Monday, August 12, 2013

How to Backup/Restore Internet Information Services using GUI or Command line for IIS 6 and IIS 7 ?

IS 6.0


The First method is by using GUI Mode

1) Open Internet Information services (IIS) Manager

IIS Console




















2) Right Click the server name and click on All Tasks and select Backup/RestoreConfiguration


IIS Backup All Task

















3) Click on Create Backup option to take backup
Create IIS Backup













4) Type the backup name in the Configuration Backup Name
Create IIS Backup using GUI













5) If you want to Encrypt/ Password Protect the backup file, Select the option: Encrypt backup using Password and provide password of your choice
Note: Remember the password to be used during restore.
Protect IIS backup File













6) Click on OK and you are done

7) While restoring the backup just select the Backup Name you want to restore and click on Restore option

8) The same way if you want to delete any existing backup, use Delete option
Add Backup Name













The second method to take IIS 6 backup is by using the command Line

1) Open a command prompt
2) Run the command as you see in the below example
Example command : Cscript.exe iisback.vbs /s /u Administrator /p  /backup /b NewBackupName

IIS6 backup command

Refer Microsoft official Document:  http://support.microsoft.com/kb/324277


IIS 7



First Method Using GUI

Unfortunately, by default GUI mode is not enable, to enable it follow the instructions in the below article


Second Method Using command
To backup IIS configuration:
%windir%\system32\inetsrv\appcmd.exe add backup "Backup-Name"

To restore that backup:
%windir%\system32\inetsrv\appcmd.exe restore backup "Backup-Name"

To delete a backup:
%windir%\system32\inetsrv\appcmd.exe delete backup “Backup-Name"

IIS 7  Backup command

IIS 7 Restore

Once the backup command is successful, the files can be verified in the default location C:\windows\system32\intersrv\backup\Backup-Name

IIS 7 backup/restore








Refer Microsoft official Document : http://technet.microsoft.com/en-us/library/dd819406.aspx 

Windows System Administrator Questions?


Windows Administrator Interview Questions


1. Q: What does Active Directory mean?

A: The active Directory means a service that identifies and handles resources, making them visible for different groups or members that are authorized. It has the role of an object store. The Active directory sees as objects workstations, people, servers devices or documents and they all have their own characteristics and access control list or ACL.
 2.Q: What is the meaning of Global Catalog?
A: A Global Catalog is something that each domain has, and it is used for authenticating the user on the network, on windows 2000 network logon’s were protected from failures by assigning a Global Catalog to every site.
 3.Q: What is the use for DHCP?
A: DHCP is used for the DHCP servers, personal computers can get their configuration from a DHCP server on an IP configuration. The server knows nothing about the personal computers until they make a request for information. Usually the most common information sent is IP address and DHCP is used to make a large network administration easier.
 4.Q: What does a Super Scope do in DHCP?
A: The Super Scope gives the DHCP server the possibility to have leases to multiple clients on the same physical network. The leases come from multiple scopes. All scopes must be defined using DHCP manager before the Super Scope creation and they are named member scopes. The DHCP problems can be resolved by the Super Scope in different ways like the following:
a) on a physical network like a LAN network where multiple logical IP networks exist Super Scope is very useful here. These types of networks are also named multinets.
b) there is also need for a Super Scope when the address pool for the current scope becomes empty and there is a need for new computers on the physical network.
c) when clients have to move on another scope.
d) when DHCP clients from the other side of the relay agents (BOOTP) or the network has many logical subnets.
e) when standard networks are limited to leasing addresses for the clients.
5.Q: How can we switch the roles in an Active Directory?
A: Switching or transferring roles in an Active Directory can be made with the use of Ntdsutil.exe.
 6.Q: What is the purpose of a Stub zone DNS?
A: The copy of a zone that has only the needed resources for finding the authoritative DNS servers in that specific zone (DNS= Domain Name Servers) is called a Stub zone. It also resolves names for DNS namespaces, thing required when names must be resolved from two different DNS namespaces. The Stub zone contains: the master server’s IP that is used for updating the Stub zone and the SOA (Start of Authority), the NS (name server) and the glue A delegated zone records.
 5.Q: What main file is used for Active Directory backup and how it is made?
A: Active Directory backup is made using NTbackup utility. The backup is made once with the system state and they are restored also together because they depend on each other. The system state has different components like:
a)    The registry
b)    Boot files or startup files (files required by the operating system to start).
c)    The component services
d)    The system volume or the SYSVOL folder this is a folder that contains files that are shared on a domain.
e)    The Active Directory
 6.Q: Does a windows administrator have to be critical?
A: Yes and I can explain how. A system administrator is responsible for an entire network which means he/she must take care of multiple things in the same time which is not an easy task. In order to achieve this, an administrator must have high organization skills and a high technical knowledge and he/she must prevent the problems from happening so that he/she won’t have to be forced to fix them.
 Complicated Windows System Administrator Interview Questions
 7.Q: In what way is forward lookup zone different from the reverse lookup zone in NDS?
A: There is one difference between these two: the forward lookup means name to IP and reverse lookup means IP to name.
 8.Q: As a system administrator can you make backup and recovery of data?
A: This is a responsibility that any system administrator must have assume as a basic skill. Of course there are many types of backup that can be made but all must be known for a successful career.
 9.Q: What is the meaning of DHCP and  what is the port used by it to work?
A: DHCP or Dynamic Host Configuration Protocol has the ability to assign an IP automatically, this is done in fact by the server and has a number range. When the system starts an IP is assigned automatically. The DHCP server has port number 68, while the client has 67.
 10.Q: Can you ensure an updated system all the time and perform market research?
A: Staying up-to-date is another strong point of a professional administrator, technology evolves and we must keep up with the flow, otherwise we can’t do our job in a professional way. Market research is the key to an up-to –date work.
 11.Q: Is it possible for a computer to be able to browse the internet without having a default gateway?
A: Yes it is as long as we use a public IP address. The gateway is required as a router or firewall when using an intranet address.
 12.Q: What are the advantages or disadvantages  of using DHCP?
A: The advantage is that the DHCP server configures all IP’s automatically and the disadvantage is that when you receive a new IP address the machine name remains the same because of its association with the IP. It’s not a real problem but when somebody tries to access the machine by its name it become one.
 13.Q: Are you familiar with monitoring?
A: Yes, monitoring is a base activity of a system administrator, he/she manages all the access rights and the server space, security of the user accounts is one of the most important things here. Also an administrator must make sure that the user’s activity doesn’t affect in any way the integrity of the server.
 14.Q: How can we create a SRV record in DNS?
A: To do this we must open the DNS then we must select the abc.local domain the right click and we must go to Other New Records and the SRV ( choose location).
 15.Q: In how much time are the security changes applied on the domain controllers?
A: Including policies for personal and public lockout, the changes apply immediately. The changes also include passwords and LSA or Local Security Authority.
 16.Q: What do you do if a an end user states that a file is gone?
A: Files are deleted constantly by end users but the backup can restore them. Anyhow before using the backup we must check if the user didn’t move the file by mistake in another place.
 Senior level Windows System Administrator Interview Questions
 17.Q: Where is the storage place of the environmental settings and documents from the roaming profile?
A: These documents and settings are deposited locally until the user’s log off, when they are moved into the shared folder from the server so the log on at a fresh system may take a while because of this.
 18.Q: What are the classes that we can find in the Active Directory of Windows Server 2003?
A: We can find:
a)    the abstract class which can be made to look like a template and create other templates, no matter if they are abstract, auxiliary or structural.
b)    the structural class is the important type of class that is made from multiple abstract classes or an existing structural class. They are the only ones that can make Active Directory objects.
c)    the auxiliary class is used as a replace for many attributes of a structural class, it is a list of attributes.
d)    The 88 class is used for objects classes that were defined before 1993 and it is not a common class, it doesn’t use abstract, structural or auxiliary classes.
 19.Q: When is a good time for creating a forest?
A: Certain companies that have different bases require different trees and separate namespaces. And unique names sometimes give birth to different identities of DNS. Also companies are sometimes acquired and get under other influences but the continuity must be preserved for the names.
 20.Q: Can you explain to us about you experience in the past regarding windows administration?
A: I have ten years of experience in this field, I was passionate about computers since childhood and I installed many operating systems at home and inside organizations including these versions of windows: 95, 98, 98 SE, NT, Millenium, 2000, 2003 Server, XP, Seven, Vista. I also managed these systems and performed maintenance, I worked with different applications from the windows environment.
 21.Q: How can you handle a situation in which for instance if you have an application that is not running on Windows 2003 because it’s older?
A: In this situation the application has to be started in the compatibility mode with a previously windows operating system. This is made by right clicking the application icon and choosing another Windows from the compatibility menu.
 22.Q: What is the meaning of Repadmin.exe from Windows Server 2008?
A: Repadmin.exe means Replication Diagnostics Tool and helps for the diagnostic of domain controllers in the Windows system. This tool is used by administrators to see the replication topology from the perspective of every domain controller. The active Directory forest can also be supervised by Repadmin.exe and replication problems can be tracked.
 23.Q: What difference can we find in the usage of CSVDE versus LDIFDE?
A: CSVDE and LDIFDE are both commands and are used for importing and exporting objects but they are different in the way that CSVDE uses the format CSV (Comma Separated Value) which is an Excel file for files and LDIFDE uses LDIF (LDAP Data Interchange Format) file type which can be viewed with a simple text editor. LDIFDE can be also used for editing or deleting objects unlike CSVDE.
 24.Q: What big differences exist between these two operating systems: Windows 2000 and Windows XP?
A: Windows 2000 has more capabilities than Windows XP especially regarding features like DHCP, Terminal Services or DNS. It has all the advantages for server usage. Windows 2000 is a little more professional than XP, but they are both coming with different versions for every user taste. While XP has Home version, Professional or Enterprise, Windows 2000 has Professional and Server editions. The Home version of XP comes with minimal features because the target clients are beginners.
 25.Q: What are the things that make Unix different from Windows?
A: The code loading runtime of Unix is different from the one that Windows has. We must become aware of how the system exactly works before we make a dynamically loading module. Unix has the shared objects with the .so extension that encapsulate lines of code that the programs will use and the functions names. These function names become the references of those functions  in the memory of the program when the file is combined with the program. In Windows the .dll file (dynamic-link library file) doesn’t have references and the code of the files does not link to the memory of the program but they get through a lookup table which points to data or functions. Unix has just one type of library file, with the .a extension and the code of many object file is contained within with the .o extension. When the link is created for a shared object file the definition of the identifier may not be found, so the object code from the library will be included.

Friday, July 26, 2013

Diffrence between Windows Server 2008 & 2008 R2.

Difference between Windows Server 2008 and Windows Server 2008 R2


Windows Server 2008
Windows Server 2008 R2
It is based on kernal version 6.0 ( the same of Windows Vista)
It is based on kernal version 6.1 ( the same of Windows 7)
 It use the same GUI introduced with Windows Vista
 It use the same new GUI introduced with Windows 7
Is for both 32 bit & 64-bit platforms
Is only for 64-bit platforms
Its Hyper V does not have that feature
Hyper-V provides a dynamic, reliable, and scalable virtualization platform combined with a single set of integrated management tools to manage both physical and virtual resources
Not available in Windows server 2008, It is only having Basic Remote desktop Services.
Microsoft RemoteFX,  introduces a new set of remote user-experience capabilities that enable a media-rich user environment for virtual and session-based desktops.
Normal Power Management Service
Enhanced Power Management services which save up to 18 % more power than previous verison.
Normal Data managemnet server
Enhanced Data Management server using File ClassificationInfrastructure (FCI)

How Indian Android Device Manufacturers are Fooling and Misleading You

How Indian Android Device Manufacturers are Fooling and Misleading You

poster How Indian Android Device Manufacturers are Fooling and Misleading You
Micromax Canvas 4, a mid-range smartphone is seeing hype and excitement comparable to the likes of multinational brands — perhaps for the first time for an Indian manufacturer. Promising specifications better than many high-end devices, it has led people into thinking that this company is offering much more value at much lesser price.
Which is wrong.
For a nation that has always been highly price-conscious, it’s very easy to mislead people by advertising the number of cores a phone or a tablet has.
Same goes for Lava, Karbonn, Intex, Spice and all other Indian manufacturers, which are having a dream run this year. From a meager handset market share of less than 3% in 2012, they now account for nearly 30% of it (source). This obviously could not have been possible without Android, which has been lately driving an explosion of budget smartphones and tablets.
Being an Android enthusiast for long, here are a few important tips from my side that you should keep in mind while you are looking for Android devices.

Too Good To Believe Hardware Specs

MediaTek How Indian Android Device Manufacturers are Fooling and Misleading You
CPU Cores and Clock Speed Mean Nothing
Unaware of how microprocessors work, the biggest misconception among the non tech-savvy crowd is that a device’s performance is measured by its number of CPU cores and the speed at which they’re clocked.
Thankfully, CPUs don’t work this way. A detailed explanation of their working is taught in colleges (I personally hate the subject which deals with this), but for the laymen — what actually matters is the architecture of the processor.
Think of CPU as a group of engineers working on some project. Each worker is a separate core. The amount of work done by the group does not depend on the quantity of the engineers, but on their skills as well as their speeds. A group of two highly skilled engineers can finish their assigned project faster than a group of four less skilled engineers working on the same project.
In a similar fashion, it’s totally possible for a dual-core CPU X to outperform a quad-core CPU Y.
Taking advantage of this unintelligence, manufacturers lure customers by releasing multi-core phones of mediocre architecture at 1/4th the price of high-end phones having the same number of cores. This leads people into believing that they’re providing the same level of performance at comparatively dirt-cheap rates.
Tip: Try to avoid CPUs of Cortex A-7 Architecture if Budget Allows
Almost all budget Android devices use CPUs made by MediaTek, a company known for its low cost semiconductor chips. And a majority of them utilize the Cortex A-7 architecture. If possible, avoid them as they are considerably slow and instead look for devices having Cortex A-9 CPUs.
A few new budget devices have started using A-9 CPUs indicating that companies can now afford to include them at low rates. Prefer them.
For instance, the recently launched Micromax Canvas 4 uses a quad-core Cortex A-7 CPU (MediaTek MT6589) and still scores marginally less than the 2 years old Samsung Galaxy S2, which had a dual-core Cortex A-9 CPU on theQuadrant test.
One can argue that the Canvas 4’s performance is fairly justified because of its low price (which is true), but the sole reason I decided to write this article was to inform people so that they do not end up buying a budget Android device expecting world-class performance and regretting thereafter.
I’m not criticizing the Micromax Canvas 4. It’s honestly a great phone at its price point. 

Low Internal Memory is a No Go

Storage settings thumb How Indian Android Device Manufacturers are Fooling and Misleading YouFor a mobile platform where games tend to reach 500MB – 1GB of content, it’s advisable not to buy devices having internal storage of anything less than 4GB, which should equal to around 2.5 – 3 GB of usable storage after excluding system space.
And no, buying a separate SD card if the internal memory is low is NOT a solution. Apps in Android are installed in the internal storage by default. Although Android lets you move apps to SD card, a lot of apps do not support this feature, especially those having widgets since widgets do not work when installed in the SD card.
A trickery that manufacturers seem to have started playing lately is using a combination of internal flash storage and internal SD card.
The Lava Xtron+ tablet, for example, has a 500MB internal flash storage and an 8GB inbuilt SD card. The problem with this combination is that the internal flash storage gets immediately filled with just 25-30 non-movable apps downloaded from the Play Store.
Pro tip: Look for devices that have a single internal flash storage. This can be found by going into the device’s Storage settings page (Settings > Storage). 

Software Issues

The hardware is only one half of the story. Even if companies are able to sell devices having Cortex A-9 CPUs at affordable rates, it is totally possible for them to still mess up the software.
The best example I can think of regarding this issue is, again, the new Lava Xtron+ — a tablet having stellar hardware but plagued with so many software flaws that using it is sometimes an irritating experience. To give you an idea, the Wi-Fi often stops working, cell standby continuously drains 60% of battery and multiple user accounts (a key Android 4.2 feature exclusive to tablets) is missing.
This gives us another important lesson that a manufacturer can only buy hardware parts with its money and not skillful engineers to work on the software.
 Pro tip: To save yourself from such flawed Android devices, restrain from pre-booking or buying devices immediately after their release and read their reviews first.

Future Support

Micromax Canvas 4 launch event3 How Indian Android Device Manufacturers are Fooling and Misleading You
This one’s tough.
When you’re buying a sub-10 thousand phone, it’s difficult to expect the manufacturer to support it for long by releasing future updates and bug fixes. And you cannot complain about this. Even with Android, which has a 6-months update cycle unlike 1 year of other mobile platforms, it’s difficult for manufacturers to promise future updates for its budget phones. So, be aware of this fact that when you’re buying a budget phone, you’re probably also buying it with nearly zero future support.
For the first time however, Micromax has introduced Over-the-Air (OTA) updates functionality in the Canvas 4, which is a welcome change and could possibly mean that users might receive upcoming version(s) of Android.
That’s it. Keep these four tips in mind and you will never regret your buying decisions when it comes to Android devices.
Regards.
Bhautik Shah

Monday, November 23, 2009

Network

Introduction
A computer network allows computers to communicate with many other computers and to share resources and information. The Advanced Research Projects Agency (ARPA) funded the design of the "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs begun in the 1960s.
[edit] Network classification
The following list presents categories used for classifying networks.
[edit] Connection method
Computer networks can also be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as Optical fiber, Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn. Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers.
Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium.
ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.
Wired Technologies
Twisted-Pair Wire - This is the most widely used medium for telecommunication. Twisted-pair wires are ordinary telephone wires which consist of two insulated copper wires twisted into pairs and are used for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed range from 2 million bits per second to 100 million bits per second.
Coaxial Cable – These cables are widely used for cable television systems, office buildings, and other worksites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second.
Fiber Optics – These cables consist of one or more thin filaments of glass fiber wrapped in a protective layer. It transmits light which can travel over long distance and higher bandwidths. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed could go up to as high as trillions of bits per second. The speed of fiber optics is hundreds of times faster than coaxial cables and thousands of times faster than twisted-pair wire.
Wireless Technologies
Terrestrial Microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The equipment look similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications to line-of-sight. Path between relay stations spaced approx. 30 miles apart. Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks.
Communications Satellites – The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 22,000 miles above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.
Cellular and PCS Systems – Use several radio communications technologies. The systems are divided to different geographic area. Each area has low-power transmitter or radio relay antenna device to relay calls from one area to the next area.
Wireless LANs – Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANS use spread spectrum technology to enable communication between multiple devices in a limited area. Example of open-standard wireless radio-wave technology is IEEE 802.11b.
Bluetooth – A short range wireless technology. Operate at approx. 1Mbps with range from 10 to 100 meters. Bluetooth is an open wireless protocol for data exchange over short distances.
The Wireless Web – The wireless web refers to the use of the World Wide Web through equipments like cellular phones, pagers,PDAs, and other portable communications devices. The wireless web service offers anytime/anywhere connection.
[edit] Scale
Networks are often classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), Virtual Private Network (VPN), Campus Area Network (CAN), Storage Area Network (SAN), etc. depending on their scale, scope and purpose. Usage, trust levels and access rights often differ between these types of network - for example, LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations (such as a building), while WANs may connect physically separate parts of an organization to each other and may include connections to third parties.
[edit] Functional relationship (network architecture)
Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture.
[edit] Network topology
Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.
[edit] Types of networks
Below is a list of the most common types of computer networks in order of scale.
[edit] Personal area network
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. Such a PAN may include wired and wireless connections between devices. The reach of a PAN is typically at least about 20-30 feet (approximately 6-9 meters), but this is expected to increase with technology improvements.
[edit] Local area network
A local Area Network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines)[2].
For example, a library may have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnected devices and eventually connect to the Internet. The cables to the servers are typically on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b, 802.11g or possibly 802.11n. The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.

Typical library network, in a branching tree topology and controlled access to resources
All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.
The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Gbit/s.[3]
[edit] Campus area network
A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting.
In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).
The main aim of a campus area network is to facilitate students accessing internet and university resources. This is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, office building, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings.
[edit] Metropolitan area network
A metropolitan area network (MAN) is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network.
[edit] Wide area network
A wide area network (WAN) is a computer network that covers a broad area (i.e. any network whose communications links cross metropolitan, regional, or national boundaries [1]). Less formally, a WAN is a network that uses routers and public communications links. Contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet. A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
[edit] Global area network
A global area networks (GAN) (see also IEEE 802.20) specification is in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial WIRELESS local area networks (WLAN).[4]
[edit] Virtual private network
A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.
A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.
A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.
[edit] Internetwork
An Internetwork is the connection of two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). Two or more networks or network segments connect using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork.
In modern practice, interconnected networks use the Internet Protocol. There are at least three variants of internetworks, depending on who administers and who participates in them:
Intranet
Extranet
Internet
Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.
[edit] Intranet
An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.
[edit] Extranet
An extranet is a network or internetwork that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g., a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
[edit] Internet
The Internet consists of a worldwide interconnection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to distinguish it from other generic internetworks.
Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
[edit] Basic hardware components
All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fiber"). An Ethernet card may also be required.
[edit] Network interface cards
A network card, network adapter, or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses.
[edit] Repeaters
A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable which runs longer than 100 meters.
[edit] Hubs
A network hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address.[5]
[edit] Bridges
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.
Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.
Bridges come in three basic types:
Local bridges: Directly connect local area networks (LANs)
Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers.
Wireless bridges: Can be used to join LANs or connect remote stations to LANs
[edit] Switches
A network switch is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets.[6] This is distinct from a hub in that it only forwards the packets to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (OSI Layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.[7]
Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch.
Overemphasizing the ill-defined term "switch" often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real-world design concept.
[edit] Routers
A router is a networking device that forwards packets between networks using information in protocol headers and forwarding tables to determine the best next router for each packet. Routers work at the Network Layer (layer 3) of the OSI model and the Internet Layer of TCP/IP.
[edit] See also