works the way you want it to

Windows Windows Windows XP Vista 7

Personalize your desktop with themes, photos, and gadgets

Performance Improvements

Connect to company networks securely

Domain Join

Run lots of programs at once with better performance on 64-bit PCs

64-bit Support

Built-in protection against spyware and other malicious software

Windows Defender

Help keep your data private and secure

BitLocker

Manage and monitor your childrens PC use

Parental Controls

Run many Windows XP productivity programs

Windows XP Mode

Designed for faster sleep and resume

Sleep and Resume

Improved power management for longer battery life

Power Management

Makes new and exciting things possible

Windows Windows Windows XP Vista 7

Watch and record TV on your PC

Windows Media Center

Create and share movies and slideshows in minutes

Windows Live Movie Maker

Get the most realistic game graphics and vivid multimedia

DirectX 11

Stream music, photos, and videos around your house

Play To

Connect to music and photos on your home PC while away from home

Remote Media Streaming

Touch and tap instead of point and click = Included in this version of Windows = Improved in Windows 7

Windows Touch

y y y y

Compare Starter Home Premium Professional

y y

Ultimate PC vs Mac

Choose the Windows 7 edition that is best for you


Installing Windows 7? Read this first.

Windows 7

Windows 7 Professional

Windows 7 Ultimate

Features Home Premium

Buy Estimated Retail Pricing (ERP) for upgrade license. now$119.99

Buy now$199.99

Buy now$219.99

Make the things you do every day easier with improved desktop navigation.

Start programs faster and more easily, and quickly find the documents you use most often.

Make your web experience faster, easier and safer than ever with Internet Explorer 8.

Watch, pause, rewind, and record TV

on your PC.

Easily create a home network and connect your PCs to a printer with HomeGroup.

Run many Windows XP productivity programs in Windows XP Mode.

Connect to company networks easily and more securely with Domain Join.

In addition to full-system Backup and Restore found in all editions, you can back up to a home or business network.

Help protect data on your PC and portable storage devices against loss or theft with BitLocker.

Work in the language of your choice and switch between any of 35 languages.

Outlook and Lotus notes


Outlook File Drives Outlook data files (.pst) drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Outlook Offline Folders file (.ost) drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Outlook Personal Address Book (.pab) drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Outlook Offline Address Books (.oab) drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Outlook Command bar and menu customizations (.dat) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Navigation Pane settings (.xml): This file includes Shortcuts, Calendar, and Contact links. drive:\Documents and Settings\\Application Data\Microsoft\Outlook\Outlook.xml Registered Microsoft Exchange extensions (.dat) drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Outlook Outlook contacts nicknames (.nk2) drive:\Documents and Settings\\Application

Data\Microsoft\Outlook Rules (.rwz) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Note: If you upgraded from a version of Outlook prior to Outlook 2002, you may have a .rwz file on your computer hard disk drive. The file is no longer needed and the rules information is now kept on the server for Microsoft Exchange e-mail accounts, and within the personal folders file (.pst) for POP3 and IMAP e-mail accounts. You can delete the file. Rules import or export (.rwz): If you use the rules import or export feature, the default location for .rwz files is: drive:\Documents and Settings\\My Documents. Print styles (Outlprnt with no extension) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Signatures (.rtf, .txt, .htm) drive:\Documents and Settings\\Application Data\Microsoft\Signatures Stationary (.htm) drive:\Documents and Settings\\Application Data\Microsoft\Stationary Custom forms drive:\Documents and Settings\\Local Settings\Application Data\Microsoft\Forms Dictionary (.dic) drive:\Documents and Settings\\Application Data\Microsoft\Proof Templates (.oft) drive:\Documents and Settings\\Application Data\Microsoft\Templates Send/Receive settings (.srs) drive:\Documents and Settings\\Application Data\Microsoft\Outlook Message (.msg, .htm, .rtf) drive:\Documents and Settings\\My Documents

Lotus notes configuration


When downloading the Client from the University of Illinois Webstore, choose to run from current location. You will need the ID file and password that have been provided by the ACCC (or that you are currently using if this is an upgrade)

Install the client as you would any other application. Start the Notes client to begin its configuration. If it is an upgrade, be sure to install to the same directory where Notes is currently installed. 1) Enter your netid, Domino Server name and check the box indicating that you want to connect to a Domino server, as shown here:

2) Now you will be asked if you have an ID file.

Click on the Browse button and find the ID file that was mailed to you. 3) A pop-up box will ask if you want to copy the file to the data directory.

Click Yes. 4) Enter the password that was given to you and click OK.

5) Click Next two times without changing any settings.

6) A pop-up box will tell you that Notes setup is complete.

Click OK.

.nsf extension

Vous aimerez peut-être aussi