Download Matirial-2 - Rtech

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Expense and cost recovery system (ECRS) wikipedia , lookup

Computer security wikipedia , lookup

Transcript
RTECH-INDIA
SUB : NMA
Q.1 What is Troubleshooting Tools ? List their types?
“Troubleshooting of network problems is find and solve with the help of hardware and
software is called troubleshooting tools”.
Troubleshooting Tools
-
Hardware Tools
o They are now less expensive and easier to operate. They are helpful to
identify the problem in physical devices.
o Example :
Digital Voltmeters
•
It is check the amount of voltage passing through
resistance.
Time-Domain Reflect meters (TDRs)
•
A time-domain reflect meter (TDR) locate to find the
faults in metallic cables
Advanced Cable Testers
•
LAN Cable Tester is a tool for testing LAN cables and find all the
problems associated with the cable using LED blow at both side.
Oscilloscopes
•
Oscilloscopes are electronic component that measure the
amount of signal voltage per unit of time and display the
result on a monitor.
-
Software Tools
o They are helpful to identify the problem in logical program.
o Example :
Network Monitors
•
It gather information about packet types, errors, and packet
traffic to and from each computer.
1
RTECH-INDIA
SUB : NMA
Protocol Analyzers
•
It perform real-time network traffic analysis using packet
capture, decoding, and transmission data.
-
Network General Sniffer
Novell's LAN alyzer
Monitoring and Troubleshooting Tools
o After a network has been installed and is operational, the administrator
needs to make sure it performs effectively. To do this, the administrator
will need a tools is called monitoring tools.
o Example :
Performance Monitors
•
These monitors can view operations in both real time and
recorded time for:
o Processors.
o Hard disks.
o Memory.
o Network utilization.
o The network as a whole.
Network Monitors
•
This tool gives the administrator the ability to capture and
analyze network data streams to and from the server.
Q.2 Explain Hardware troubleshooting tools.
-
They are now less expensive and easier to operate. They are helpful to identify the
problem in physical devices.
-
List the different type of hardware troubleshooting tools.
2
RTECH-INDIA
SUB : NMA
o Digital Voltmeters
The digital voltmeter (volt-ohm meter) is the primary all-purpose
electronic measuring tool.
It is check the amount of voltage passing through resistance.
Voltmeters can determine following:
•
The cable is continuous.
•
The cable can carry network traffic.
•
Two parts of the same cable are touching
•
An exposed part of the cable is touching another conductor,
such as a metal surface.
o Time-domain reflect meters (TDRs)
A time-domain reflect meter (TDR) locate to find the faults in
metallic cables
A TDR transmits a short rise time pulse along the conductor. And This
can be a square wave plus
If The entire transmitted pulse will be continue in the far-end
termination and no signal will be reflected toward the TDR
If The entire transmitted pulse will be break in the far-end termination
signal will be reflected toward the TDR.
o LAN cable tester.
LAN Cable Tester is a tool for testing LAN cables and find all the
problems associated with the cable using LED blow at both side.
In them there are 8 LED at both side.
One tester part feet at one side of cable and another part feet at
another side of cable.
If LED is not blow then we find that the problem in which pair.
3
RTECH-INDIA
SUB : NMA
o Oscilloscopes
Oscilloscopes are electronic component that measure the amount
of signal voltage per unit of time and display the result on a
monitor.
When It used with TDRs, an oscilloscope can display:
•
Shorts in cable.
•
Sharp bends in the cable.
•
Breaks in the cable
•
Loss of signal power.
o Crossover Cables
It is LAN cable use for check the network connectivity between
two Computers, two same devices.
Q.3 Explain Software troubleshooting tools.
-
They are helpful to identify the problem in logical program like command,
internet loading problem, file sharing etc.
o Network Monitors
Network monitors are software tools that track all selected part of
network traffic.
They examine data packets
4
RTECH-INDIA
SUB : NMA
It gather information about packet types, errors, and packet traffic
to and from each computer.
Network monitors are very useful for establishing part of the
network baseline.
After the baseline has been established, you will be able to
troubleshoot traffic problems and monitor network usage.
It determine when it is time to upgrade.
As an example a new network is installed, you determine that
network traffic is utilized at 40 percent is increases.
o Protocol analyzers
It is also called "network analyzers,".
It perform real-time network traffic analysis using packet capture,
decoding, and transmission data.
These are the tools used most often to monitor network
interactivity.
Protocol analyzers look inside the packet to identify a problem in
•
Cabling.
•
Software.
•
File servers.
•
Workstations.
•
Network interface cards.
The protocol analyzer detect network problems including:
•
Faulty network components.
•
Configuration or connection errors
•
LAN bottlenecks.
•
Traffic fluctuations.
•
Protocol problems.
•
Applications that might conflict.
•
Unusual server traffic.
o Network General Sniffer
5
RTECH-INDIA
SUB : NMA
Sniffer measures network traffic in kilobytes per second, frames
per second, or as a percentage of available bandwidth.
It will gather LAN traffic statistics, detect faults such as
beaconing, and present this information in a profile of the LAN.
Sniffer can also identify bottlenecks by capturing frames between
computers and displaying the results.
o Network Command
PING
•
Ping allows a user to ping another network IP address.
•
This can help determine if the network card can communicate
within the local network or outside network.
IPCONFIG
•
It display the information about ip address, it gateway,
subnet mask etc.
Q.4 Explain Monitoring and Troubleshooting Tools.
-
After a network has been installed and is operational, the administrator needs to
make sure it performs effectively. To do this, the administrator will need a tools
is called monitoring tools.
o Performance Monitors
Most current network operating systems include a monitoring
utility that will help a network administrator keep track of a
network's server performance.
These monitors can view operations in both real time and recorded
time for:
•
Processors.
•
Hard disks.
•
Memory.
•
Network utilization.
6
RTECH-INDIA
•
SUB : NMA
The network as a whole.
These monitors can:
•
Record the performance data.
•
Send an alert to the network manager.
•
Start another program that can adjust the system back into
acceptable ranges.
o Network Monitors
Some servers include network monitoring software.
Windows NT Server, for example, includes a diagnostic tool
called Network Monitor.
This tool gives the administrator the ability to capture and analyze
network data streams to and from the server.
-
This data is used to troubleshoot potential network problems.
The packets of data in the data stream consist of the following information:
•
The source address of the computer that sent the message.
•
The destination address of the computer that received the frame.
•
Headers from each protocol used to send the frame.
•
The data or a portion of the information being sent
Q.5 Explain File and Directory permissions.
You can set security permissions on files and folders. These permissions grant or
deny access to the files and folders.
You can view security permissions for files and folders by completing the
following steps:
1. In Windows Explorer, right-click the file or folder you want to work with.
2. From the pop-up menu, select Properties, and then in the Properties dialog box
click the Security tab.
7
RTECH-INDIA
SUB : NMA
3. In the Name list box, select the user, contact, computer, or group whose
permissions you want to view. If the permissions are dimmed, it means the
permissions are inherited from a parent object.
Permission
Read
Write
Read &
Execute
List Folder
Contents
Modify
Full Control
Meaning for Folders
Meaning for Files
Permits viewing and listing of files
Permits viewing or accessing
and subfolders
of the file's contents
Permits adding of files and
subfolders
Permits viewing and listing of files
and subfolders as well as executing
of files
Permits writing to a file
Permits viewing and
accessing of the file's
contents as well as executing
of the file
Permits viewing and listing of files
and subfolders as well as executing
N/A
of files; inherited by folders only
Permits reading and writing of files
Permits reading and writing
and subfolders; allows deletion of
of the file; allows deletion of
the folder
the file
Permits reading, writing, changing,
and deleting of files and subfolders
Permits reading, writing,
changing and deleting of the
file
8
RTECH-INDIA
SUB : NMA
Q.6 What is user account? Explain with their types.
A user account is a collection of information that tells Windows which
files and folders you can access, what changes you can make to the
computer, and your personal preferences, such as your desktop
background or screen saver.
User accounts let you share a computer with several people, while
having your own files and settings.
Each person accesses his or her user account with a user name and
password.
There are three types of them
o Built in user account
This type o user account created by default when
operating system is installed.
It is main account all other account created from them
It have all permission
Example : Administrator
o Local user account
User accounts defined on a local computer are called
local user accounts
Local user accounts have access to the local computer
only, and they must authenticate themselves before they
can access network resources
It is developing from built in user account
We can also put permission on them for limited access
o Domain control user account
Users accounts defined in Active Directory are called
domain user accounts
It control by domain of server.
From server side we can create the account and client
side we can access them
It connected using domain
9
RTECH-INDIA
SUB : NMA
We can use map drive for sharing hard drive for access
private data of user.
Q.7 Explain Group user account.
You use groups to grant permissions to similar types of users. If a user is a
member of a group that can access a resource, that particular user can access the
same resource.
You can give a user access to various work-related resources just by making the
user a member of the correct group.
Note that while you can log on to a computer with a user account, you can't log on
to a computer with a group account, Because different Active Directory domains
may have groups with the same name.
When you work with Active Directory, you may also need to specify the fully
qualified domain name for a group.
Group Types
•
•
Local groups
o
Groups that are defined on a local computer.
o
Local groups are used on the local computer only.
o
You create local groups with the Local Users And Groups utility.
Security groups
o
You define security groups in domains using Active Directory Users And
Computers.
•
Distribution groups
o
Groups that are used as e-mail distribution lists.
o
They can't have security descriptors associated with them.
o
You define distribution groups in domains using Active Directory Users
And Computers.
10
RTECH-INDIA
SUB : NMA
Q.8 Explain Map Drive.
Folder of hard disk drive are configure for sharing them in network or LAN is
called map drive
Z,X,Y etc letter used for them
Step
o Right click on my computer icon
o Click on map network drive from pop up menu
o Select folder for share
o Select letter
o Click on OK
Q.9 What is Network security? List and explain different types of them.
“Network security is technical which prevent our computer networking from
unauthorized data or user access”.
Network security uses the authorization of access to data in a network, which is
controlled by the network administrator. Users choose or are assigned an ID and
password or other authenticating information that allows them access to
information and programs.
o Authentication
We have to use the user name and password for access the account,
so other people can not see our data
o Encryption
It is the technique using them the plain text can convert in to
chipper text using key.
It means our data convert into code word so other people can not
read that data
o Anti virus software
It is the one type of software using them we can protect from virus
o Firewall
It is the tool which prevent the incoming or out going data which
are thread with some harmful effect.
11