Matirial-2 - Rtech
Transcription
Matirial-2 - Rtech
RTECH-INDIA SUB : NMA Q.1 What is Troubleshooting Tools ? List their types? “Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools”. Troubleshooting Tools - Hardware Tools o They are now less expensive and easier to operate. They are helpful to identify the problem in physical devices. o Example : Digital Voltmeters • It is check the amount of voltage passing through resistance. Time-Domain Reflect meters (TDRs) • A time-domain reflect meter (TDR) locate to find the faults in metallic cables Advanced Cable Testers • LAN Cable Tester is a tool for testing LAN cables and find all the problems associated with the cable using LED blow at both side. Oscilloscopes • Oscilloscopes are electronic component that measure the amount of signal voltage per unit of time and display the result on a monitor. - Software Tools o They are helpful to identify the problem in logical program. o Example : Network Monitors • It gather information about packet types, errors, and packet traffic to and from each computer. 1 RTECH-INDIA SUB : NMA Protocol Analyzers • It perform real-time network traffic analysis using packet capture, decoding, and transmission data. - Network General Sniffer Novell's LAN alyzer Monitoring and Troubleshooting Tools o After a network has been installed and is operational, the administrator needs to make sure it performs effectively. To do this, the administrator will need a tools is called monitoring tools. o Example : Performance Monitors • These monitors can view operations in both real time and recorded time for: o Processors. o Hard disks. o Memory. o Network utilization. o The network as a whole. Network Monitors • This tool gives the administrator the ability to capture and analyze network data streams to and from the server. Q.2 Explain Hardware troubleshooting tools. - They are now less expensive and easier to operate. They are helpful to identify the problem in physical devices. - List the different type of hardware troubleshooting tools. 2 RTECH-INDIA SUB : NMA o Digital Voltmeters The digital voltmeter (volt-ohm meter) is the primary all-purpose electronic measuring tool. It is check the amount of voltage passing through resistance. Voltmeters can determine following: • The cable is continuous. • The cable can carry network traffic. • Two parts of the same cable are touching • An exposed part of the cable is touching another conductor, such as a metal surface. o Time-domain reflect meters (TDRs) A time-domain reflect meter (TDR) locate to find the faults in metallic cables A TDR transmits a short rise time pulse along the conductor. And This can be a square wave plus If The entire transmitted pulse will be continue in the far-end termination and no signal will be reflected toward the TDR If The entire transmitted pulse will be break in the far-end termination signal will be reflected toward the TDR. o LAN cable tester. LAN Cable Tester is a tool for testing LAN cables and find all the problems associated with the cable using LED blow at both side. In them there are 8 LED at both side. One tester part feet at one side of cable and another part feet at another side of cable. If LED is not blow then we find that the problem in which pair. 3 RTECH-INDIA SUB : NMA o Oscilloscopes Oscilloscopes are electronic component that measure the amount of signal voltage per unit of time and display the result on a monitor. When It used with TDRs, an oscilloscope can display: • Shorts in cable. • Sharp bends in the cable. • Breaks in the cable • Loss of signal power. o Crossover Cables It is LAN cable use for check the network connectivity between two Computers, two same devices. Q.3 Explain Software troubleshooting tools. - They are helpful to identify the problem in logical program like command, internet loading problem, file sharing etc. o Network Monitors Network monitors are software tools that track all selected part of network traffic. They examine data packets 4 RTECH-INDIA SUB : NMA It gather information about packet types, errors, and packet traffic to and from each computer. Network monitors are very useful for establishing part of the network baseline. After the baseline has been established, you will be able to troubleshoot traffic problems and monitor network usage. It determine when it is time to upgrade. As an example a new network is installed, you determine that network traffic is utilized at 40 percent is increases. o Protocol analyzers It is also called "network analyzers,". It perform real-time network traffic analysis using packet capture, decoding, and transmission data. These are the tools used most often to monitor network interactivity. Protocol analyzers look inside the packet to identify a problem in • Cabling. • Software. • File servers. • Workstations. • Network interface cards. The protocol analyzer detect network problems including: • Faulty network components. • Configuration or connection errors • LAN bottlenecks. • Traffic fluctuations. • Protocol problems. • Applications that might conflict. • Unusual server traffic. o Network General Sniffer 5 RTECH-INDIA SUB : NMA Sniffer measures network traffic in kilobytes per second, frames per second, or as a percentage of available bandwidth. It will gather LAN traffic statistics, detect faults such as beaconing, and present this information in a profile of the LAN. Sniffer can also identify bottlenecks by capturing frames between computers and displaying the results. o Network Command PING • Ping allows a user to ping another network IP address. • This can help determine if the network card can communicate within the local network or outside network. IPCONFIG • It display the information about ip address, it gateway, subnet mask etc. Q.4 Explain Monitoring and Troubleshooting Tools. - After a network has been installed and is operational, the administrator needs to make sure it performs effectively. To do this, the administrator will need a tools is called monitoring tools. o Performance Monitors Most current network operating systems include a monitoring utility that will help a network administrator keep track of a network's server performance. These monitors can view operations in both real time and recorded time for: • Processors. • Hard disks. • Memory. • Network utilization. 6 RTECH-INDIA • SUB : NMA The network as a whole. These monitors can: • Record the performance data. • Send an alert to the network manager. • Start another program that can adjust the system back into acceptable ranges. o Network Monitors Some servers include network monitoring software. Windows NT Server, for example, includes a diagnostic tool called Network Monitor. This tool gives the administrator the ability to capture and analyze network data streams to and from the server. - This data is used to troubleshoot potential network problems. The packets of data in the data stream consist of the following information: • The source address of the computer that sent the message. • The destination address of the computer that received the frame. • Headers from each protocol used to send the frame. • The data or a portion of the information being sent Q.5 Explain File and Directory permissions. You can set security permissions on files and folders. These permissions grant or deny access to the files and folders. You can view security permissions for files and folders by completing the following steps: 1. In Windows Explorer, right-click the file or folder you want to work with. 2. From the pop-up menu, select Properties, and then in the Properties dialog box click the Security tab. 7 RTECH-INDIA SUB : NMA 3. In the Name list box, select the user, contact, computer, or group whose permissions you want to view. If the permissions are dimmed, it means the permissions are inherited from a parent object. Permission Read Write Read & Execute List Folder Contents Modify Full Control Meaning for Folders Meaning for Files Permits viewing and listing of files Permits viewing or accessing and subfolders of the file's contents Permits adding of files and subfolders Permits viewing and listing of files and subfolders as well as executing of files Permits writing to a file Permits viewing and accessing of the file's contents as well as executing of the file Permits viewing and listing of files and subfolders as well as executing N/A of files; inherited by folders only Permits reading and writing of files Permits reading and writing and subfolders; allows deletion of of the file; allows deletion of the folder the file Permits reading, writing, changing, and deleting of files and subfolders Permits reading, writing, changing and deleting of the file 8 RTECH-INDIA SUB : NMA Q.6 What is user account? Explain with their types. A user account is a collection of information that tells Windows which files and folders you can access, what changes you can make to the computer, and your personal preferences, such as your desktop background or screen saver. User accounts let you share a computer with several people, while having your own files and settings. Each person accesses his or her user account with a user name and password. There are three types of them o Built in user account This type o user account created by default when operating system is installed. It is main account all other account created from them It have all permission Example : Administrator o Local user account User accounts defined on a local computer are called local user accounts Local user accounts have access to the local computer only, and they must authenticate themselves before they can access network resources It is developing from built in user account We can also put permission on them for limited access o Domain control user account Users accounts defined in Active Directory are called domain user accounts It control by domain of server. From server side we can create the account and client side we can access them It connected using domain 9 RTECH-INDIA SUB : NMA We can use map drive for sharing hard drive for access private data of user. Q.7 Explain Group user account. You use groups to grant permissions to similar types of users. If a user is a member of a group that can access a resource, that particular user can access the same resource. You can give a user access to various work-related resources just by making the user a member of the correct group. Note that while you can log on to a computer with a user account, you can't log on to a computer with a group account, Because different Active Directory domains may have groups with the same name. When you work with Active Directory, you may also need to specify the fully qualified domain name for a group. Group Types • • Local groups o Groups that are defined on a local computer. o Local groups are used on the local computer only. o You create local groups with the Local Users And Groups utility. Security groups o You define security groups in domains using Active Directory Users And Computers. • Distribution groups o Groups that are used as e-mail distribution lists. o They can't have security descriptors associated with them. o You define distribution groups in domains using Active Directory Users And Computers. 10 RTECH-INDIA SUB : NMA Q.8 Explain Map Drive. Folder of hard disk drive are configure for sharing them in network or LAN is called map drive Z,X,Y etc letter used for them Step o Right click on my computer icon o Click on map network drive from pop up menu o Select folder for share o Select letter o Click on OK Q.9 What is Network security? List and explain different types of them. “Network security is technical which prevent our computer networking from unauthorized data or user access”. Network security uses the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs. o Authentication We have to use the user name and password for access the account, so other people can not see our data o Encryption It is the technique using them the plain text can convert in to chipper text using key. It means our data convert into code word so other people can not read that data o Anti virus software It is the one type of software using them we can protect from virus o Firewall It is the tool which prevent the incoming or out going data which are thread with some harmful effect. 11