Sei sulla pagina 1di 17

Q) What is TCP/IP?

(Transmission Control protocol )

• Transmission Control Protocol/Internet Protocol A protocol for communication


between computers, used as a standard for transmitting data over networks and as
the basis for standard Internet protocols.
www.mcmaster.ca/cis/ctl/glossary.htm
• "Transmission control protocol/Internet protocol." TCP/IP is a combined set of
protocols that perform the transfers of data between two computers.
www.wgcu.org/watch/hdtv_glossaryofterms.html
• A suite of communication protocols used on the Internet and other networks. It
stands for Transmission Control Protocol / Internet Protocol.
www.mumbaicyber.com/glossary_terms_temiote_scope_networl.asp
• (Transmission Control Protocol/Internet Protocol) -- The suite of protocols that
defines the internet. TCP/IP software is available for every major kind of
computer operating system.
www.acconnect.com/CustService/glossary.asp
• Transmission Control Protocol/Internet Protocol. The protocols that are the basis
for transmitting and routing data packets on the Internet. The Internet Protocol is
the one thing that all current Internet sites have in common.
www.emba.uvm.edu/util/html/definitions.php
• Transmission Control Protocol/Internet Protocol, a set of rules that establish the
method with which data is transmitted over the Internet between two computers.
TIFF
archive.ncsa.uiuc.edu/SDG/Software/Mosaic/Glossary/GlossaryDL.html
• Transmission Control Protocol/Internet Protocol - the suite of communications
protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the
two main ones being TCP and IPP. TCP/IP is built into the UNIX operating
system and is used by the Internet, making it the de facto standard for transmitting
data over networks. Even network operating systems that have their own
protocols, such as Netware, also support TCP/IP
www.constellationnetcorp.com/definitions.htm
• the name for the suite of protocols and services used to manage network
communications and applications over the Internet.
www.lanw.com/books/html4dum/h4d2e/glos-t.htm
• A suite of network protocols that allow computers with different architectures and
operating system software to communicate with other computers on the Internet.
www.e-formation.co.nz/glossary.asp
• Transmission Control Protocol/Internet Protocol. Common name for the suite of
protocols developed by the US Dept. of Defense in the 1970s to support the
construction of worldwide internetworks. TCP and IP are the two best-known
protocols in the suite.
www.cme.com/edu/course/resources/glossary.html
• (Transmission Control Protocol/Internet Protocol). A set of protocols that make
TELNET, FTP, e-mail, and other services possible among computers those aren’t
on the same network.
www.7designavenue.com/glossary.htm
• A communications subsystem that allows you to set up local area and wide area
networks.
publib16.boulder.ibm.com/pseries/en_US/aixins/insgdrf/glossary.htm
• Transmission Control Protocol/Internet Protocol (TCP/IP is the basic
communication language or protocol of the Internet.
www.matrikonopc.com/resources/dictionary.asp
• The communication protocol used on the Internet.
www.infopage.net/myspace/internet/isdn-j/isdnjargonbuster.html
• Transmission Control Protocol/Internet Protocol (TCP/IP) is the basic
communication protocol of the Internet. It can also be used as a communications
protocol in a private network.
www.agimo.gov.au/publications/2003/08/framework/glossary
• Transmission Control Protocol/Internet Protocol: This is common shorthand,
which refers to the suite of application, and transport protocols, which run over
IP. These include FTP, Telnet, SMTP, and UDP (a transport layer protocol).
www.virtualschool.edu/mon/Internet/GlossaryInternetTerms.html
• (Transmission Control Protocol/Internet Protocol) -- This is the suite of protocols
that defines the Internet. Originally designed for the UNIX operating system,
TCP/IP software is now available for every major kind of computer operating
system. To be truly on the Internet, your computer must have TCP/IP software.
www.iwi.com.sg/services/webhosting/terms.asp
• A set of protocols used by the Internet to support such services as file transfer
(FTP), electronic mail transfer (SMTP), and remote login (Telnet).
www.btinternet.com/~mbohan/phantasy/jargont.htm
• The underlying technology behind the Internet and communications between
computers in a network. The first part, TCP, is the transport part, which matches
the size of the messages on either end or guarantees that the correct message has
been received. The IP part is the user's computer address on a network. Every
computer in a TCP/IP network has its own IP address that is either dynamically
assigned at startup or permanently assigned. All TCP/IP messages contain the
address of the destination network as well as the address of the destination station.
This enables TCP/IP messages to be
www.voiceanddata.com.au/vd/admin/glossary.asp
• Transmission Control Protocol/Internet Protocol.
bwcecom.belden.com/college/Cable101/data%20glossary.HTM
• Transmission Control Protocol based on IP. This is an Internet protocol that
provides for the reliable delivery of streams of data from one host to another.
www.informatik.uni-freiburg.de/Java/manpages/glossary.html
• Transmission Control Protocol and Internet Protocol. These are the standards that
govern transmission of data among computer systems. They are the foundation of
the Internet. IP is a way of saying "send these next 1000 bits from Computer A to
Computer B". TCP is a way of saying "send this stream of data reliably between
Computer A and Computer B" (it is built on top of IP). TCP/IP is a beautiful
engineering achievement, documented beautifully in TCP/IP Illustrated, Volume
1 (W. Richard Stevens 1994; Addison-Wesley).
philip.greenspun.com/panda/glossary
• Transmission Control Protocol over Internet Protocol. These are two transmission
protocols that work together to help the servers, clients and devices on the
network talk to one another. FTP, HTTP, UDP, SNMP, and telnet run on top of
TCP/IP.
www.loadbalancing.net/glossary.html
• Transmission Control Protocol/Internet Protocol, the suite of communications
protocols used to connect hosts on the Internet.
www.ionet.co.za/glossary.asp
• Commonly used network communications protocol.
board-web.lausd.k12.ca.us/help/glossary.htm
• transmission control protocol/internet protocol: a set of protocols (including TCP)
developed for the internet in the 1970s to get data from one network device to
another
wordnet.princeton.edu/perl/webwn
• The Internet protocol suite is the set of communications protocols that implement
the protocol stack on which the Internet runs. It is sometimes called the TCP/IP
protocol suite, after the two most important protocols in it: the Transmission
Control Protocol (TCP) and the Internet Protocol (IP), which were also the first
two defined.
en.wikipedia.org/wiki/TCP/IP

Q) What are different classes of IP addresses.(5Classes)

Every machine on the Internet has a unique identifying number, called an IP Address. A
typical IP address looks like this:

• 216.27.61.137

To make it easier for us humans to remember, IP addresses are normally expressed in


decimal format as a "dotted decimal number" like the one above. But computers
communicate in binary form. Look at the same IP address in binary:

• 11011000.00011011.00111101.10001001

The four numbers in an IP address are called octets, because they each have eight
positions when viewed in binary form. If you add all the positions together, you get 32,
which is why IP addresses are considered 32-bit numbers. Since each of the eight
positions can have two different states (1 or 0) the total number of possible combinations
per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine
the four octets and you get 232 or a possible 4,294,967,296 unique values!

Out of the almost 4.3 billion possible combinations, certain values are restricted from use
as typical IP addresses. For example, the IP address 0.0.0.0 is reserved for the default
network and the address 255.255.255.255 is used for broadcasts.
The octets serve a purpose other than simply separating the numbers. They are used to
create classes of IP addresses that can be assigned to a particular business, government or
other entity based on size and need. The octets are split into two sections: Net and Host.
The Net section always contains the first octet. It is used to identify the network that a
computer belongs to. Host (sometimes referred to as Node) identifies the actual computer
on the network. The Host section always contains the last octet. There are five IP classes
plus certain special addresses:

• Default Network - The IP address of 0.0.0.0 is used for the default network.
• Class A - This class is for very large networks, such as a major international
company might have. IP addresses with a first octet from 1 to 126 are part of this
class. The other three octets are used to identify each host. This means that there
are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total
of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of
the total available IP addresses. In Class A networks, the high order bit value (the
very first binary number) in the first octet is always 0.

Net Host or Node


115. 24.53.107
• Loopback - The IP address 127.0.0.1 is used as the loopback address. This means
that it is used by the host computer to send a message back to itself. It is
commonly used for troubleshooting and network testing.
• Class B - Class B is used for medium-sized networks. A good example is a large
college campus. IP addresses with a first octet from 128 to 191 are part of this
class. Class B addresses also include the second octet as part of the Net identifier.
The other two octets are used to identify each host. This means that there are
16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total
of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter
of the total available IP addresses. Class B networks have a first bit value of 1 and
a second bit value of 0 in the first octet.

Net Host or Node


145.24. 53.107
• Class C - Class C addresses are commonly used for small to mid-size businesses.
IP addresses with a first octet from 192 to 223 are part of this class. Class C
addresses also include the second and third octets as part of the Net identifier. The
last octet is used to identify each host. This means that there are 2,097,152 (221)
Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912
(229) unique IP addresses. Class C networks make up an eighth of the total
available IP addresses. Class C networks have a first bit value of 1, second bit
value of 1 and a third bit value of 0 in the first octet.

Net Host or Node


195.24.53. 107
• Class D - Used for multicasts, Class D is slightly different from the first three
classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and
fourth bit value of 0. The other 28 bits are used to identify the group of computers
the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or
228) of the available IP addresses.

Net Host or Node


224. 24.53.107
• Class E - Class E is used for experimental purposes only. Like Class D, it is
different from the first three classes. It has a first bit value of 1, second bit value
of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to
identify the group of computers the multicast message is intended for. Class E
accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net Host or Node


240. 24.53.107
• Broadcast - Messages that are intended for all computers on a network are sent as
broadcasts. These messages always use the IP address 255.255.255.255.

Q) What would you do if your client is not being able to connect to the net?

Ans: Troubleshooting based on the connection type

Q) What is a DNS (Domain Name Services) how does it differ from a DHCP?

Definitions of DNS on the Web:

• Domain Name Server (or system) – An Internet service that translates domain
names into IP addresses.
www.lsoft.com/resources/glossary.asp
• (Domain Name System) The Domain Name System is the system that translates
Internet domain names into IP numbers. A "DNS Server" is a server that performs
this kind of translation.
www.unitedyellowpages.com/internet/terminology.html
• DNS stands for Domain Name System. This System translates a domain name
such as rshweb.com into the Internet Protocol (IP) numbers (209.203.234.42) to
find the correct web site - in this case the site for Domain Bank. The network of
computers that constitute the Internet map domain names to their corresponding
IP numbers. The data is then made available to all computers and users on the
Internet.
domain.rshweb.com/glossary.html
• a general-purpose distributed, replicated, data query service chiefly used on
Internet for translating hostnames into Internet addresses.
www.eos.ncsu.edu/guide/glossary.html
• The worldwide system which regulates Internet host names. Each host must have
a unique name. Top-level domains in the United States include .com, .edu,
.gov, .net, and .org. Two letter country codes such as .se (Sweden) and .ca
(Canada) are used for other countries. Some US sites also have a state and country
designation, such as .fl.us. See also domain name.
faculty.valencia.cc.fl.us/jdelisle/lis2004/glossary.htm
• Domain Name System. The DNS is a general purpose distributed, replicated, data
query service. The principal use is the lookup of host IP addresses based on host
names. The style of host names now used in the Internet is called "domain name".
which offers a means of mapping an easy to remember name to an Internet
Protocol number.*
www.internetstudies.org/networks/members/craimct/thesis/section10.htm
• Short for Domain Name System (or Service), an Internet service that translates
domain names into IP addresses. Because domain names are alphabetic, they're
easier to remember. The Internet however, is really based on IP addresses. Every
time you use a domain name, therefore, a DNS service must translate the name
into the corresponding IP address.
home.clevertech.net/help.asp
• Domain Name Server. The local server (in a company) or remote server (at your
provider) that resolves domain names in IP addresses.
webmaster.lycos.co.uk/glossary/D/
• Domain Name System: A system of servers located throughout the Internet that
handle Internet connections and the routing of email.
www.verio.com/support/files/glossary.cfm
• Directory Name Service, is a TCP/IP based name resolution service. It is used to
resolve a host name to its associated IP address.
www.greencomputer.com/solutions/glossary.shtml
• Domain Name Server, a program running on a server which automatically
translates domain names from http://www.afterzed.com/ into their correct TCP/IP
addresses, eg 65.108.17.93.
www.afterzed.com/dictionary/
• The domain name system (DNS) is the way that Internet domain names are
located and translated into Internet Protocol addresses. A domain name is a
meaningful and easy-to-remember "handle" for an Internet address.
oit.montclair.edu/distanceed/glossary.html
• Domain Name System
www.auda.org.au/glossary.php
• Domain Name System. This is the way in which the network turns a host or
Internet domain (eg, sq.com) into an Internet IP address for use with TCP/IP.
web.mit.edu/hotmetal_v2.0/www/Chapter14.html
• The DNS is a general purpose distributed, replicated, data query service. The
principal use is the lookup of host IP addresses based on host names. The style of
host names now used in the Internet is called "domain name", because they are the
style of names used to look up anything in the DNS. Some important domains are:
.COM (commercial), .EDU (educational), .NET (network operations), .GOV (US
government), and .MIL (US military). Most countries also have a domain. For
example, .US (United States), .UK (United Kingdom), .AU (Australia).
www.rage.co.uk/services_network_glossary.htm
• Domain Name Server. Specific software that runs on a server and resolves
domain names to actual IP addresses. Nodes communicate with each other using
IP addresses rather than domain names, though users may never see the actual IP
addresses being used.
www.7designavenue.com/glossary.htm
• DNS stands for Domain Name Service. DNS servers translate names, such as
"yourname.com" into the numeric IP address that the Internet uses to send and
receive information. Most ISPs and companies run their own DNS servers, and
there are thousands of them on the Internet.
www.noip.com/geekterms.php
• Domain Name Service.
www.proxicast.com/support/glossary.htm
• Short for Domain Name System which is used to translate numeric addresses
(known as IP, or Internet Protocol, addresses) into words.
www.brainpulse.com/domain_name_registration_india/domain_name_glossary.p
hp
• SEPA - DETERMINATION OF NON-SIGNIFICANCE is issued (complete)
www6.metrokc.gov/ddes/scripts/perminfo.cfm
• Domain Name System: A mechanism used in the Internet for translating names of
host computers into addresses. The DNS also allows host computers not directly
on the Internet to have registered names in the same style.
www.virtualschool.edu/mon/Internet/GlossaryInternetTerms.html
• (Domain Name System)- The system by which Internet domain names (such as
indra.com) are identified and translated into numerical IP addresses (such as
209.169.0.1). DNS servers maintain databases of domain names and their
corresponding IP addresses and communicate this information with other DNS
servers across the Internet.
www.indra.com/support/glossary.html
• An acronym for Domain Name Server, DNS refers to a database of Internet
names and addresses which translates the names to the official Internet Protocol
numbers and vice versa.
www.webmage.com/support/glossary.asp
• A Domain Name Server (DNS) resolves domain names to their equivalent IP
addresses so that IP traffic can be transported to the correct destination. Each
Domain Name (ie, informationweek.com) is associated, at a minimum, with a
Primary and a Secondary DNS. Domain Name Servers are located throughout the
Internet. Many ISP's maintain their own DNS servers to reduce their use of
bandwidth. Occasionally, these local DNS become out of date and lead to browser
errors.
www.loadbalancing.net/glossary.html
• Domain Name System. A database system that translates an IP address into a
domain name. For example, a numeric address like 232.452.120.54 can become
something like xyz.com
www.startech.com/glossary/glossary.cfm
• The Domain Name System or DNS is a system that stores information about host
names and domain names in a kind of distributed database on networks, such as
the Internet. Most importantly, it provides an IP address for each host name, and
lists the mail exchange servers accepting e-mail for each domain.
en.wikipedia.org/wiki/DNS

Q) What is the difference between FAT32 & NTFS?

FAT16 is the original file system used in DOS and Windows 3.x, and was originally only
designed for use on relatively small partitions. It's been revised so that it's possible to
make a FAT16 partition up to 4GB in size, but no more than that. FAT32 is a revised
version of FAT16 that can be used to create much larger partitions and has native support
for long filenames, and was introduced with Win98. Both FAT16 and FAT32 are also
backwards- and cross-compatible with older versions of Windows and other OSes.
However, both FAT16 and FAT32 suffer from many drawbacks: they have weak error
recovery and no built-in file security, just to name two. NTFS, which was introduced
with Windows NT, is much more secure and robust than FAT16 or FAT32, and offers
better recovery from errors. NTFS is now offered on Windows 2000, Windows XP and
Windows 2003 Server, although all of the above OS's can also use FAT16 or FAT32. It's
generally recommended that NTFS be used except when backwards compatibility is
urgently needed.

Q) What would system restore do? Technically what would it do?

System restore is a new feature in Windows versions after and including Windows ME
(which includes ME, XP, 2000). This feature of Windows allows the user to revert the
system back to a previous state. Several reasons of doing this might be because they were
attacked by a virus and wish to revert to a state without the virus, or they have problems
such as a corrupted registry, etc.

Q) What is Primary Domain Controller?

• This is the server that is the master of the domain. It is responsible for holding the
main security accounts for the entire domain. It also will replicate the accounts
across the entire domain on any Backup Domain Controller(s).
www.ntsecrets.com/info/definitions.htm
• The server at which the master copy of a domain's user accounts database is
maintained. The primary domain controller also validates logon requests. A LAN
Manager term.
www.acc-net.com/Kahuna/glossaryP.htm
• A Primary Domain Controller (PDC) is a server computer in a pre-Windows 2000
NT server Domain. A domain is a concept used in NT server operating systems
whereby a user may be granted access to a number of computer resources with the
use of a single username and password combination.
en.wikipedia.org/wiki/Primary_Domain_Controller
Q) What would a Proxy Server do?

• Where a high level of security of required, a proxy Web server may be used to
provide a gateway between a local area network and the Internet. The local
network is protected by firewall software installed on the proxy server. This
software enables the proxy server to keep the two worlds separate. All outward
HTTP requests from the local network pass through the proxy server and similarly
all information retrieved comes back in via the proxy server and is then passed
back to the client. Using the options or preferences, Web browsers can be
configured to point to the proxy
www.terena.nl/library/gnrt/appendix/glossary.html
• A technique used to cache information on a Web server and acts as an
intermediary between a Web client and that Web server. This is common for an
ISP especially if they have a slow link to the Internet. Proxy servers are also
constructs that allow direct Internet access from behind a firewall. They open a
socket on the server, and allow communication via that socket to the Internet. For
example, if your computer is inside a protected network, and you want to browse
the Web using Netscape, you would set up a proxy server on a firewall.
www.7designavenue.com/glossary.htm
• A proxy server is a server that acts as an intermediary between a computer and the
Internet, and that ensures security, administrative control, and caching. Caching
speeds up Internet access. If one or more Internet sites are frequently requested,
they are kept in the proxy's cache, so that when a user requests them, they are
delivered directly from the proxy's cache instead of from the original Internet site.
www1.sympatico.ca/help/Glossary/p.html
• Also called a "proxy" or "application level gateway," it is an application between
the connection between sender and receiver. All input is forwarded out a different
port, closing a straight path between two networks and preventing a cracker from
obtaining internal addresses and details of a private network. Streamiums used on
a business network will often need to use the proxy settings configuration.
www.streamium.com/support/glossary.cfm
• ** A server that sits between a client application, such as a Web browser, and a
real server. It intercepts all requests to the real server to see if it can fulfill the
requests itself. If not, it forwards the request to the real server. Proxy servers have
two main purposes:
www.infowest.com/Support/FAQ/Glossary
• A server that receives requests intended for another server and that acts on the
behalf of the client behalf (as the client proxy) to obtain the requested service. A
proxy server is often used when the client and the server are incompatible for
direct connection. For example, the client is unable to meet the security
authentication requirements of the server but should be permitted some services.
www.sabc.co.za/manual/ibm/9agloss.htm
• An Internet server that acts as a firewall, mediating traffic between a protected
network and the Internet.
website.armmnet.net/faq/glossary.html
• In an enterprise that uses the Internet, a proxy server is a server that acts as an
intermediary between a workstation user and the Internet so that the enterprise can
ensure security, administrative control, and caching service. A proxy server is
associated with or part of a gateway server that separates the enterprise network
from the outside network and a firewall server that protects the enterprise network
from outside intrusion.
www.iptv.org/digital/dictionary_internet.cfm
• a combination of software and hardware, which acts as an intermediary between a
set of users and the Internet, allowing authorized users to access many electronic
resources available through the UNC library web pages from home.
www.lib.unc.edu/instruct/distance/glossary/
• A gateway between the Handle System and HTTP which enables resolution of a
DOI in the URL http:// syntax (eg doi:10.123/456 would be resolved from the
address: http://dx.doi.org/10.123/456). Any standard browser encountering a DOI
in this form will be able to resolve it without the need to extend the web browsers
capability, unlike the use of the native resolver. The use of the proxy server and
an unextended browser provides the more common user interface to the DOI
today. The core DOI resolution service is used by the proxy but is not constrained
www.doi.org/handbook_2000/glossary.html
• If you have a firewall at your site, you can't normally connect directly to a server
on the Internet. You need an agent, a proxy server running on the firewall, to
make the connection for you. To you, inside the firewall, it pretends to be the
server that you're attempting to connect to; on the outside, it pretends to be the
client, and talks to the real server, thus letting you talk to a server outside the
firewall (or vice versa).
web.mit.edu/hotmetal_v2.0/www/Chapter14.html
• An intermediary server that accepts requests from clients and forwards them to
other proxy servers, the origin server, or services.
www.cachepilot.com/Glossary/index.asp
• A proxy server is used to provide additional security between a computer and the
Internet often used in conjunction with a firewall.
www.tiaa-cref.org/help/glossary.html
• A proxy server is a computer used on some corporate networks. It is used for all
World Wide Web traffic, such as the viewing of Web pages. It can be used for the
filtering of Web sites to prevent people from going to certain types of sites, but
more commonly it is used on networks where there is not a direct connection to
the Internet available for all computers (or where a direct connection would be too
expensive). A proxy server can be thought of as a device that is similar to a
telephone switchboard for Web pages.
www.wayport.net/support/glossary
• Common Internet connection type. Proxy servers connect clients and destination
servers. A proxy server works as an application and it is adapted for several
application protocols (ie HTTP, FTP, Gopher, etc.). It is primarily used to
facilitate Internet communication for private networks and to monitor and control
Web traffic.
www.kerio.com.br/manuais/kwf/go01.html
• Hardware that is located between a client and a network server. Proxy servers
filter requests that enter a network and improve performance by fulfilling small
requests before they are sent to the network server.
www.epa.gov/cdx/about/glossary.htm
• A Proxy Server sits in between a Client and the "real" Server that a Client is
trying to use. Client's are sometimes configured to use a Proxy Server, usually an
HTTP server. The clients makes all of it's requests from the Proxy Server, which
then makes requests from the "real" server and passes the result back to the Client.
Sometimes the Proxy server will store the results and give a stored result instead
of making a new one (to reduce use of a Network). Proxy servers are commonly
established on Local Area Networks
www.unitedyellowpages.com/internet/terminology.html
• A proxy server acts as a go-between, converting information from Web servers
into HTML to be delivered to a client computer. It also provides a way to deliver
network services to computers on a secure subnet without those computers
needing to have direct access to the World Wide Web. Thus, secure sites can run
a proxy server on their firewall computer. See also Firewall.
ism01.west.asu.edu/ISM411Carey/notes/glossary.html
• An "in betweener" for the user making a request, and the host supplying the
response. Proxy servers are most commonly set up on local area networks. Proxy
servers can speed surfing by keeping local "cached" copies of frequently
requested websites; however, these copies may be out of date on constantly
updated sites.
getit.rutgers.edu/tutorials/web_glossary/
• The Library's proxy server is a computer interface that enables members of the
Princeton University community to access licensed electronic resources, when
connecting to the Internet from outside the princeton.edu domain. To make use of
the proxy server, a few setting must be changed in the web browser being used.
www.princeton.edu/~sbwhite/wr177LT.html
• A program that acts as a liaison between a workstation and a web server. A proxy
server caches information to provide faster access to web pages and increase
network security.
https://iomega-eu-en.custhelp.com/cgi-
bin/iomega_eu_en.cfg/php/enduser/std_adp.php
• A server that sits between a client application (such as a browser) and a "real"
server. The proxy server intercepts client requests and forwards them to the other
server. Its purpose is two-fold: for outgoing traffic, it allows private, non-routable
machines to reach a machine which can reach the Internet for them. Secondly, as
it receives responses to the client machine requests (for example, Web pages) it
can cache them locally so that further client requests can be answered locally and
immediately. Use of the Firebox removes the need for a proxy server, unless the
proxy server is
www.watchguard.com/glossary/p.asp
• A nearby server computer (near whoever is using it, that is) on the Web which
holds Web pages that have been recently downloaded, particularly from overseas
sites. When those pages are again requested by the same or another nearby user,
they are retrieved from the proxy server rather than going all the way back to the
original source. This saves time and cable use, but has the risk of delivering
slightly out-of-date pages. The process is generally invisible to the user.
www.techwriter.co.nz/nerd-ns.html
• A server that sits between a client application, such as a web browser, and a real
server, containing the data to which the user requires access. It intercepts all
requests to the main server. The function of the library proxy server is to allow
remote web access to databases restricted by license to specific sets of users. The
proxy server requires that the user provide some kind of authentication ( usually a
user ID and password), before permitting access to the main server containing the
restricted access files.
www.cariboo.bc.ca/library/guides/glossary.html
• A proxy server is a computer that does two things: it authenticates users and it
allows authenticated users access to resources not available to the general public.
www.stthomas.edu/libraries/guides/e_guide/glossaryrev.htm
• A proxy server is a computer network service which allows clients to make
indirect network connections to other network services. A client connects to the
proxy server, then requests a connection, file, or other resource available on a
different server. The proxy provides the resource, possibly by connecting to the
specified server, or by serving it from a cache. In some cases, the proxy may alter
the client's request or the server's response for various purposes.
en.wikipedia.org/wiki/Proxy_server

Q) What is the name for the port used for modem? (parallel/Serial)

Serial

Q) What is the specification for the modem pin?

Modem Specifications

The International Telegraphic Union (ITU), Defines the standards. The 'V.xx' is the spec
number, the title is in bold, a description in plan text. The term 'bis' refers to the 2nd
version

V.13: Simulated half-duplex (switched-carrier) control.

V.17: A 2-wire modem for facsimile applications with rates up to 14 400 bit/s

V.21: 300 bits per second duplex modem standardized for use in the general switched
telephone network

V.22: 1200 bits per second duplex modem standardized for use in the general switched
telephone network and on point-to-point 2-wire leased telephone-type circuits:
Synchronous/asynchronous data transmission, full duplex over 2-wires, 1200bps.
V.22bis: 2400 bits per second duplex modem using the frequency division technique
standardized for use on the general switched telephone network and on point-to-point 2-
wire leased telephone-type circuits

V.26bis: 2400/1200 bits per second modem standardized for use in the general switched
telephone network

V.32: A family of 2-wire, duplex modems operating at data signalling rates of up to 9600
bit/s for use on the general switched telephone network and on leased telephone-type
circuits: Synchronous/asynchronous data transmission, full duplex over 2-wires, 9600bps
(fallback to 4800bps).

V.32bis: A duplex modem operating at data signalling rates of up to 14 400 bit/s for use
on the general switched telephone network and on leased point-to-point 2-wire telephone-
type circuits: Synchronous/asynchronous data transmission, full duplex over 2-wires,
14.4kbps, 12kbps,9600bps, 7200bps, 4800bps.

V.33: Synchronous data transmission, full duplex over 4-wires, 14.4kbps, 12kbps.

V.34: Synchronous/asynchronous data transmission, full duplex over 2-wires (2/4 lines,
leased), 28.8kbps.

V.34+: A modem operating at data signalling rates of up to 33 600 bit/s for use on the
general switched telephone network and on leased point-to-point 2-wire telephone-type
circuits: Synchronous/asynchronous data transmission, full duplex over 2-wires (2/4
lines, leased), 33.6kbps

V.90: A digital modem and analogue modem pair for use on the Public Switched
Telephone Network (PSTN) at data signalling rates of up to 56 000 bit/s downstream and
up to 33 600 bit/s upstream: (56K) Synchronous/asynchronous data transmission, full
duplex over 2-wires, 56kbps. The V90 uses Pulse Code Modulation (PCM).

V.91: A digital modem operating at data signalling rates of up to 64 000 bit/s for use on a
4-wire circuit switched connection and on leased point-to-point 4-wire digital circuits

Q) What’s a ‘tracert’ command for

traceroute is a TCP/IP utility which allows the user to determine the route packets take to
reach a particular host. traceroute works by increasing the "time to live" value of each
successive packet sent. The first packet has a TTL value of one, the second two, and so
on. When a packet passes through a host, the host decrements the TTL value by one and
forwards the packet to the next host. When a packet with a TTL of one reaches a host, the
host discards the packet and sends an ICMP time exceede
Q) What are the basic differences between a router and a switch? (Router is an
intelligent Switch)

Definition: Routers are physical devices that join multiple wired or wireless networks
together. Technically, a wired or wireless router is a Layer 3 gateway, meaning that the
wired/wireless router connects networks (as gateways do), and that the router operates at
the network layer of the OSI model.

By maintaining configuration information in a piece of storage called the "routing table,"


wired or wireless routers also have the ability to filter traffic, either incoming or
outgoing, based on the IP addresses of senders and receivers.

Some routers allow the home networker to update the routing table from a Web browser
interface. Broadband routers combine the functions of a router with those of a network
switch and a firewall in a single unit.

Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being
the most common OSI network layer protocol. An IP router such as a DSL or cable
modem broadband router joins the home's local area network (LAN) to the wide-area
network (WAN) of the Internet.

Definition: A network switch is a small device that joins multiple computers together at a
low-level network protocol layer. Technically, network switches operate at layer two
(Data Link Layer) of the OSI model.

Network switches look nearly identical to hubs, but a switch generally contains more
"intelligence" (and a slightly higher price tag) than a hub. Unlike hubs, network switches
are capable of inspecting the data packets as they are received, determining the source
and destination device of that packet, and forwarding that packet appropriately. By
delivering messages only to the connected device that it was intended for, network
switches conserve network bandwidth and offer generally better performance than hubs.

As with hubs, Ethernet network switches are the most common. A network switch offers
differing port configurations starting with the four- and five-port models, and support 10
Mbps Ethernet, 100 Mbps Ethernet, or both.

Definition: A hub is a small, simple, inexpensive network device that joins multiple
computers together.

Most hubs manufactured today support the Ethernet standard. Non-Ethernet hubs (Token
Ring, for example) also exist, but Ethernet is always used in home networking.
Technically speaking, hubs operate as Layer 2 devices in the OSI model.
To join a group of computers with an Ethernet hub, one connects an Ethernet cable (that
has an RJ-45 connector attached) into the hub, then connect the other end of the cable
each computer's network interface card (NIC). Hubs also require external power and can
be connected to other hubs, switches, or routers.

One good way to differentiate between Ethernet hubs is by the speed (data rate) they
support.

The most basic Ethernet hubs support 10 Mbps speeds. Newer hubs support 100 Mbps
Ethernet. To help users move ahead to the newer technology while still supporting the
old, some hubs support both 10 Mbps and 100 Mbps data rates. These are so-called
"dual-speed" or "10/100" hubs.

A common differentiator in hubs is the number of ports they support. Four- and five-port
hubs are most common in home networks, but eight- and 16-port hubs can be found in
some home and small office environments.

Q) Modem/Telephone – RJ45 Ethernet – RJ11?

• Registered Jack-45, an eight-wire connector used to connect computers onto a


local-area networks (LAN), especially Ethernets. RJ-45 connectors look similar to
the RJ-11 connectors used for connecting telephone equipment, but they are a bit
wider.
www.startech.com/glossary/glossary.cfm
• is an outlet jack with 8 wire connections. An RJ45 jack in a home is used for
phone or data service.
www.homedirector.com/glossary.php3
• Registered Jack 45. A generic connector used in structured cabling systems.
www.networkingsolutions.co.uk/acatalog/gl.html
• The type of connector used to terminate Cat 5 patch leads which connect Ethernet
devices together.
www.netprobity.co.uk/Glossary.htm
• Registered Jack number 45. 8 pin plug and socket
www.opticalfibresuk.com/glossery_of_terms.htm
• An 8 pin connector used for data transmission over standard copper telephone
cable.
sun2.lenoir.cc.nc.us/~disted/distermc.htm
• The 8-pin plug and socket type used for ISDN termination with Q.931. The
international standard is ISO/IS 8877 (1987)
www.dupre.co.uk/jargon.asp
• Common name for an eight pin connector often used for ISDN interfaces.
www.metrodata.co.uk/technical_services/glossaries/videoglossary.htm
• RJ-45 (Registered Jack - Type 45) is a physical interface often used for
terminating twisted pair type cables. "RJ" stands for Registered Jack which is part
of the United States Code of Federal Regulations. It has eight "pins" or electrical
connections.
en.wikipedia.org/wiki/Rj45
• RJ11 is a standard phone outlet jack with 4 wire connections.
www.homedirector.com/glossary.php3
• Registered Jack number 11. Small line plug and socket used on telephone
handsets and modem connections
www.opticalfibresuk.com/glossery_of_terms.htm
• A 4 pin connector used for voice and/or data transmission over standard copper
telephone cable.
sun2.lenoir.cc.nc.us/~disted/distermc.htm
• RJ-11 is a physical interface often used for terminating twisted pair type cables.
RJ stands for Registered Jack which is part of the United States Code of Federal
Regulations. It has six pins or electrical connections.
en.wikipedia.org/wiki/RJ11

Q) What’s the basic difference between Static & Dynamic IP address?

IP address is a 32-bit number that identifies each client or server on the Internet. This
definition is based on the current version 4 of the Internet Protocol (IP). Each packet sent
across the Internet includes the sender's and receiver's IP addresses in order to route the
packets correctly. You can think of it as the Internet equivalent of a phone number where
you can be reached.

Dynamic IP addresses change each time you connect to the Internet, while static IP
addresses are reserved for you statically and don't change over time.

Residential Internet connections, whether broadband or dialup usually use dynamic IP


addresses, while commercial leased lines and servers have static IPs, so they can always
be reached at the same address.

The need for dynamic IP addresses arises from the limited number of IP addresses
available in IPv4 (Internet Protocol version 4). Theoretically, there can be about four
billion IPs in the Internet, however, the actual number is much lower for various reasons.
Something had to be done to ensure supply of address space, at least until IPv6 is widely
implemented on the Internet, allowing for 128bit IP addresses. The limited IP address
space is one of the reasons for the wide use of NAT routers, as well as DHCP and leasing
of dynamic IP addresses.

With dynamic IP addressing, there is a pool of IPs that your ISP can assign to users.
When you connect to the Internet, your computer is leased one IP address from that pool
for a number of hours. When you disconnect, or when the lease expires the IP address is
freed and put back into the pool of available IPs. That way, ISPs can have more
subscribers than number of IP addresses (as long as they don't all connect to the Internet
at the same time) and ease IP maintenance.
Even with always-on broadband connections, it's easy to just lease IP addresses as
needed. That's why the DHCP dynamic IP addressing is widely used today, especially for
residential connections where users don't run servers. The downside is, your IP address,
or "phone number" if you will, can change any time you get disconnected, there is a
power outage, ISP maintenance, etc. The fact that you get disconnected does not
necessarily mean the IP address is going to change, just as the fact that you get the same
IP address does not mean it is assigned statically.

Q) What’s the blue screen error in windows?

If there is any interruption happens at the time of anything which is getting execute blue
screen with error message comes up. This error occurs due to software as well as
hardware failure.

Potrebbero piacerti anche