Thursday 12 May 2016

How to Configuring Network Setting For TCP/IP Services

TCP/IP is the protocol of the Internet and the most versatile protocol that Windows NT supports. It can be manually configured or automatically configured using DHCP (Dynamic Host Configuration Protocol). Some applications require TCP/IP (such as Netscape), and it is routable, making it appropriate for networks of any size. To Install TCP/IP Protocol

(a) Click on Start >Settings > Control Panel.
(b) In the Control Panel dialog box double-click Network icon. The Network properties window Appears.
(c) Under the Protocols tab click on Add button to install new protocols.
(d) In the select network protocols list select TCP/IP and then click OK.
(e) The next dialog box prompts you to enter the path for the Windows NT installation files. Type F:\i386 and then click Continue.
(f) Windows will start copying files to the system.
(g) Then TCP/IP Properties dialog box appears, asking you to enter the IP address, subnet mask and default gateway.

(h) You can select the option obtain an IP address automatically, if you have a DHCP server installed in your network.

How to configure the TCP/IP

Configuring TCP/IP.

(a) Double-click on [My Computer]
(b) Double-click [Dial-Up Networking]
(c) A [Dial-Up Networking] window will appear; choose [Ok] to add an entry
(d) Enter "Transmission" for the [Name of the new phonebook entry]
(e) Click [Next]
(f) Check ALL of the following boxes under the [Server] window: [I am calling the Internet] [Send my plain text password] [The non-Windows NT server I am calling expects]
(g) Click [Next]
(h) Enter in the Transmission dial-up number for your area in the [Phone Number] entry field (e.g., 990-0900 - Salt Lake City)
(j) Click [Next]
(k) Select [Point-to-Point Protocol (PPP)] under the [Serial Line Protocol] window, then choose [Next]
(l) Select [None] under the [Logon Script] window, the click [Next]
(m) Under the [IP Address] window leave [My IP address] at “0.0.0.0" (unless Transmission Technical support instructed you to do otherwise), then click [Next]
(n) Under [DNS server] enter "198.60.22.2" and leave [WINS Server] at the  default of "0.0.0.0"
(o) Click [Next], then click [Finish]
(i) Hub to Hub Connectivity.

(ii) Hub to Transceiver or DNI Card Connectivity.

Wednesday 11 May 2016

How to Setting Dial Up Connection For Access to RAS and Internet step by step

Checking To See If RAS Is Installed
(a) Using the [Start] menu, select [Settings] and choose [Control Panel].
(b) Open [Network].
(c) Choose the [Services] tab.
(d Look to see if [Remote Access Service] is in the [Network Services] box.
Note- If Remote Access is in the [Network Services] box, jump to Part 1.

1. Configuring RAS.
(a) If you do not see [Remote Access Service], select the [Add] button
(b) Scroll down to [Remote Access Service],
(c) Highlight it and Click [Ok]
(d) The next window will ask for your Windows NT disk4. Insert the Windows NT disk, and select [Continue]
(e) A window will ask you to add/choose a [RAS Capable Device]
(f) Select your modem, and click [Ok]
(g) Under the [Remote Access Setup] window, select [Configure]
(h) Under [Port Usage] select [Dial out only], then Click [Ok]
(i) Click [Network], make sure [TCP/IP] is the only protocol selected
(j) Choose [Ok], click [Continue], Note. Windows NT will update your[Bindings Configuration], and then prompt you to reboot your computer. You Must Reboot your computer NOW! Select [Yes] to reboot your computer.

2. Configuring Your Transmission Entry.
(a) Under the [Dial-Up Networking] window, select your "Transmission" entry
(b) Then click [More], and select [Edit entry and modem properties]
(c) Select the [Server] tab, make sure [TCP/IP] is the selected protocol
(d) UNCHECK [Enable software compression] and leave the rest of the settings at default
(e) The [TCP/IP Settings] button
(f) Choose sure to select both :-
(i) [Server assigned IP address]
(ii) [Specify name server addresses]
(g) Check and Edit the following entries:-
(i) [Primary DNS] - "198.60.22.2"
(ii) [Secondary DNS] - "198.60.22.22"
(h) UNCHECK the [Use IP header compression] box
(j) Leave the rest of the settings at default, and click [Ok]
(k) Choose on the [Script] tab and make sure [After Dialing (login)] is set to [None]
(l) Choose the [Security] tab and make sure that [Accept any authentication including clear text] is turned on
(m) Click [Ok] to finish

3. Logging On to Transmission.
(a) Open [My Computer].
(b) Open [Dial-Up Networking].
(c) Highlight the "Transmission" entry and click [Dial].
(d) Enter your username.
(e) Enter your password.
(f) Under the [Domain] entry, make sure the field is left blank! NOTE: If the Domain] field is not blank, you will not be able to connect to Transmission
(g) Click [Connect]NOTE: (Steps 4 & 5) your password is case sensitive, as well as your username, and your username should contain only lower case letters.

4. Disconnecting From Transmission.
(a) Double-click on the Phone Icon (in the lower right hand side of the [Start] bar)

(b) Then click the [Hang Up] button and choose your Transmission connection

How to know MAC Address of PC or Laptop

How to know MAC Address of PC or Laptop

(a) The chances are very good that you'll never see the MAC address for any of your equipment because the software that helps your computer communicate with a network takes care of matching the MAC address to a logical address. The logical address is what the network uses to pass information along to your computer.


(b) If you'd like to see the MAC address and logical address used by the Internet Protocol (IP) for your Windows computer, you can run a small program that Microsoft provides. Go to the "Start" menu, click on "Run," and in the window that appears, type WINIPCFG (IPCONFIG for Windows 2000/XP). When the gray window appears, click on "More Info" and you'll get this sort of information.

Monday 9 May 2016

Routers And Dial-In-Server

Routers.
(a) The Internet is one of the 20th century's greatest communications developments. It allows people around the world to send e-mail to one another in a matter of seconds, and it lets you read, among other things. We're all used to seeing the various parts of the Internet that come into our homes and offices the Web pages, e-mail messages and downloaded files that make the Internet a dynamic and valuable medium. But none of these parts would ever make it to your computer without a piece of the Internet that you've probably never seen. In fact, most people have never stood "face to machine" with the technology most responsible for allowing the Internet to exist at all: the router.
(b) Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways.

Types of Routers. The router can be categorized on the basis of the configuration of the routing table. The two major types of routers
(a) Static routers. Static routers require an administrator to manually set up and configuration the routing table and to specify each route. This is very difficult and proper record keeping is must for maintenance of the network.
(b) Dynamic routers. Dynamic routers do an automatic discovery of routes and therefore have a minimal amount of set up and configuration. They are more sophisticated in that they examine information from other routers and make packetby- packet decisions about how to send data across the network. Dynamic router uses
dynamic protocol for discovery of the neighboring computers and routers.

 Keeping The Massages Moving.
(a) When you send to a friend on the other side of the country, how does themessage know to end up on your friend's computer, rather than on one of themillions of other computers in the world? Much of the work to get a message fromone computer to another is done by routers, because they're the crucial devices that
let messages flow between networks, rather than within networks.
(b) Let's look at what a very simple router might do. Imagine a small company that makes animated 3-D graphics for local television stations. There are 10 employees of the company, each with a computer. Four of the employees are animators, while the rest are in sales, accounting and management. The animators
will need to send lots of very large files back and forth to one another as they workon projects. To do this, they'll use a network.
(c) When one animator sends a file to another, the very large file will use upmost of the network's capacity, making the network run very slowly for other users.One of the reasons that a single intensive user can affect the entire network stemsfrom the way that Ethernet works. Each information packet sent from a computer is
seen by all the other computers on the local network. Each computer then examinesthe packet and decides whether it was meant for its address. This keeps the basic plan of the network simple, but has performance consequences as the size of thenetwork or level of network activity increases. To keep the animators' work from interfering with that of the folks in the front office, the company sets up two separate networks, one for the animators and one for the rest of the company. A router links the two networks and connects both networks to the Internet
(d) The router is the only device that sees every message sent by any computer on either of the company's networks. When an animator sends a huge file to another animator, the router looks at the recipient's address and keeps the traffic on the animator's network. When an animator, on the other hand, sends a message to the
bookkeeper asking about an expense-account check, then the router sees the recipient's address and forwards the message between the two networks.
(e) One of the tools a router uses to decide where a packet should go is a configuration table. A configuration table is a collection of information, including-
(i) Information on which connections lead to particular groups of  addresses.
(ii) Priorities for connections to be used.
(iii) Rules for handling both routine and special cases of traffic.
(f) A configuration table can be as simple as a half-dozen lines in the smallest routers, but can grow to massive size and complexity in the very large routers thathandle the bulk of Internet messages.
(g) A router, then, has two separate but related jobs-
(i) The router ensures that information doesn't go where it's not needed. This is crucial for keeping large volumes of data from clogging the connections of "innocent bystanders."
(ii) The router makes sure that information does make it to the intended destination.
(h) In performing these two jobs, a router is extremely useful in dealing with two separate computer networks. It joins the two networks, passing information from one to the other and, in some cases, performing translations of various protocols between the two networks. It also protects the networks from one another, preventing the traffic on one from unnecessarily spilling over to the other. As the number of networks attached to one another grows, the configuration table for handling traffic among them grows, and the processing power of the router is increased. Regardless of how many networks are attached, though, the basic operation and function of the router remains the same. Since the Internet is one huge network made up of tens of thousands of smaller networks, its use of routers is an absolute necessity.

Transmitting Packets.
(a) When you make a telephone call to someone on the other side of the country, the telephone system establishes a stable circuit between your telephone and the telephone you're calling. The circuit might involve a half dozen or more steps through copper cables, switches, fiber optics, microwaves and satellites, but those steps are established and remain constant for the duration of the call. This circuit approach means that the quality of the line between you and the person you're calling is consistent throughout the call, but a problem with any portion of the circuit -- maybe a tree falls across one of the lines used, or there's a power problem with a switch -- brings your call to an early and abrupt end. When you send an e-mail message with an attachment to the other side of the country, a very different process is used.
(b) Internet data, whether in the form of a Web page, a downloaded file or an email message, travels over a system known as a packet-switching network.
(c) In this system, the data in a message or file is broken up into packages about 1,500 long. Each of these packages gets a wrapper that includes information on the sender's address, the receiver's address, the package's place in the entire message,and how the receiving computer can be sure that the package arrived intact. Each data package, called a packet, is then sent off to its destination via the best available route -- a route that might be taken by all the other packets in the message or by none of the other packets in the message. This might seem very complicated compared to the circuit approach used by the telephone system, but in a network designed for data there are two huge advantages to the packet-switching plan:-
(i) The network can balance the load across various pieces of equipment on a millisecond-by-millisecond basis.
(ii) If there is a problem with one piece of equipment in the network while a message is being transferred, packets can be routed around the problem, ensuring the delivery of the entire message.
(d) The routers that make up the main part of the Internet can reconfigure the paths that packets take because they look at the information surrounding the data packet, and they tell each other about line conditions, such as delays in receiving and sending data and traffic on various pieces of the network. Not all routers do so
many jobs, however. Routers come in different sizes. For example :-
(i) If you have enabled Internet connection sharing between two Windows98-based computers, you're using one of the computers (the computer with the Internet connection) as a simple router. In this instance, the router does so little -- simply looking at data to see whether it's intended for one computer or the other -that it can operate in the background the system without significantly affecting the other programs you might be running.
(ii) Slightly larger routers, the sort used to connect a small office network to the Internet, will do a bit more. These routers frequently enforce rules concerning security for the office network (trying to secure the network from certain attacks). They handle enough traffic that they're generally stand-alone devices rather than software running on a server.
(iii) The largest routers, those used to handle data at the major traffic points on the Internet, handle millions of data packets every second and work to configure the network most efficiently. These routers are large stand-alone systems that have far more in common with supercomputers than with your office server.
(e) One of the crucial tasks for any router is knowing when a packet of information stays on its local network. For this, it uses a mechanism called a subnet mask.
(f) The subnet mask looks like an IP address and usually reads "255.255.255.0." This tells the router that all messages with the sender and receiver having an address sharing the first three groups of numbers are on the same network, and shouldn't be sent out to another network. Here's an example: The  computer at address 15.57.31.40 sends a request to the computer at 15.57.31.52. The router, which sees all the packets, matches the first three groups in the address of both sender and receiver (15.57.31), and keeps the packet on the local network. (You'll learn more about how the addresses work in the next section.)
(g) Between the time these words left the Howstuffworks.com server and the time they showed up on your monitor, they passed through several routers (it's impossible to know ahead of time exactly how many "several" might be) that helped them along the way. It's very similar to the process that gets a postal letter from your mailbox to the mailbox of a friend, with routers taking the place of the
mail sorters and handlers along the way. 24. Knowing Where To Send Data Routers are one of several types of devices that make up the "plumbing" of a computer network. Hubs, switches and routers all take signals from computers or networks and pass them along to other computers and networks, but a router is the only one of these devices that examines each bundle of data as it passes and makes a decision about exactly where it should go. To make these decisions, routers must first know about two kinds of information: addresses and

 Network structure.
(a) The address has several pieces, each of which helps the people in the postal service move the letter along to your house. The ZIP code can speed the process up; but even without the ZIP code, the card will get to your house as long as your friend includes your state, city and street address. You can think of this address as a logical address because it describes a way someone can get a message to you. This logical address is connected to a physical address that you generally only see when you're buying or selling a piece of property. The survey plat of the land and house, with latitude, longitude or section bearings, gives the legal description, or address, of the property.
(b) Every piece of equipment that connects to a network, whether an office network or the Internet, has a physical address. This is an address that's unique to the piece of equipment that's actually attached to the network cable. For example, if your desktop computer has a network interface card (NIC) in it, the NIC has a
physical address permanently stored in a special memory location. This physical address, which is also called the MAC address ( Media Access Control) has two parts, each 3
(c) The interesting thing is that your computer can have several logical addresses at the same time. Of course, you're used to having several "logical addresses" bring messages to one physical address. Your mailing address, telephone number (or numbers) and home e-mail address all work to bring messages to you when you're in your house. They are simply used for different types of messages -- different networks, so to speak.

(d) Logical addresses for computer networks work in exactly the same way. You may be using the addressing schemes, or protocols, from several different types of networks simultaneously. If you're connected to the Internet (and if you're  reading this, you probably are), then you have an address that's part of the TCP/IP network protocol. If you also have a small network set up to exchange files between several family computers, then you may also be using the Microsoft NetBEUI protocol. If you connect to your company's network from home, then your computer may have an address that follows Novell's IPX/SPX protocol. All of these can coexist on your computer. Since the driver software that allows your computer to communicate with each network uses resources like memory and CPU time, you don't want to load protocols you won't need, but there's no problem with having all the protocols your work requires running at the same time.

Sunday 8 May 2016

Installation of LAN & WAN Hardware

1. Introduction to LAN Components.
(a) Cabling.
(b) Hubs.
(c) Switches.
(d) Transceivers.
(e) NIC Cards.
(f) Practical Handling.
(g) Installation and Troubleshooting.
2. Cabling. Some sort of wire or cabling today connects the vast majority of networks, which act as the network transmission medium carrying signals between computers. There is a variety of cable that can meet the varying needs and sizes of networks, from small to large. Cabling can be confusing. Belden, a leading cable manufacturer, publishes a catalog that lists more than 2,200 types of cabling. These cable are also known as (Adaptor User Interface (AUI) Cables. Fortunately, only three major groups of cabling connect the majority of networks-
(a) Co-axial Cables.
(b) Twisted Pair Cables .
(c) Fiber Optics .
3. Co-axial Cables. Although no longer widely used to create new networks, coaxial cable is commonly found on older networks. Coaxial cable must be linked using devices called British Naval Connectors (BNCs). A BNC connector that links a computer or other device .to a coaxial cable is called a T-connector.
4. Shielded Twisted Pair Cable. Shielded Twisted Pair (STP) cable is similar to unshielded twisted pair cable, except that shielded twisted pair cable includes a protective metal or foil covering. A shielded twisted pair cable can contain a single pair of wires or several pairs of wires.
5. Unshielded Twisted-Pair Cables. Twisted-pair uses RJ-45 telephone connectors to connect to a computer-
(a) Jack Couplers. These single or double RJ-45 jacks snap into patch panels and wall plates and support data rates to 100 Mbps.
(b) Wall Plates. These support two or more couplers. Wall plates provide multiple outlets for extension of LANs. Rj-45 is similar to the RJ-11 telephone connector. Although they look alike at first glance, there are crucial differences between them. The RJ-45 is slightly larger, and will not fit into the RJ-11 telephone jack. The RJ-45 houses eight cable connections, while the RJ-11 only houses four.
 6. Fiber Optic Cable. In fiber-optic cable, optical fibers carry digital data signals in the form of modulated pulses of light. This is a relatively safe way to send data because no electrical impulses are carried over the fiber-optic cable. This means that fiber-optic cable cannot be tapped and the data stolen, which is possible with any copper-based cable
carrying data in the form of electronic signals. Fiber-optic cable is good for very highspeed, high-capacity data transmission because of the lack of attenuation and the purity of the signal.
7. Fiber-Optic Composition Optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is easier to install, but cannot carry the light pulses as far as glass. A reinforcing layer of plastic surrounds each glass strand while Kevlar fibers provide strength. Each glass strand passes signals in only one direction, so a cable consists of two strands in separate jackets. One strand transmits and one receives. The Kevlar fibers in the fiber-optic connector are placed between the two cables, which are encased in plastic. Fiber-Optic Cable transmissions are not subject to electrical interference and are extremely fast. They can carry a signal-the light pulse-for miles.
8. HUBS . One network component that is becoming standard equipment in more and more networks is the hub. A hub is the central component in a star topology. There are three types of Hubs.
(a) Active Hubs. Most hubs are active in that they regenerate and retransmit the signals the same way a repeater does. Active hubs require electrical power to run.
(b) Passive Hubs. Some types of hubs are passive. They act as connection points and do not amplify or regenerate the signal, the signal passes through the hub. Passive hubs do not require electrical power to run.
(c) Hybrid Hubs. Advanced hubs that will accommodate several different types of cables are called hybrid hubs. A hub-based network can be expanded by connecting more than one hub.
9. Switches:-
(a) Switch is a device that could support creating separate virtual or physical networking segments. It has the ability to create separate collision domains either physically or virtually.
(b) They operate at the data link layer (or layer 2 in the OSI model), and higher in cases of a multilayer switch. When operating at layer 2, a device has the ability to make intelligent decisions on how to handle a given packet of data based on the source and destination MAC (Media Access Control).
(c) A MAC address is essentially a unique identifier that is hard-coded into every network device at the time of production.
(d) Ethernet switches are switch frames of data between ports Other network switches do exist for example, frame relay switches are used largely by telecommunication carriers, as are Asynchronous Transfer Mode (ATM) switches. ATM switches are differ greatly from Ethernet switches in that they switch in cells and not frames.
(e) An Ethernet switch may look similar to a hub, switches do not just receive a  signal on one port and repeat to all other ports.
10. Network Interface Card (NIC). In networking the PC expansion board that plugs into a personal computer or server and works with the network operating system to control the flow of information over the network. The network interface card is connected to the network cabling (twisted pair, coaxial or fiber optic cable), which in turn connects al the network interface cards in the network
11. NIC Card Installation :-
(a) Shut down the computer, unplug its power cord and remove the chassis cover.
(b) Insert the Adaptor card into the ISA/PCI expansion slot. Ascertain that the card is fully seated in the expansion slot connector.
(c) Install the bracket screw which secures the card to the computer chassis.
(d) Configure the card and run setup programme from the installation CD/Floppy disk and then configure to the network.

Saturday 7 May 2016

FTP Response Code Full List with Meaning

FTP Response Code with Full List with Meaning

FTP response command
Response meaning
125
Data connection already open ;transfer starting
150
File status okey; about to open data connection
200
Command okey
221
Service closing control connection
220
Service ready for new user
226
Closing data connection
230
User logged in proceed
250
Requested file action okey completed
331
User name okey need password
421
Service not available ;closing control connection
450
Requested file action not taken
500
Syntax error; command unrecognized
501
Syntax error in parameters or arguments
550
Requested action not taken

FTP Commands

COMMAND
MEANING
!
Escape to a DOS shell
Delete
Delete remote file
Literal
Send arbitary ftp command
Prompt
Force interactive prompting on multiple command
Send
Send one file
?
Print local help information
Debug
Toggle debugging mode
Is
List contents of remote directory
Put
Send one file
Status(or stat)
Show current status
Append
Append to a file
Dir
List contents of remote machine
Mdelete
Delete multiple files
Pwd
Print working directory on remote machine
Trace
Toggle packet tracing
Ascii
Set ASCII transfer type
Disconnect
Terminate FTP session
Mdir
List contents of multiple remote directories
Quit
Terminate FTP session and exit
Type
Set file transfer type
Bell
Beep when command completed
Get
Receive file
Mget
Get multiple file
Quote
Send arbitrary FTP command
User
Send new user information
Binary
Set binary transfer type
Glob
Toggle metacharacter expansion of local file names
Mkdir
Make directory on the remote machine
Recv
Receive file
Verbose
Toggle verbose mode
Bye
Terminate FTP session and exit
Hash
Toggle printing # for each buffer transferred
Mls
List contents os multiple remote directories
Remote help
Get help from remote server
Cd
Change remote working directory
Help
Print local help information
Mput
Send multiple files
Rename
Rename file
Close
Terminate FTP session
lcd
Change local working directory
Open
Connect to remote FTP
Rmdir
Remove directory on the remote machine