Posts

Showing posts from September, 2013

The useful commands a Server administrator should know

Netstat command                Netstat is a command line diagnostic tool which displays the information about TCP/IP  network protocol. The  basic function of netstat is to check which ports are active on the machine. It also gives information about the different ports such as the port number, the associated protocol and status. The information is helpful in getting information about which ports are closed or open and to determine which ports are vulnerable to attacks.            When you enter netstat on the command prompt , it provides you with a list of information about the connection. It also provides details such as the different protocols being used , name of your machine, TCP/IP connection, foreign address ,local address and status of connection. Ipconfig command               The basic function of Ipconfig is to display IP address , subnet mask and default gateway of each network adapter. It can also be used to display or reset the DNS cache, refresh regi

OS Boot Files (XP Windows 7 and Vista )

Image
             To boot a computer is to load an OS into the computer’s memory or random access memory. Once OS system is loaded, It’s ready for users to run applications. Sometimes you will see an instruction to “reboot” the OS , This simply means to reload the OS. http://sonaby-tech.blogspot.in/ Below are the Windows XP and Windows 7 bootable files. Windows XP Boot files : NTLDR – This files helps to boot Windows XP as well as Windows 2000 BOOT.INI – It is a text file which lists the available Operating Systems found and tells the NTLDR where to find boot partition. BOOTSECT.DOS – Locates the IO.SYS file so you can start another OS in a dual boot environment. NTDETECT.COM – Loads into protected mode and detects the installed hardware on your system. NTBOOTDD.SYS – On a system with a SCSI boot device, this file is used to recognize and load the SCSI boot partition. HAL.DLL – Hardware Abstraction layer of  XP. WIN.COM – Windows XP command files. Windows 7 BOOTMGR – Found in the

Have you ever tried system restore in Windows 7 ?

                  H ere I am sharing a post about how to take system restore using system restore with command prompt . Now ,you will be having a question on your mind..  "Why system restore is so important ? " It’s the best of getting rid of virus infection, malware for computer users. Also it helps restore one’s operating system files to an earlier point time without affecting the saved personal files, such as e-mail, documents or photos. Let’s start..!! 1.        Switch on your computer. During this time keeping press on the F8 key on your keyboard till Windows Advanced Option appears, choose Safe mode with command prompt from the list and press ENTER . 2.        When command prompt mode loads enter the following line : cd restore and press ENTER . 3.        Next type this line : rstrui.exe and press ENTER 4.        Now you will be getting a System Restore Box.. Right?! 5.        Of course, Click Next . 6.        In this option you h

Routing Protocols with the help of Diagram

Image
         Routers communicates with each other using Routing protocols. The protocols help routers to learn the network topology and changes that occur in the network topology . routing protocols use routing algorithms to decide the best output path for the received packet. Routing algorithm is a part of network layer software and should be correct, stable and simple. It should decide the perfect path for the packet depending on the network topology and traffic. For finding the best path, router considers number of hops, time delay and communication cost of the packet transmission.    A large Internet is divided into groups of networks called as Autonomous System -AS . An AS consists of network groups and routers which are managed by  a single organization. Interior routing is used within AS, whereas, Exterior routing provides routing between two ASs. Protocol Diagram :

Concept of Routing Table for Beginners

Image
        Routers maintain routing tables that provide information about the path from router to the destination.In Windows Operating system, there are two commands available that allow you to view the routing table.                - NETSTAT -  Allows the users to check the network configuration. It is to display protocol statistics and current TCP/IP network connections.There are several switches associated with this command.                  * Netstat - n   - Used to display all the addresses and port numbers in the form of numbers.                  * Netstat - r    -  Used to display the routing table.               - ROUTE PRINT - Allows the user to view the current routing table. This command is similar to Nestat -t      The routing table generally consist of a number of routes. Each route has information, which determines where the packed will be sent. http://sonaby-tech.blogspot.in/ Network Destination - Indicates the IP address of the outgoing packet and ref

Difference between POP and IMAP

Image
Post Office Protocol (POP): - Best of you use only one computer to check email (Office users) - Downloads your email to the particular computer you are checking it on. - Allows you to keep a large size of email messages only limited by the size of your computer. - Does not have web interface - New messages are downloaded in their entirety ; you have to wait for the message to download. - Clients connect to email server only for the time it takes to download any new messages.  - Assumes that the currently connected client is the only client connected to the mailbox. - Simple protocol and easy to configure. - Less server loads and less costs for ISP and end users. - Searching through mailbox does not depend on mail server resources. http://sonaby-tech.blogspot.in/ Internet Message Access Protocol (IMAP):   - Best if you use many different computers to check your email (mobile users) - Your mail is al

How well do you know VOIP Protocols ?

        I n computing , a protocol is a set of rules used by computers to communicate with each other across a network. It sets a standard that controls or enables the connection, communication and data transfer between computing endpoints.   For example, HTTP and HTTPS are protocols used for communications over the Internet.  Similarly, VOIP also communicates using standard protocols and they are;   H.323 Protocols :        H.323 is an umbrella recommendation from the International Telecommunications union ( ITU ). It defines the protocols to provide audio-visual  communication sessions on any packet network. The H.323 standard address call signaling and control, multimedia transport and control and bandwidth control for point-to-point and multi-point conferences. SIP Protocols:     Session Initiation Protocol (SIP) is a signaling protocol. It is used for controlling multimedia communication sessions such as voice and video calls over IP. Other feasible applications of

RAID Levels - Easy to Understand

              R AID in Windows 2008 is implemented not only for fault tolerance but also for improving the performance. It is a technology that provides storage functions and reliability through redundancy. Therefore, you can define RAID as group of technologies that use multiple drives, in multiple  configurations, to store redundant data.  In Windows Server 2008 , two types of RAID are implemented:                          - Software based RAID : Specifies that to implement RAID array the system processor uses special software routines. This type of RAID is usually implemented at the OS Level.                       - Hardware based RAID : Specifies that to implement RAID array controllers use proprietary disk layouts. RAID Levels :   RAID 0  (Min. 2 disks required)      Provides no fault tolerance but helps in improving performance as read and write operations occur on all drives simultaneously. However, in case of failure of one disk causes loss of data on all volum

Full Server Backup - Using WBADMIN command

            W indows Server 2008 also provides the wbadmin command utility to create system state backup. Perform the following steps for the system state data backup by using the webadmin command :             -  Click the Start button and then right-click Command Promt and select the Run as administrator option.    The Administrator: Command Promt appears.            -   Execute the following command:          _______________________________________________________________                        wbadmin Start SystemStateBackup -backuptarget :D:          _______________________________________________________________ In the preceding command:   wbadmin : Performs backups and restores the backed up data from the command-line with the help of batch files and scripts StartSytemStateBackup : Runs the system state backup in Windows Server 2008 -backuptarget : Specifies the backup target drive After executing the preceding command, the Do you want to start the bac

Full and Incremental Backup

Image
     B ackup ensures that the data of an organization is protected or can be recovered under the following circumstances :      H ardware failure      A ccidental deletion or modification of data      R estoration of the old version of a file      U nauthorized deletion or modification of data Below I mentioned the types of backups that can be performed in Windows Server 2008, Full Backup          Performs the backup of the selected files and also marks them as backed up. Full backup is usually performed when you need to take a complete backup of the system . You should select this type of backup when you are taking backup of the server for the very first time. Incremental Backup         Performs the backup of either the files marked for backup or the modified files. Incremental backup is performed in conjunction with full backup. That is , data of files from full backup is restored first and then the data of incremental backup is restored. Therefore, you should s