Pages

Wednesday, 19 March 2014

NETWORKING PROTOCOLS

NETWORKING PROTOCOLS

NETWORKING PROTOCOLS
NETWORKING PROTOCOLS



Application Layer

COPS Common Open Policy Service Protocol
FANP Flow Attribute Notification Protocol
Finger Finger Protocol
FTP File Transfer Protocol
HTTP Hypertext Transfer Protocol
IMAP4 Internet Message Access Protocol
IPDC IP Device Control Protocols
ISAKMP Internet Message Access Protocol
NTP Network Time Protocol
POP3 Post Office Protocol version 3
Radius Radius Protocol
RLOGIN Rlogin Protocol

RTSP Real-Time Streaming Protocol
SCTP Stream Control Transmission Protocol
S-HTTP Secure HTTP Protocol
SLP Service Location Protocol
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SOCKS V5 SOCK V5 Protocol
TACACS TACACS+ Protocol

What is CCNA?

What is CCNA?

What is CCNA?
What is CCNA?




Definition: CCNA is a popular certification in computer networking developed 
by Cisco Systems. Cisco created the CCNA to recognize basic competency in 
installation and support of medium-sized networks.

The core CCNA certification can be obtained by passing a single 90-minute 
written exam. The exam has no prerequisites, although Cisco and other 
companies offer various formal training courses to help students prepare. 

Topics covered on the CCNA exam include

LAN and WAN design (including the OSI model)
IP addressing
Routers and routing protocols (including OSPF, EIGRP and RIP)
VLAN (virtual LAN) and WLAN (wireless LAN)
Network security and management (including ACLs) 

Tuesday, 18 March 2014

MCITP Syllabus (New)

MCITP Syllabus





1. 70-620  -Windows Vista, Configuring:

Installing and Upgrading Windows Vista
-Identify hardware requirements
-Perform a clean installation
-Upgrade to Windows Vista from previous versions
-Upgrade from one edition of Windows Vista to another edition
-Troubleshoot Windows Vista installation issues
-Install and Configure Windows Vista drivers

Configuring and troubleshooting Post-installation system settings

-Troubleshoot post-installation configuration issues
-Configure and troubleshoot Windows Aero
-Configure and troubleshoot parental control
-Configure Microsoft Internet Explorer
-Configuring Windows Security features
-Configure and troubleshoot User account Control

Saturday, 15 March 2014

MCITP Syllabus

MCITP Syllabus




MCITP Syllabus
MCITP Syllabus





Implementing and Configuring a Windows Deployment Infrastructure

• Deploying Windows in a Windows Server 2008 Environment
• Windows Deployment Fundamentals
• Windows Deployment Methods
• Introducing Windows Deployment Services
• Understanding WDS Infrastructure Components
• Installing WDS
• Configuring WDS
• Capturing Images with WDS
• Deploying Images with WDS
• What Are Virtual Machines?
• Virtual PC 2007
• Virtual Server 2005 R2 SP1

Configuring Server Storage and Clusters

• Understanding Server Storage Technologies
• Managing Disks, Volumes, and Partitions in Windows Server 2008
• Working with Disk Sets
• Server Cluster Fundamentals
• Configuring an NLB Cluster
• Creating a Failover Cluster
• Configure Storage
• Configure High Availability

Installing and Configuring Terminal Services

• Deploying a Terminal Server
• Understanding Terminal Services
• Enabling Remote Desktop
• Installing Terminal Services
• Staging the Terminal Server
• Introducing the Terminal Services Configuration Console
• Configuring Connection (RDP-Tcp) Properties
• Configuring Terminal Services Server Properties
• Configuring Terminal Services Printer Redirection
• Deploy a Terminal Server Farm

Configuring and Managing a Terminal Services Infrastructure.

• Configuring and Managing Terminal Services Clients
• Configuring Terminal Services Client Settings
• Configuring User Profiles for Terminal Services
• Managing Terminal Services User Connections
• Managing Resources in Client Sessions
• Deploying Terminal Services Gateway
• Overview of Terminal Services Gateway
• Installing and Configuring a TS Gateway Server
• Publishing Applications with TS RemoteApp
• Configuring a Server to Host RemoteApp Programs
• Adding Programs for Publication in TS RemoteApp Manager
• Deploying a RemoteApp Program through TS Web Access
• Creating an RDP File of a RemoteApp Program for Distribution
• Creating a Windows Installer Package of a RemoteApp Program for Distribution
• Deploy a Terminal Services Infrastructure

Installing and Configuring Web Applications


• Installing the Web Server (IIS) Role
• Understanding Web Server Security
• Understanding IIS Components and Options
• Understanding the Application Server Role
• Understanding IIS 7.0 Role Services
• Installing the Web Server (IIS) Role
• Using Windows System Resource Manager
• Configuring Internet Information Services
• Working with IIS Management Tools
• Creating and Configuring Web Sites
• Understanding Web Applications
• Working with Application Pools
• Working with Virtual Directories
• Using Command-Line Management
• Managing Web Server Configuration Files
• Migrating From IIS 6.0

Managing Web Server Security

• Understanding IIS 7 Security Accounts
• Managing File System Permissions
• Configuring IIS Administration Features
• Managing Request Handlers
• Managing IIS Security Settings
• Managing IIS Authentication
• Managing URL Authorization Rules
• Configuring Server Certificates
• Configuring IP Address and Domain Restrictions
• Configuring .NET Trust Levels
• Implementing Web Server Security

Configuring FTP and SMTP Services


• Configuring FTP
• Installing the FTP Publishing Service
• Configuring FTP Sites by Using IIS 6.0 Manager
• Installing and Managing FTP 7
• Managing FTP Sites
• Managing FTP User Security
• Configuring FTP Network Security
• Managing FTP Site Settings
• Using FTP Client Software
• Configuring and Testing FTP
• Configuring SMTP
• Installing the SMTP Server Feature
• Configuring SMTP Services
• Monitoring SMTP Virtual Servers
• Using an SMTP Virtual Server

Configuring Windows Media Services

• Configuring Windows Media Services
• Understanding Media Services
• Installing Streaming Media Services
• Using Windows Media Services Management Tools
• Managing Publishing Points
• Configuring Source Settings
• Creating Announcements
• Configuring Publishing Point Properties
• Managing Advertising Settings
• Configuring Security for Windows Media Services
• Enabling Cache/Proxy Features
• Protecting Media by Using DRM

Configuring Windows SharePoint Services

• Configuring and Managing Windows SharePoint Services
• Understanding Windows SharePoint Services
• Understanding WSS Deployment Options
• Verifying the WSS Installation
• Using the SharePoint Central Administration Web Site
• Managing SharePoint Operations Settings
• Understanding Backup and Recovery for WSS
• Deploying and Configuring SharePoint Sites
• Managing Web Applications
• Installing Application Templates


Planning, Implementing, and Maintaining a Microsoft

Windows Server 2008 Active Directory Infrastructure

Installing, Upgrading, and Deploying Windows Server 2008

• Planning Windows Server 2008 Installation and Upgrade
• Selecting the Right Edition of Windows Server 2008
• Windows Server 2008 Server Core
• Installing Windows Server 2008
• Upgrading from Windows Server 2003
• Windows Server 2008 Answer Files
• Windows Deployment Services
• Multicast, Scheduled, and Automatic Deployment
• Rollback Preparation
• Deployment Services Role

Configuring Network Connectivity


• Using IPv6 in Windows Server 2008
• Addressing Problems Caused by IPv4 Limitations
• Analyzing the IPv6 Address Structure
• Planning an IPv4 to IPv6 Transition Strategy
• Implementing IPv4-to-IPv6 Compatibility
• Using IPv6 Tools
• Configuring Clients Through DHCPv6
• Planning an IPv6 Network
• Configuring DNS
• Using Windows Server 2008 DNS
• Examining New DNS Features and Enhancements
• Planning a DNS Infrastructure

Active Directory and Group Policy

• Windows Server 2008 Active Directory
• Introducing the Windows Server 2008 Directory Server Role
• Planning Domain and Forest Functionality
• Planning Forest-Level Trusts
• Raising Domain and Forest Functional Levels and Configuring Fine-
Grained Password Policy
• Group Policy in Windows Server 2008
• Understanding Group Policy
• Planning and Managing Group Policy
• Troubleshooting Group Policy

Application Servers and Services

• Application Servers
• Planning Application Availability
• Ensuring Application Availability
• Implementing Application Accessibility
• Planning Application Resilience
• Application Deployment
• Deploying Applications Using System Center Essentials
• Using System Center Configuration Manager 2007

Terminal Services and Application and Server Virtualization


• Terminal Services
• Planning Terminal Server Infrastructure
• Terminal Services Licensing
• Configuring Terminal Servers
• Terminal Services Web Access
• Terminal Server Session Broker
• Monitoring Terminal Services
• Terminal Services Gateway
• Server and Application Virtualization
• Managing Virtualized Servers
• Terminal Services RemoteApp
• Microsoft Application Virtualization

File and Print Servers

• Managing File and Print Servers
• Planning the File Services Server Role
• Managing Access Control
• Using FSRM to Configure Quotas and File Screen Policy
• Planning the Print Services Server Role
• Using DFS Namespace to Plan and Implement a Shared Folder
• Structure and Enhance Data Availability
• Configuring a DFSR Structure
• Configuring Offline Data Access
• Configuring Indexing in the Windows Search Service

Windows Server 2008 Management, Monitoring, and Delegation

• Server Management Strategies
• Tools for the Administration of Windows Server 2008
• Remote Administration Technologies
• Managing Windows Server 2008 Event Logs
• Remotely Managing Windows Server 2008
• Monitoring and Optimizing Performance
• Reliability and Performance
• Optimizing Windows Server 2008 Performance
• Windows System Resource Manager
• Data Collector Sets, Reports, and WSRM Policies
• Delegating Authority
• Delegation Policies
• Delegation Procedures
• Credential Delegation
• Delegating the Management of Applications
• Delegating Administrative Permissions

Patch Management and Security

• Windows Server 2008 Patch Management Strategies
• Deploying Updates with WSUS
• Replica Mode and Autonomous Mode
• Using Computer Groups
• WSUS Client Configuration
• Updates and Synchronization Strategies
• Update Management and Compliance
• Other Patch Management Tools
• Monitoring Server Security
• Encrypting File System
• Windows Firewall with Advanced Security

Remote Access and Network Access Protection


• Managing Remote Access
• VPN Protocols and Authentication
• Network Policy Server
• Remote Access Accounting
• Terminal Services Gateway Servers
• Network Access Protection
• System Health Agents and Validators
• NAP Enforcement Methods
• Remediation Servers

Certificate Services and Storage Area Networks

• Configuring Active Directory Certificate Services
• Types of Certificate Authority
• Certificate Services Role-Based Administration
• Configuring Credential Roaming
• Configuring Auto enrollment
• Configuring Web Enrollment Support
• Configuring Certificate Revocation Lists
• Configuring an Online Responder for Certificate Services
• Network Device Enrollment Service
• Using Enterprise PKI to monitor CA Health
• Planning the Deployment of Storage Area Networks
• Logical Unit Numbers
• VDS
• Storage Manager For SANs
• Multipath I/O
• Storage Explorer

Clustering and High Availability

• Understanding DNS Round Robin and Load Balancing
• Plan Availability Strategies
• DNS Round Robin
• Configuring Windows Network Load Balancing
• Windows Server 2008 Cluster Tools
• Selecting Redundancy Strategies
• Understanding Cluster Concepts
• Configuring Failover Clustering

Backup and Recovery


• Backing Up Data
• Shadow Copies of Shared Folders
• Windows Server Backup
• The wbadmin Command-Line Tool
• Backing Up Server Roles and Applications
• Remotely Backing Up Computers
• Further Considerations for Planning Backups
• System Center Data Protection Manager
• Backing Up Windows Server 2008
• Disaster Recovery
• Windows Server Backup Recovery Modes
• Recovering Active Directory
• Hyper-V and Disaster Recovery

Designing Security for Microsoft® Networks

Introduction to Designing Security

• Introduction to Designing Security for Microsoft Networks
• Contoso Pharmaceuticals: A Case Study

Creating a Plan for Network Security

• Introduction to Security Policies
• Defining a Process for Designing Security
• Creating a Security Design Team
• Planning a Security Framework

Identifying Threats to Network Security

• Introduction to Security Threats
• Predicting Threats to Security

Analyzing Security Risks

• Introduction to Risk Management
• Creating a Risk Management Plan

Creating a Security Design for Physical Resources


• Determining Threats and Analyzing Risks to Physical Resources
• Designing Security for Physical Resources

Creating a Security Design for Computers

• Determining Threats and Analyzing Risks to Computers
• Designing Security for Computers

Creating a Security Design for Accounts

• Determining Threats and Analyzing Risks to Accounts
• Designing Security for Accounts

Creating a Security Design for Authentication

• Determining Threats and Analyzing Risks to Authentication
• Designing Security for Authentication

Creating a Security Design for Data

• Determining Threats and Analyzing Risks to Data
• Designing Security for Data

Creating a Security Design for Data Transmission

• Determining Threats and Analyzing Risks to Data Transmission
• Designing Security for Data Transmission

Creating a Security Design for Network Perimeters

• Determining Threats and Analyzing Risks to Network Perimeters
• Designing Security for Network Perimeters

Designing Responses to Security Incidents


• Introduction to Auditing and Incident Response
• Designing an Audit Policy
• Designing an Incident Response Procedure



Enjoy:MCITP Syllabus


Thursday, 13 March 2014

What is Wireless Computer Networking?

What is Wireless Computer Networking? 

What is Wireless Computer Networking?
What is Wireless Computer Networking?





        The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Strictly speaking, any technology that does this could be called wireless networking. The current buzzword however generally refers to wireless LANs. 
       This technology, fuelled by the emergence of cross-vendor industry standards such as IEEE 802.11, has produced a number of affordable wireless solutions that are growing in popularity with business and schools as well as sophisticated applications where network wiring is impossible, such as in warehousing or point-of-sale handheld equipment.

CCNA Syllabus

CCNA Syllabus
CCNA Syllabus
CCNA Syllabus




IP Data Networks


Understand the operation of data networks.

Know the purpose and functions of network devices such as routers, switches, bridges and hubs.

Be able to select components to meet a specific network requirement.

Understand how certain applications can impact network performance.

Know the protocols, purpose and operation of both the OSI and TCP/IP models.

Describe the data flow between two hosts on a network

Be able to choose the most appropriate cables, media, ports and connectors to connect network devices and hosts to a LAN.

What is Computer Networking?



What is Computer Networking?
What is Computer Networking?
What is Computer Networking?



Computer networking is an engineering discipline that aims to study and analyze the communication process among various computing devices or computer systems that are linked, or networked, together to exchange information and share resources.

Computer networking depends on the theoretical application and practical implementation of fields like computer engineering, computer sciences, information technology and telecommunication

Tuesday, 11 March 2014

IP ADDRESS (INTERNET PROTOCOL)



 IP ADDRESS (INTERNET PROTOCOL)  



 IP ADDRESS (INTERNET PROTOCOL)
 IP ADDRESS (INTERNET PROTOCOL)



An IP address is a unique address used to locate and identify a device over a network. That device can be an electronic device, a computer, a server, a router or even an IP phone. It is the addressing used for the transmission of data packets over a network working with the IP protocol.

An IP address is slightly complex to understand in details for non-technical readers, so I try to explain briefly what they are. We see