Tuesday, June 8, 2010

Windows 7 Commands

The list of commands available in the command prompt for Windows 7 is similar to that for Windows Vista. Some commonly used commands and a brief explanation of their functions are given.
Commands in Windows 7

The command prompt that has been in previous versions of Windows is still with us and is not much changed fron Windows Vista. The command line remains a powerful and much used feature by system administrators everywhere. Thus, the old command interpreter cmd.exe has been continued although in a slightly newer version. Several commands are now in the standard list that were formerly available only on servers. New commandsare indicated with an asterisk in the list below. Note that some commands may require administrator privileges. A number of commands involving specialized system or network administration have been omitted.

The commands given below remain in wide use but Microsoft has shifted its corporate emphasis to a new command shell called Powershell that is described on another page. This new command shell is included with Windows 7.
ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
BCDBOOT* Used to copy critical files to the system partition and to create a new system BCD store.
BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files byte-by-byte
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.
DEL Deletes one or more files.
DIR Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
DISKCOPY Copies the contents of one floppy disk to another.
DISKPART Displays or configures Disk Partition properties. A separte command interpreter with a sub-set of commands.
DOSKEY Edits command lines, recalls Windows commands, and creates macros.
DRIVERQUERY Displays current device driver status and properties.
ECHO Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE Deletes one or more files.
EXIT Quits and closes the command shell.
EXPAND Expands one or more compressed files.
FC Compares two files or sets of files, and displays the differences between them.
FIND Searches for a text string in a file or files.
FINDSTR Searches for strings in files.
FOR Runs a specified command for each item in a set.
FORFILES Selects files in a folder for batch processing.
FORMAT Formats a disk for use with Windows.
FSUTIL Displays or configures the file system properties.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Directs the Windows command interpreter to a labeled line in a batch program.
GPRESULT Displays Group Policy information for machine or user.
GRAFTABL Enables Windows to display an extended character set in graphics mode.
HELP Provides Help information for Windows commands.
ICACLS Display, modify, backup, or restore ACLs for files and directories (more here).
IF Performs conditional processing in batch programs.
IPCONFIG Displays all current TCP/IP network configuration values
LABEL Creates, changes, or deletes the volume label of a disk.
MD Creates a directory.
MKDIR Creates a directory.
MKLINK Creates Symbolic Links and Hard Links
MODE Configures a system device.
MORE Displays output one screen at a time.
MOVE Moves one or more files from one directory to another directory.
OPENFILES Queries, displays, or disconnects open files or files opened by network users.
PATH Displays or sets a search path for executable files.
PAUSE Suspends processing of a batch file and displays a message.
POPD Restores the previous value of the current directory saved by PUSHD.
PRINT Prints a text file.
PROMPT Changes the Windows command prompt.
PUSHD Saves the current directory then changes it.
RD Removes a directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Designates comments (remarks) in batch files
REN Renames a file or files.
RENAME Renames a file or files.
REPLACE Replaces files.
RMDIR Removes a directory.
ROBOCOPY Advanced utility to copy files and directory trees
SET Displays, sets, or removes environment variables for current session.
SETLOCAL Begins localization of environment changes in a batch file.
SETX Sets environment variables.
SC Displays or configures services (background processes).
SCHTASKS Schedules commands and programs to run on a computer.
SHIFT Shifts the position of replaceable parameters in batch files.
SHUTDOWN Allows proper local or remote shutdown of machine.
SORT Sorts input.
START Starts a separate window to run a specified program or command.
SUBST Associates a path with a drive letter.
SYSTEMINFO Displays machine specific properties and configuration.
TAKEOWN Allows an administrator to take ownership of a file (more here).
TASKLIST Displays all currently running tasks including services.
TASKKILL Kill or stop a running process or application.
TIME Displays or sets the system time.
TIMEOUT Pauses the command processor for the specified number of seconds.More here.
TITLE Sets the window title for a CMD.EXE session.
TREE Graphically displays the directory structure of a drive or path.
TYPE Displays the contents of a text file.
VER Displays the Windows version.
VERIFY Tells Windows whether to verify that your files are written correctly to a disk.
VOL Displays a disk volume label and serial number.
VSSADMIN Volume Shadow Copy Service administration tool
WHERE Displays the location of files that match a search pattern.
XCOPY Copies files and directory trees.
WMIC Displays WMI information inside interactive command shell.

*New to Windows 7

Useful Tools for Windows XP from the Server 2003 Resource Kit

Useful Tools for Windows XP from the Server 2003 Resource Kit

Many of the command-line tools from the Windows Server 2003 resource kit can be used in Windows XP. Some are described here.

Microsoft provides a large assortment of command-line tools, which can be obtained in a variety of ways. For users of Windows XP Professional, there are three major sources. One set of "native" tools is part of the standard installation and these are listed on another page. A second set, called "support tools", can be installed from a full version of Windows XP Professional or downloaded. These are the subject of this page on the present site. A third set is part of the Windows Server 2003 Resource Kit but are applicable to Windows XP. They can be downloaded here and are the subject of this article.

As would be expected, the Windows 2003 Server tools are intended for large networked systems and many are not appropriate for typical home systems. Nonetheless, many can be useful in a simple system. I have made a somewhat arbitrary selection of those that seem most helpful and discuss them below. Note that some of these tools are actually graphical (GUI) tools that are opened from the command line and this is indicated where it applies. A full list of the tools is available at the Microsoft download site. Once they are installed. the Help and Support Center will contain a list with descriptions and syntax for their use.

Cdburn.exe: ISO CD-ROM Burner Tool

CDBurn is a command-line tool that allows the user to write data images from image files located on the hard drive to a CD. The data image can be any kind of data, even raw data. This tool can also be used to erase CD-RW media.

Chklnks.exe: Link Check Wizard

Link Check Wizard (ChkLnks) is a GUI tool that scans all the link (shortcut) files on a computer to determine whether or not the shortcuts point to existing applications or documents. When Link Check Wizard does not find an associated application or document, the wizard lists that file as a dead link, giving you the option to remove it.

Cleanspl.exe: Spooler Cleaner
Spooler Cleaner (CleanSpl) is a GUI tool that restores the print spooler to its original state. It deletes all print jobs, printers, printer drivers, and spool files on a specified local or remote server.
Creatfil.exe: Create File

CreatFil creates a blank file of a specified size, filled with space characters.
Diskraid.exe: RAID Configuration Tool

DiskRaid is a command-line tool that enables configuration and management of redundant array of independent (or inexpensive) disks (RAID) storage subsystems.

Dvdburn.exe: ISO DVD Burner Tool
DVDBurn is a command-line tool that allows the user to write DVD images from image files located on the hard drive to DVD media. The data image can be created by any program capable of producing DVD image files. You can also use this tool to erase DVD media.

Empty.exe: Free Working Set Tool
Free Working Set Tool (Empty) is a command-line tool that frees the working set of a specified task or process, making those page frames available for other processes.

Iniman.exe: Initialization Files Manipulation Tool
IniMan is a command-line tool that enables you to add, delete, modify, or query sections or keys in an .ini file.

Instsrv.exe: Service Installer
Service Installer (InstSrv) is a command-line tool that installs and uninstalls executable services and assigns names to them.

Kernrate.exe: Kernel Profiling Tool
Kernel Profiling Tool (KernRate) is a command-line tool that is a CPU sample profiler. A sample profiler monitors performance and reports back to the user. KernRate reports on kernel and user-mode processes to provide information about CPU activity. Use KernRate to identify which processes are causing a CPU bottleneck.

Linkspeed.exe: Link Speed
Link Speed is a command-line tool that displays the speed of the connection between computers on a network.

Memmonitor.exe: Memory Monitor
MemMonitor is a command-line tool that monitors the memory a process uses
Memtriage.exe: Resource Leak Triage Tool

MemTriage is a command-line tool that detects a possible resource leak on a running system. MemTriage records process information or current kernel pool information and saves it to a log file.

Now.exe: STDOUT Current Date and Time
Now reads standard input (STDIN) and then displays, on standard output (STDOUT), the current date and time followed by the STDIN. Used alone, it displays the current date and time.

Ntimer.exe: Windows Program Timer
NTimer is a command-line tool that measures how long a program runs. NTimer shows elapsed time, time in user mode, and time in privileged mode.

Oh.exe: Open Handles
Open Handles is a command-line tool that shows the handles of all open windows. OH can also be used to show only information about a specific process, object type, or object name.

Oleview.exe: OLE/COM Object Viewer
OLE/COM Object Viewer (OLEView) is a GUI tool that allows you to manage all Microsoft Component Object Model (COM) classes installed on your computer.

Pathman.exe: Path Manager
PathMan is a command-line tool that adds or removes components from system or user paths.

Pmon.exe: Process Resource Monitor
Process Resource Monitor (PMon) is a command-line tool that displays several measures of the CPU and memory use of processes running on the system. The PMon display appears in the command window.

Printdriverinfo.exe: Drivers Source
Drivers Source (PrintDriverInfo) is a command-line tool that is used to collect information about printer drivers and is primarily used for support purposes.

Qgrep.exe
Qgrep is a command-line tool that is used to search a file or list of files for a specific string or pattern and return the line containing the match. QGrep also allows you to search multiple files and subdirectories. Qgrep is similar to the UNIX tool "grep".

Remapkey.exe: Remap Windows Keyboard Layout
RemapKey is a GUI tool that changes the layout of a keyboard by remapping the scan codes of the keys.

Robocopy.exe: Robust File Copy Utility
A versatile utility for maintaining an identical copy of a folder and its sub-folders in more than one location,

Setprinter.exe: Spooler Configuration Tool
Spooler Configuration Tool is a command-line tool that is used to set configurations of local and remote printers

Sleep.exe: Batch File Wait
Sleep is a command-line tool that causes the computer to wait for a specified amount of time. For use in batch files
Splinfo.exe: Print Spooler Information

SplInfo is a command-line tool that collects information from the print spooler and displays it.

Tail.exe
Tail is a command-line tool that displays a user-specified number of the last lines of a text file, such as a log file, in a console window.

Revealing XCOPY

The syntax and use of the command "Xcopy" is described. Of all the command line executables, Xcopy is one of the most useful for the average home PC user. It provides a powerful and versatile method for copying and backing up files and directories.

Syntax of Xcopy command

Xcopy has a large number of possible switches, which gives the command a great deal of flexibility. The syntax for the command is given by:
XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W] [/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U] [/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z] [/EXCLUDE:file1[+file2][+file3]...]

Upper case letters have been used above but the command is case-insensitive. A description of the various switches is given in Table I. Note that Windows Vista has an additional switch "/B". The function of this switch is to copy a Symbolic Link itself instead of the target of the link. Windows 7 has added "/J" to use unbuffered I/O for large files.

Table I. Description of switches for the command Xcopy Switch Description

/A Copies only files with the archive attribute set, doesn't change the attribute.

/M Copies only files with the archive attribute set, turns off the archive attribute. Useful in backup.

/D:m-d-y Copies files changed on or after the specified date. If no date is given, copies only those files whose source time is newer than the destination time.
Useful in backup.

/P Prompts you before creating each destination file.

/S Copies directories and subdirectories except empty ones.

/E Copies directories and subdirectories, including empty ones. Same as /S /E. May be used to modify /T.

/V Verifies each new file. Not used by Windows XP.

/W Prompts you to press a key before copying.

/C Continues copying even if errors occur.

/I If destination does not exist and copying more than one file, assumes that destination must be a directory.

/Q Does not display file names while copying.

/F Displays full source and destination file names while copying.

/L Displays files that would be copied.

/G Allows the copying of encrypted files to destination that does not support encryption.

/H Copies hidden and system files also.

/R Overwrites read-only files.

/T Creates directory structure, but does not copy files. Does not include empty directories or subdirectories.

/U Copies only files that already exist in destination.

/K Copies attributes. Normal Xcopy will reset read-only attributes.

/N Copies using the generated "short" names. May be necessary when copying from
NTFS to FAT16.

/O Copies file ownership and ACL information.

/X Copies file audit settings (implies /O).

/Y Suppresses prompting to confirm that you want to overwrite an existing destination file. May be preset in the COPYCMD environment variable

/-Y Prompts to confirm you want to overwrite an existing destination file.

/Z Copies over a network in restartable mode.

/EXCLUDE:file1[+file2][+file3]... Specifies a list of files containing strings to be excluded. Tricky to use. See below.

/B Copies a Symbolic Link itself instesd of the target of the link. (Windows Vista/Windows 7)
/J Copies using unbuffered I/O. Recommended for very large files. (Windows 7)
Applications of Xcopy

Xcopy provides an excellent tool for backing up selected folders. With appropriate switches, a variety of backup scenarios can be created. One possible backup configuration would be to copy only those files that have been changed. Here is an example command: xcopy C:\somefolder E:\backupfolder /D /E /C /R /H /I /K /Y This command will copy all files, including those in sub-folders, that are newer in the source folder. It will copy hidden as well as read-only files and will create the destination folder and/or sub-folders if they do not already exist.

The next example shows the use of a wildcard; it collects all files of a given type and copies them into one place. The command xcopy C:\*.mp3 E:\mp3folder /S /I /C > E:\mp3List.txt will collect all MP3 files on the C: drive and copy them to a folder on the E: drive. It also creates a list of the files copied and places the list on the E: drive. This simple command preserves the sub-folder structure. If desired, a more advanced script could be written that places all MP3 files in one folder with no sub-folders.
Excluding files and folders

A useful feature of Xcopy is the ability to exclude certain files and/or folders from being copied by means of the "/Exclude" switch. All names containing a given string of characters can be excluded. Unfortunately, Microsoft's description of the switch is neither a model of clarity nor accurate. In fact, postings on the Internet indicate considerable confusion exists about how to implement this handy feature. Perhaps the list below will help clarify how to use it.

1. The strings contained in the names of the files and/or folders to be excluded are not entered directly in the command switch itself.

2. The entry in the command switch is one or more text files that list the strings to be excluded.

3. The format of the switch is /Exclude:{path}list_of_exclusions.txt Note the colon between Exclude and the name of the file that lists the exclusions. Although more than one exclusion file can be used, stick with one if you can.

4. The name of the file that lists exclusions cannot have spaces. Quoting does not help.

5. Be careful with pathnames. Remember that operations are relative to the working directory for the command prompt. I suggest placing the exclusion list in the top directory of the directories being copied and opening the command prompt in the directory just above the directory and sub-directories to be copied. (Go here if you don't know how to open the command prompt wherever you want.) The various relative paths will then be simple. If you open the command prompt in the default location, things can get complicated.

6. The structure of the exclusions list is one exclusion string per line. Wildcards are not used and do not work. If you want to exclude all files whose names contain ABC, simply place ABC on one line of the exclusion file. If it is being used together with the switch "/S", the exclusion file will apply to sub-directories as well as the main directory.

7. To exclude a particular sub-directory, place its name in the exclusion file with backward slashes before and after its name, viz., \excluded_directory\

8. Use a text editor to create exclusion files. Do not use Microsoft Word or other word processor unless you are careful to create text files. Use ANSI encoding. When I tried UTF-8 encoding, the file did not work.

Exit codes for Xcopy

Many commands issue integer exit codes to indicate the status of the command after it is run. The exit codes for Xcopy are given in Table II. When placed in "If" statements, these error codes can be useful in batch files .
Table II. Exit codes for Xcopy Exit code Description
0 Files were copied without error.
1 No files were found to copy.
2 The user pressed Ctrl+C to terminate xcopy.
4 Various errors including insufficient memory or disk space, an invalid drive name, or invalid syntax.
5 Disk write error occurred.

Wednesday, June 2, 2010

How Network Works??


Related Categories
Computer Networking
What is a computer Network?


A network is any collection of independent computers that communicate with one another over a shared network medium.A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When networks at multiple locations are connected using services available from phone companies, people can send e-mail, share links to the global Internet, or conduct video conferences in real time with other remote users. As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important.

Every network includes:

* At least two computers Server or Client workstation.
* Networking Interface Card's (NIC)
* A connection medium, usually a wire or cable, although wireless communication between networked computers and peripherals is also possible.
* Network Operating system software, such as Microsoft Windows NT or 2000, Novell NetWare, Unix and Linux.

Types of Networks:
LANs (Local Area Networks)

A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.

WANs (Wide Area Networks)

Wide area networking combines multiple LANs that are geographically separate. This is accomplished by connecting the different LANs using services such as dedicated leased phone lines, dial-up phone lines (both synchronous and asynchronous), satellite links, and data packet carrier services. Wide area networking can be as simple as a modem and remote access server for employees to dial into, or it can be as complex as hundreds of branch offices globally linked using special routing protocols and filters to minimize the expense of sending data sent over vast distances.
Internet





The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.

With the meteoric rise in demand for connectivity, the Internet has become a communications highway for millions of users. The Internet was initially restricted to military and academic institutions, but now it is a full-fledged conduit for any and all forms of information and commerce. Internet websites now provide personal, educational, political and economic resources to every corner of the planet.
Intranet

With the advancements made in browser-based software for the Internet, many private organizations are implementing intranets. An intranet is a private network utilizing Internet-type tools, but available only within that organization. For large organizations, an intranet provides an easy access mode to corporate information for employees.

MANs (Metropolitan area Networks)

The refers to a network of computers with in a City.
VPN (Virtual Private Network)


VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network. Using a VPN helps you save money by using the public Internet instead of making long–distance phone calls to connect securely with your private network. There are two ways to create a VPN connection, by dialing an Internet service provider (ISP), or connecting directly to Internet.
Categories of Network:
Peer to Peer and Server/Client NetworkNetwork can be divided in to two main categories:

* Peer-to-peer.
* Server – based.

In peer-to-peer networking there are no dedicated servers or hierarchy among the computers. All of the computers are equal and therefore known as peers. Normally each computer serves as Client/Server and there is no one assigned to be an administrator responsible for the entire network.

Peer-to-peer networks are good choices for needs of small organizations where the users are allocated in the same general area, security is not an issue and the organization and the network will have limited growth within the foreseeable future.

The term Client/server refers to the concept of sharing the work involved in processing data between the client computer and the most powerful server computer.
The client/server network is the most efficient way to provide:

* Databases and management of applications such as Spreadsheets, Accounting, Communications and Document management.
* Network management.
* Centralized file storage.

The client/server model is basically an implementation of distributed or cooperative processing. At the heart of the model is the concept of splitting application functions between a client and a server processor. The division of labor between the different processors enables the application designer to place an application function on the processor that is most appropriate for that function. This lets the software designer optimize the use of processors--providing the greatest possible return on investment for the hardware.

Client/server application design also lets the application provider mask the actual location of application function. The user often does not know where a specific operation is executing. The entire function may execute in either the PC or server, or the function may be split between them. This masking of application function locations enables system implementers to upgrade portions of a system over time with a minimum disruption of application operations, while protecting the investment in existing hardware and software.

OSI ModelThe OSI Model:

Open System Interconnection (OSI) reference model has become an International standard and serves as a guide for networking. This model is the best known and most widely used guide to describe networking environments. Vendors design network products based on the specifications of the OSI model. It provides a description of how network hardware and software work together in a layered fashion to make communications possible. It also helps with trouble shooting by providing a frame of reference that describes how components are supposed to function.

There are seven to get familiar with and these are the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and the application layer.

* Physical Layer, is just that the physical parts of the network such as wires, cables, and there media along with the length. Also this layer takes note of the electrical signals that transmit data throughout system.

* Data Link Layer, this layer is where we actually assign meaning to the electrical signals in the network. The layer also determines the size and format of data sent to printers, and other devices. Also I don't want to forget that these are also called nodes in the network. Another thing to consider in this layer is will also allow and define the error detection and correction schemes that insure data was sent and received.

* Network Layer, this layer provides the definition for the connection of two dissimilar networks.

* Transport Layer, this layer allows data to be broken into smaller packages for data to be distributed and addressed to other nodes (workstations).

* Session Layer, this layer helps out with the task to carry information from one node (workstation) to another node (workstation). A session has to be made before we can transport information to another computer.

* Presentation Layer, this layer is responsible to code and decode data sent to the node.

* Application Layer, this layer allows you to use an application that will communicate with say the operation system of a server. A good example would be using your web browser to interact with the operating system on a server such as Windows NT, which in turn gets the data you requested.

Network Architectures:
Ethernet Network ArchitectureEthernet

Ethernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today. The Institute for Electrical and Electronic Engineers (IEEE) defines the Ethernet standard as IEEE Standard 802.3. This standard defines rules for configuring an Ethernet network as well as specifying how elements in an Ethernet network interact with one another. By adhering to the IEEE standard, network equipment and network protocols can communicate efficiently.
Fast Ethernet

For Ethernet networks that need higher transmission speeds, the Fast Ethernet standard (IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure. There are three types of Fast Ethernet: 100BASE-TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which utilizes an extra two wires for use with level 3 UTP cable. The 100BASE-TX standard has become the most popular due to its close compatibility with the 10BASE-T Ethernet standard. For the network manager, the incorporation of Fast Ethernet into an existing configuration presents a host of decisions. Managers must determine the number of users in each site on the network that need the higher throughput, decide which segments of the backbone need to be reconfigured specifically for 100BASE-T and then choose the necessary hardware to connect the 100BASE-T segments with existing 10BASE-T segments. Gigabit Ethernet is a future technology that promises a migration path beyond Fast Ethernet so the next generation of networks will support even higher data transfer speeds.
Token Ring ArchitectureToken Ring

Token Ring is another form of network configuration which differs from Ethernet in that all messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in tokens, which are passed along the ring and viewed by each device. When a device sees a message addressed to it, that device copies the message and then marks that message as being read. As the message makes its way along the ring, it eventually gets back to the sender who now notes that the message was received by the intended device. The sender can then remove the message and free that token for use by others.

Various PC vendors have been proponents of Token Ring networks at different times and thus these types of networks have been implemented in many organizations.
FDDI architectureFDDI

FDDI (Fiber-Distributed Data Interface) is a standard for data transmission on fiber optic lines in a local area network that can extend in range up to 200 km (124 miles). The FDDI protocol is based on the token ring protocol. In addition to being large geographically, an FDDI local area network can support thousands of users.
Protocols:

Network protocols are standards that allow computers to communicate. A protocol defines how computers identify one another on a network, the form that the data should take in transit, and how this information is processed once it reaches its final destination. Protocols also define procedures for handling lost or damaged transmissions or "packets." TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms), IPX (for Novell NetWare), DECnet (for networking Digital Equipment Corp. computers), AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks) are the main types of network protocols in use today.

Although each network protocol is different, they all share the same physical cabling. This common method of accessing the physical network allows multiple protocols to peacefully coexist over the network media, and allows the builder of a network to use common hardware for a variety of protocols. This concept is known as "protocol independence,"

Some Important Protocols and their job:
Protocol Acronym Its Job
Point-To-Point TCP/IP The backbone protocol of the internet. Popular also for intranets using the internet
Transmission Control Protocol/internet Protocol TCP/IP The backbone protocol of the internet. Popular also for intranets using the internet
Internetwork Package Exchange/Sequenced Packet Exchange IPX/SPX This is a standard protocol for Novell Network Operating System
NetBIOS Extended User Interface NetBEUI This is a Microsoft protocol that doesn't support routing to other networks

File Transfer Protocol FTP Used to send and receive files from a remote host

Hyper Transfer Protocol HTTP Used for the web to send documents that are encoded in HTML.

Network File Services NFS Allows network nodes or workstations to access files and drives as if they were their own.

Simple Mail Transfer Protocol SMTP Used to send Email over a network

Telnet Used to connect to a host and emulate a terminal that the remote server can recognize
Introduction to TCP/IP Networks:

TCP/IP-based networks play an increasingly important role in computer networks. Perhaps one reason for their appeal is that they are based on an open specification that is not controlled by any vendor.
What Is TCP/IP?

TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is not limited just to these two protocols, however. Frequently, the term TCP/IP is used to refer to a group of protocols related to the TCP and IP protocols such as the User Datagram Protocol (UDP), File Transfer Protocol (FTP), Terminal Emulation Protocol (TELNET), and so on.

The Origins of TCP/IP

In the late 1960s, DARPA (the Defense Advanced Research Project Agency), in the United States, noticed that there was a rapid proliferation of computers in military communications. Computers, because they can be easily programmed, provide flexibility in achieving network functions that is not available with other types of communications equipment. The computers then used in military communications were manufactured by different vendors and were designed to interoperate with computers from that vendor only. Vendors used proprietary protocols in their communications equipment. The military had a multi vendor network but no common protocol to support the heterogeneous equipment from different vendors
Net work Cables and Stuff:

In the network you will commonly find three types of cables used these are the, coaxial cable, fiber optic and twisted pair.
Thick Coaxial Cable

This type cable is usually yellow in color and used in what is called thicknets, and has two conductors. This coax can be used in 500-meter lengths. The cable itself is made up of a solid center wire with a braided metal shield and plastic sheathing protecting the rest of the wire.
Thin Coaxial Cable

As with the thick coaxial cable is used in thicknets the thin version is used in thinnets. This type cable is also used called or referred to as RG-58. The cable is really just a cheaper version of the thick cable.
Fiber Optic Cable

As we all know fiber optics are pretty darn cool and not cheap. This cable is smaller and can carry a vast amount of information fast and over long distances.
Twisted Pair Cables

These come in two flavors of unshielded and shielded.
Unshielded Twisted Pair and Shielded Twisted Pair
Shielded Twisted Pair (STP)

Is more common in high-speed networks. The biggest difference you will see in the UTP and STP is that the STP use's metallic shield wrapping to protect the wire from interference.

-Something else to note about these cables is that they are defined in numbers also. The bigger the number the better the protection from interference. Most networks should go with no less than a CAT 3 and CAT 5 is most recommended.

-Now you know about cables we need to know about connectors. This is pretty important and you will most likely need the RJ-45 connector. This is the cousin of the phone jack connector and looks real similar with the exception that the RJ-45 is bigger. Most commonly your connector are in two flavors and this is BNC (Bayonet Naur Connector) used in thicknets and the RJ-45 used in smaller networks using UTP/STP.
Unshielded Twisted Pair (UTP)

This is the most popular form of cables in the network and the cheapest form that you can go with. The UTP has four pairs of wires and all inside plastic sheathing. The biggest reason that we call it Twisted Pair is to protect the wires from interference from themselves. Each wire is only protected with a thin plastic sheath.
Ethernet Cabling

Now to familiarize you with more on the Ethernet and it's cabling we need to look at the 10's. 10Base2, is considered the thin Ethernet, thinnet, and thinwire which uses light coaxial cable to create a 10 Mbps network. The cable segments in this network can't be over 185 meters in length. These cables connect with the BNC connector. Also as a note these unused connection must have a terminator, which will be a 50-ohm terminator.

10Base5, this is considered a thicknet and is used with coaxial cable arrangement such as the BNC connector. The good side to the coaxial cable is the high-speed transfer and cable segments can be up to 500 meters between nodes/workstations. You will typically see the same speed as the 10Base2 but larger cable lengths for more versatility.

10BaseT, the “T” stands for twisted as in UTP (Unshielded Twisted Pair) and uses this for 10Mbps of transfer. The down side to this is you can only have cable lengths of 100 meters between nodes/workstations. The good side to this network is they are easy to set up and cheap! This is why they are so common an ideal for small offices or homes.

100BaseT, is considered Fast Ethernet uses STP (Shielded Twisted Pair) reaching data transfer of 100Mbps. This system is a little more expensive but still remains popular as the 10BaseT and cheaper than most other type networks. This on of course would be the cheap fast version.

10BaseF, this little guy has the advantage of fiber optics and the F stands for just that. This arrangement is a little more complicated and uses special connectors and NIC's along with hubs to create its network. Pretty darn neat and not to cheap on the wallet.

An important part of designing and installing an Ethernet is selecting the appropriate Ethernet medium. There are four major types of media in use today: Thickwire for 10BASE5 networks, thin coax for 10BASE2 networks, unshielded twisted pair (UTP) for 10BASE-T networks and fiber optic for 10BASE-FL or Fiber-Optic Inter-Repeater Link (FOIRL) networks. This wide variety of media reflects the evolution of Ethernet and also points to the technology's flexibility. Thickwire was one of the first cabling systems used in Ethernet but was expensive and difficult to use. This evolved to thin coax, which is easier to work with and less expensive.

Network Topologies:
What is a Network topology?

A network topology is the geometric arrangement of nodes and cable links in a LAN,

There are three topology's to think about when you get into networks. These are the star, rind, and the bus.

Star, in a star topology each node has a dedicated set of wires connecting it to a central network hub. Since all traffic passes through the hub, the hub becomes a central point for isolating network problems and gathering network statistics.

Ring, a ring topology features a logically closed loop. Data packets travel in a single direction around the ring from one network device to the next. Each network device acts as a repeater, meaning it regenerates the signal

Bus, the bus topology, each node (computer, server, peripheral etc.) attaches directly to a common cable. This topology most often serves as the backbone for a network. In some instances, such as in classrooms or labs, a bus will connect small workgroups
Collisions:

Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result.

Minimizing collisions is a crucial element in the design and operation of networks. Increased collisions are often the result of too many users on the network, which results in a lot of contention for network bandwidth. This can slow the performance of the network from the user's point of view. Segmenting the network, where a network is divided into different pieces joined together logically with a bridge or switch, is one way of reducing an overcrowded network.
Ethernet Products:

The standards and technology that have just been discussed help define the specific products that network managers use to build Ethernet networks. The following text discusses the key products needed to build an Ethernet LAN.
Transceivers

Transceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver. Many Ethernet devices provide an AUI connector to allow the user to connect to any media type via an external transceiver. The AUI connector consists of a 15-pin D-shell type connector, female on the computer side, male on the transceiver side. Thickwire (10BASE5) cables also use transceivers to allow connections.

For Fast Ethernet networks, a new interface called the MII (Media Independent Interface) was developed to offer a flexible way to support 100 Mbps connections. The MII is a popular way to connect 100BASE-FX links to copper-based Fast Ethernet devices.
Network Interface CardsNetwork Interface Cards:

Network interface cards, commonly referred to as NICs, and are used to connect a PC to a network. The NIC provides a physical connection between the networking cable and the computer's internal bus. Different computers have different bus architectures; PCI bus master slots are most commonly found on 486/Pentium PCs and ISA expansion slots are commonly found on 386 and older PCs. NICs come in three basic varieties: 8-bit, 16-bit, and 32-bit. The larger the number of bits that can be transferred to the NIC, the faster the NIC can transfer data to the network cable.

Many NIC adapters comply with Plug-n-Play specifications. On these systems, NICs are automatically configured without user intervention, while on non-Plug-n-Play systems, configuration is done manually through a setup program and/or DIP switches.

Cards are available to support almost all networking standards, including the latest Fast Ethernet environment. Fast Ethernet NICs are often 10/100 capable, and will automatically set to the appropriate speed. Full duplex networking is another option, where a dedicated connection to a switch allows a NIC to operate at twice the speed.
Hubs/Repeaters:

Hubs/repeaters are used to connect together two or more Ethernet segments of any media type. In larger designs, signal quality begins to deteriorate as segments exceed their maximum length. Hubs provide the signal amplification required to allow a segment to be extended a greater distance. A hub takes any incoming signal and repeats it out all ports.

Ethernet hubs are necessary in star topologies such as 10BASE-T. A multi-port twisted pair hub allows several point-to-point segments to be joined into one network. One end of the point-to-point link is attached to the hub and the other is attached to the computer. If the hub is attached to a backbone, then all computers at the end of the twisted pair segments can communicate with all the hosts on the backbone. The number and type of hubs in any one-collision domain is limited by the Ethernet rules. These repeater rules are discussed in more detail later.
Network Type Max Nodes
Per Segment Max Distance
Per Segment
10BASE-T
10BASE2
10BASE5
10BASE-FL 2
30
100
2 100m
185m
500m
2000m
Adding Speed:

While repeaters allow LANs to extend beyond normal distance limitations, they still limit the number of nodes that can be supported. Bridges and switches, however, allow LANs to grow significantly larger by virtue of their ability to support full Ethernet segments on each port. Additionally, bridges and switches selectively filter network traffic to only those packets needed on each segment - this significantly increases throughput on each segment and on the overall network. By providing better performance and more flexibility for network topologies, bridges and switches will continue to gain popularity among network managers.
Bridges:

The function of a bridge is to connect separate networks together. Bridges connect different networks types (such as Ethernet and Fast Ethernet) or networks of the same type. Bridges map the Ethernet addresses of the nodes residing on each network segment and allow only necessary traffic to pass through the bridge. When a packet is received by the bridge, the bridge determines the destination and source segments. If the segments are the same, the packet is dropped ("filtered"); if the segments are different, then the packet is "forwarded" to the correct segment. Additionally, bridges do not forward bad or misaligned packets.

Bridges are also called "store-and-forward" devices because they look at the whole Ethernet packet before making filtering or forwarding decisions. Filtering packets, and regenerating forwarded packets enable bridging technology to split a network into separate collision domains. This allows for greater distances and more repeaters to be used in the total network design.
Ethernet Switches
Ethernet Switches:

Ethernet switches are an expansion of the concept in Ethernet bridging. LAN switches can link four, six, ten or more networks together, and have two basic architectures: cut-through and store-and-forward. In the past, cut-through switches were faster because they examined the packet destination address only before forwarding it on to its destination segment. A store-and-forward switch, on the other hand, accepts and analyzes the entire packet before forwarding it to its destination.

It takes more time to examine the entire packet, but it allows the switch to catch certain packet errors and keep them from propagating through the network. Both cut-through and store-and-forward switches separate a network into collision domains, allowing network design rules to be extended. Each of the segments attached to an Ethernet switch has a full 10 Mbps of bandwidth shared by fewer users, which results in better performance (as opposed to hubs that only allow bandwidth sharing from a single Ethernet). Newer switches today offer high-speed links, FDDI, Fast Ethernet or ATM. These are used to link switches together or give added bandwidth to high-traffic servers. A network composed of a number of switches linked together via uplinks is termed a "collapsed backbone" network.
Routers:

Routers filter out network traffic by specific protocol rather than by packet address. Routers also divide networks logically instead of physically. An IP router can divide a network into various subnets so that only traffic destined for particular IP addresses can pass between segments. Network speed often decreases due to this type of intelligent forwarding. Such filtering takes more time than that exercised in a switch or bridge, which only looks at the Ethernet address. However, in more complex networks, overall efficiency is improved by using routers.
What is a network firewall?

A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. Probably the most important thing to recognize about a firewall is that it implements an access control policy. If you don't have a good idea of what kind of access you want to allow or to deny, a firewall really won't help you. It's also important to recognize that the firewall's configuration, because it is a mechanism for enforcing policy, imposes its policy on everything behind it. Administrators for firewalls managing the connectivity for a large number of hosts therefore have a heavy responsibility.
Network Design Criteria:

Ethernets and Fast Ethernets have design rules that must be followed in order to function correctly. Maximum number of nodes, number of repeaters and maximum segment distances are defined by the electrical and mechanical design properties of each type of Ethernet and Fast Ethernet media.

A network using repeaters, for instance, functions with the timing constraints of Ethernet. Although electrical signals on the Ethernet media travel near the speed of light, it still takes a finite time for the signal to travel from one end of a large Ethernet to another. The Ethernet standard assumes it will take roughly 50 microseconds for a signal to reach its destination.

Ethernet is subject to the "5-4-3" rule of repeater placement: the network can only have five segments connected; it can only use four repeaters; and of the five segments, only three can have users attached to them; the other two must be inter-repeater links.

If the design of the network violates these repeater and placement rules, then timing guidelines will not be met and the sending station will resend that packet. This can lead to lost packets and excessive resent packets, which can slow network performance and create trouble for applications. Fast Ethernet has modified repeater rules, since the minimum packet size takes less time to transmit than regular Ethernet. The length of the network links allows for a fewer number of repeaters. In Fast Ethernet networks, there are two classes of repeaters. Class I repeaters have a latency of 0.7 microseconds or less and are limited to one repeater per network. Class II repeaters have a latency of 0.46 microseconds or less and are limited to two repeaters per network. The following are the distance (diameter) characteristics for these types of Fast Ethernet repeater combinations:
Fast Ethernet Copper Fiber
No Repeaters
One Class I Repeater
One Class II Repeater
Two Class II Repeaters 100m
200m
200m
205m 412m*
272m
272m
228m
* Full Duplex Mode 2 km



When conditions require greater distances or an increase in the number of nodes/repeaters, then a bridge, router or switch can be used to connect multiple networks together. These devices join two or more separate networks, allowing network design criteria to be restored. Switches allow network designers to build large networks that function well. The reduction in costs of bridges and switches reduces the impact of repeater rules on network design.

Each network connected via one of these devices is referred to as a separate collision domain in the overall network.
Types of Servers:
Device Servers

A device server is defined as a specialized, network-based hardware device designed to perform a single or specialized set of server functions. It is characterized by a minimal operating architecture that requires no per seat network operating system license, and client access that is independent of any operating system or proprietary protocol. In addition the device server is a "closed box," delivering extreme ease of installation, minimal maintenance, and can be managed by the client remotely via a Web browser.

Print servers, terminal servers, remote access servers and network time servers are examples of device servers which are specialized for particular functions. Each of these types of servers has unique configuration attributes in hardware or software that help them to perform best in their particular arena.
Print Servers

Print servers allow printers to be shared by other users on the network. Supporting either parallel and/or serial interfaces, a print server accepts print jobs from any person on the network using supported protocols and manages those jobs on each appropriate printer.

Print servers generally do not contain a large amount of memory; printers simply store information in a queue. When the desired printer becomes available, they allow the host to transmit the data to the appropriate printer port on the server. The print server can then simply queue and print each job in the order in which print requests are received, regardless of protocol used or the size of the job.
Multiport Device Servers

Devices that are attached to a network through a multiport device server can be shared between terminals and hosts at both the local site and throughout the network. A single terminal may be connected to several hosts at the same time (in multiple concurrent sessions), and can switch between them. Multiport device servers are also used to network devices that have only serial outputs. A connection between serial ports on different servers is opened, allowing data to move between the two devices.

Given its natural translation ability, a multi-protocol multiport device server can perform conversions between the protocols it knows, like LAT and TCP/IP. While server bandwidth is not adequate for large file transfers, it can easily handle host-to-host inquiry/response applications, electronic mailbox checking, etc. And it is far more economical than the alternatives of acquiring expensive host software and special-purpose converters. Multiport device and print servers give their users greater flexibility in configuring and managing their networks.

Whether it is moving printers and other peripherals from one network to another, expanding the dimensions of interoperability or preparing for growth, multiport device servers can fulfill your needs, all without major rewiring.
Access Servers

While Ethernet is limited to a geographic area, remote users such as traveling sales people need access to network-based resources. Remote LAN access, or remote access, is a popular way to provide this connectivity. Access servers use telephone services to link a user or office with an office network. Dial-up remote access solutions such as ISDN or asynchronous dial introduce more flexibility. Dial-up remote access offers both the remote office and the remote user the economy and flexibility of "pay as you go" telephone services. ISDN is a special telephone service that offers three channels, two 64 Kbps "B" channels for user data and a "D" channel for setting up the connection. With ISDN, the B channels can be combined for double bandwidth or separated for different applications or users. With asynchronous remote access, regular telephone lines are combined with modems and remote access servers to allow users and networks to dial anywhere in the world and have data access. Remote access servers provide connection points for both dial-in and dial-out applications on the network to which they are attached. These hybrid devices route and filter protocols and offer other services such as modem pooling and terminal/printer services. For the remote PC user, one can connect from any available telephone jack (RJ45), including those in a hotel rooms or on most airplanes.
Network Time Servers

A network time server is a server specialized in the handling of timing information from sources such as satellites or radio broadcasts and is capable of providing this timing data to its attached network. Specialized protocols such as NTP or udp/time allow a time server to communicate to other network nodes ensuring that activities that must be coordinated according to their time of execution are synchronized correctly. GPS satellites are one source of information that can allow global installations to achieve constant timing.
IP Addressing:

An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.

Example: 140.179.220.200

It is sometimes useful to view the values in their binary form.

140 .179 .220 .200

10001100.10110011.11011100.11001000

Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.
Address Classes:

There are 5 different address classes. You can determine which class any IP address is in by examining the first 4 bits of the IP address.

Class A addresses begin with 0xxx, or 1 to 126 decimal.

Class B addresses begin with 10xx, or 128 to 191 decimal.

Class C addresses begin with 110x, or 192 to 223 decimal.

Class D addresses begin with 1110, or 224 to 239 decimal.

Class E addresses begin with 1111, or 240 to 254 decimal.

Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses.

Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n).

Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn

Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn

Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn

In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the node part is defined by the last 2 octets (x.x.220.200).

In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 140.179.255.255 specifies the example broadcast address. Note that this is true regardless of the length of the node section.
Private Subnets:

There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as a lab or home LAN behind a NAT or proxy server or a router. It is always safe to use these because routers on the Internet will never forward packets coming from these addresses

Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive.
Subnet Masking

Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number.

For example, using our test IP address and the default Class B subnet mask, we get:

10001100.10110011.11110000.11001000 140.179.240.200 Class B IP Address

11111111.11111111.00000000.00000000 255.255.000.000 Default Class B Subnet Mask

10001100.10110011.00000000.00000000 140.179.000.000 Network Address
Default subnet masks:

Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000

Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000

Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000

CIDR -- Classless InterDomain Routing.

CIDR was invented several years ago to keep the internet from running out of IP addresses. The "classful" system of allocating IP addresses can be very wasteful; anyone who could reasonably show a need for more that 254 host addresses was given a Class B address block of 65533 host addresses. Even more wasteful were companies and organizations that were allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny percentage of the allocated Class A and Class B address space has ever been actually assigned to a host computer on the Internet.

People realized that addresses could be conserved if the class system was eliminated. By accurately allocating only the amount of address space that was actually needed, the address space crisis could be avoided for many years. This was first proposed in 1992 as a scheme called Supernetting.

The use of a CIDR notated address is the same as for a Classful address. Classful addresses can easily be written in CIDR notation (Class A = /8, Class B = /16, and Class C = /24)

It is currently almost impossible for an individual or company to be allocated their own IP address blocks. You will simply be told to get them from your ISP. The reason for this is the ever-growing size of the internet routing table. Just 5 years ago, there were less than 5000 network routes in the entire Internet. Today, there are over 90,000. Using CIDR, the biggest ISPs are allocated large chunks of address space (usually with a subnet mask of /19 or even smaller); the ISP's customers (often other, smaller ISPs) are then allocated networks from the big ISP's pool. That way, all the big ISP's customers (and their customers, and so on) are accessible via 1 network route on the Internet.

It is expected that CIDR will keep the Internet happily in IP addresses for the next few years at least. After that, IPv6, with 128 bit addresses, will be needed. Under IPv6, even sloppy address allocation would comfortably allow a billion unique IP addresses for every person on earth
Examining your network with commands:

Ping

PING is used to check for a response from another computer on the network. It can tell you a great deal of information about the status of the network and the computers you are communicating with.

Ping returns different responses depending on the computer in question. The responses are similar depending on the options used.

Ping uses IP to request a response from the host. It does not use TCP

.It takes its name from a submarine sonar search - you send a short sound burst and listen for an echo - a ping - coming back.

In an IP network, `ping' sends a short data burst - a single packet - and listens for a single packet in reply. Since this tests the most basic function of an IP network (delivery of single packet), it's easy to see how you can learn a lot from some `pings'.

To stop ping, type control-c. This terminates the program and prints out a nice summary of the number of packets transmitted, the number received, and the percentage of packets lost, plus the minimum, average, and maximum round-trip times of the packets.

Sample ping session

PING localhost (127.0.0.1): 56 data bytes
64 bytes from 127.0.0.1: icmp_seq=0 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=1 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=2 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=3 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=4 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=5 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=6 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=7 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=8 ttl=255 time=2 ms
64 bytes from 127.0.0.1: icmp_seq=9 ttl=255 time=2 ms

localhost ping statistics

10 packets transmitted, 10 packets received, 0% packet loss
round-trip min/avg/max = 2/2/2 ms
meikro$

The Time To Live (TTL) field can be interesting. The main purpose of this is so that a packet doesn't live forever on the network and will eventually die when it is deemed "lost." But for us, it provides additional information. We can use the TTL to determine approximately how many router hops the packet has gone through. In this case it's 255 minus N hops, where N is the TTL of the returning Echo Replies. If the TTL field varies in successive pings, it could indicate that the successive reply packets are going via different routes, which isn't a great thing.

The time field is an indication of the round-trip time to get a packet to the remote host. The reply is measured in milliseconds. In general, it's best if round-trip times are under 200 milliseconds. The time it takes a packet to reach its destination is called latency. If you see a large variance in the round-trip times (which is called "jitter"), you are going to see poor performance talking to the host
NSLOOKUP

NSLOOKUP is an application that facilitates looking up hostnames on the network. It can reveal the IP address of a host or, using the IP address, return the host name.

It is very important when troubleshooting problems on a network that you can verify the components of the networking process. Nslookup allows this by revealing details within the infrastructure.
NETSTAT

NETSTAT is used to look up the various active connections within a computer. It is helpful to understand what computers or networks you are connected to. This allows you to further investigate problems. One host may be responding well but another may be less responsive.
IPconfig

This is a Microsoft windows NT, 2000 command. It is very useful in determining what could be wrong with a network.

This command when used with the /all switch, reveal enormous amounts of troubleshooting information within the system.

Windows 2000 IP Configuration

Host Name . . . . . . . . . . . . : cowder
Primary DNS Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Broadcast
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . :
WAN (PPP/SLIP) Interface
Physical Address. . . . . . . . . : 00-53-45-00-00-00
DHCP Enabled. . . . . . . . . . . : No
IP Address. . . . . . . . . . . . : 12.90.108.123
Subnet Mask . . . . . . . . . . . : 255.255.255.255
Default Gateway . . . . . . . . . : 12.90.108.125
DNS Servers . . . . . . . . . . . : 12.102.244.2
204.127.129.2
Traceroute

Traceroute on Unix and Linux (or tracert in the Microsoft world) attempts to trace the current network path to a destination. Here is an example of a traceroute run to www.berkeley.edu:

$ traceroute www.berkeley.edu

traceroute to amber.Berkeley.EDU (128.32.25.12), 30 hops max, 40 byte packets

1 sf1-e3.wired.net (206.221.193.1) 3.135 ms 3.021 ms 3.616 ms

2 sf0-e2s2.wired.net (205.227.206.33) 1.829 ms 3.886 ms 2.772 ms

3 paloalto-cr10.bbnplanet.net (131.119.26.105) 5.327 ms 4.597 ms 5.729 ms

4 paloalto-br1.bbnplanet.net (131.119.0.193) 4.842 ms 4.615 ms 3.425 ms

5 sl-sj-2.sprintlink.net (4.0.1.66) 7.488 ms 38.804 ms 7.708 ms

6 144.232.8.81 (144.232.8.81) 6.560 ms 6.631 ms 6.565 ms

7 144.232.4.97 (144.232.4.97) 7.638 ms 7.948 ms 8.129 ms

8 144.228.146.50 (144.228.146.50) 9.504 ms 12.684 ms 16.648 ms

9 f5-0.inr-666-eva.berkeley.edu (198.128.16.21) 9.762 ms 10.611 ms 10.403 ms

10 f0-0.inr-107-eva.Berkeley.EDU (128.32.2.1) 11.478 ms 10.868 ms 9.367 ms

11 f8-0.inr-100-eva.Berkeley.EDU (128.32.235.100) 10.738 ms 11.693 ms 12.520 ms

The Microsoft NET command is a must-know for administrators. Study it. A list of the major commands:

C:\>net help computer
The syntax of this command is:


NET COMPUTER \\computername {/ADD | /DEL}

NET COMPUTER adds or deletes computers from a domain database. This
command is available only on Windows NT Servers.

\\computername Specifies the computer to add or delete from
the domain.
/ADD Adds the specified computer to the domain.
/DEL Removes the specified computer from the domain.

A brief summary follows:

net accounts Updates user accounts and modifies password and logon requirements.
net computer Adds or deletes computers from a domain.
net config Displays configuration info for workstation or server services.
net continue Reactivates a service that has been suspended by NET PAUSE.
net file Closes a shared file and removes file locks.
net group Adds, displays, or modifies global groups on servers.
net helpmsg Displays info about network messages such as error, warning, and alert messages.
net localgroup Modifies local groups on computers.
net name Adds or deletes an alias name for a computer.
net pause Suspends a service or resource. Pausing a service puts it on hold.
net print Displays print jobs and shared queues. For each queue, the display lists jobs, showing the size and status of each job, and the status of the queue.
net send Sends messages to other users or computers. The Messenger service must be running to receive messages.
net session Lists or disconnects sessions between the computer and other computers on the network.
net share Makes resources available to network users. When used without options, it lists information about all resources being shared on the computer.
net start Lists running services.
net statistics Displays the statistics log for the local Workstation or Server service.
net stop Stops services.
net time Synchronizes the computer's clock with the domain.
net use Connects a computer to a shared resource or disconnects a computer from a shared resource.
net user Creates and modifies user accounts on computers. When used without switches, it lists the user accounts for the computer.
net view Displays a list of resources being shared on a computer. When used without options, it displays a list of computers in the current domain or network.

Saturday, May 1, 2010

Cyclic Redundancy Check: what is it, and how do I get rid of it on my newly burnt CDs and DVDs?

When I burn a CD or DVD, I frequently get a "Cyclic Redundancy Check" error when I go to read it. The media has no scratches or anything obviously wrong, so why is this happening? And more importantly, what do I do?



A "Cyclic Redundancy Check", or more commonly just "CRC", is an error detection mechanism that makes sure that the data you're trying to read from media, such as hard disks, CDs and DVDs, is actually correct. By "correct", we mean that the data you read is in fact the data that was written.

When a CRC check fails, there are several possibilities and places to look.



A CRC works by taking a block of the data that is about to be written to the media, calculating a checksum (basically some math involving all the data, that results in a number), and writing that number, along with the original data, to the media. When the data is later read, that same calculation happens, and if a different number results, then an error is declared - the data read was not the same as the data written.

CRC checks happen each time you read the media. Many CD and DVD burning programs will include a read pass immediately after writing, to ensure that the data was written properly.

There are several ways that a checksum error could happen:

•A Bad Write: if the device that wrote the media had a problem while writing, it could have written the wrong data.

•Dirt in the Writer: dust or other obstructions in a CD or DVD writer can interfere with the laser and cause the bad data to be written.

•Bad Media: poor quality media, particularly CDs and DVDs, can sometimes "not take" the data that's written to them. Perhaps there's a flaw in the physical media. These types of flaws may not be visible to the naked eye - even a one-bit error can cause a CRC calculation to fail.

•Bad Write Alignment: it's fairly obvious that on CDs and DVDs data is written in a circle on the media. However, exactly where that circle lands is dependent on the alignment of the drive. It could be slightly off-center, or skewed in some way. This is frequently the case if a CD or DVD reads perfectly on the drive that wrote it, but fails when read on other drives.

•Scratches and Other Damage: you've mentioned that your media's not scratched, so this may not apply to you, but CRC checking is most commonly thought of as a way to detect errors that result from physical damage to the media after it's been written. And once again, remember that a tiny scratch, if in the wrong place, can do damage. If your problem is with multiple CDs or DVDs and you've been handling them properly, then it's unlikely that this is the case.

•Dirt in the Reader: much like dirt in the writer, dust and other particles can interfere with a CD or DVD reader's ability to read the media properly.

•Bad Read Alignment: again, much like bad write alignment, if the reader isn't tracking to the same "circle", it may not be able to read the data. Some drives are better at compensating for this than others.

•Bad Reading Drive: finally, it's always possible that the CD or DVD drive itself is having a problem reading in general.

"If you have a CD or DVD that is reporting a CRC error, try reading it on different drives."As you can see, there are lots of possibilities.

If the problem "travels" with the CD or DVD you've written ... meaning that it fails when read in several different devices, then the problem is most likely with the writer or the media itself.

If the problem happens only when read on one specific reader, then that reader, and not the writer or media, is most suspect.

Make sure that you're using high quality, brand name blank CDs and DVDs. Occasionally clean the inside of your computer, including carefully vacuuming the CD or DVD tray from the outside to remove excess dust. If there is an alignment problem, there's little you can do yourself - you'll need to use another drive.

Can bad data be "fixed"? - in a nutshell, no. I've actually oversimplified the role of a CRC above. It typically includes both error detection and correction. That means that the calculated checksum can often also be used to determine what data is wrong, and return the correct data instead, on the fly. This probably happens often, and you'd never notice. By the time a CRC error has been declared, enough errors have occurred that the error correction has failed. At that point, you're pretty much out of luck.

If you have a CD or DVD that is reporting a CRC error, try reading it on different drives. As I mentioned above, the ability of drives to compensate for things like alignment problems, or "weak" writes, varies, and what's unreadable on one might be readable on another. If you do find a drive that works, copy the data off immediately, and plan on burning it to a new CD or DVD on a writer that's known to be good.

Monday, April 26, 2010

SECURE YOUR USB DRIVES WITH BITLOCKER TO GO FOR WINDOWS 7

SECURE YOUR USB DRIVES WITH BITLOCKER TO GO FOR WINDOWS 7


WHEN MICROSOFT INTRODUCED WINDOWS VISTA, ONE OF THE BIG SECURITY FEATURES IN THAT OPERATING SYSTEM WAS BITLOCKER, A HARD DRIVE ENCRYPTION SCHEME DESIGNED TO PROTECT SENSITIVE DATA FROM BEING ACCESSED ON LOST OR STOLEN COMPUTERS — MAINLY LAPTOPS.
WITH THE HUGE INCREASE IN THE USE OF VERY SMALL, LARGE CAPACITY, USB DRIVES, THE POTENTIAL FOR SENSITIVE DATA TO BE LOST OR STOLEN HAS REALLY BECOME MORE OF A PROBLEM BECAUSE IT IS MUCH EASIER TO LOSE OR STEAL A DEVICE NO BIGGER THAN A PACKAGE OF CHEWING GUM. TO PROTECT SENSITIVE DATA STORED ON USB DRIVES, MICROSOFT WINDOWS 7 FEATURES THE ENCRYPTIONS SCHEME CALLED BITLOCKER TO GO.
IN THIS EDITION OF THE WINDOWS VISTA AND WINDOWS 7 REPORT, I’LL INTRODUCE YOU TO BITLOCKER TO GO AND SHOW YOU HOW IT WORKS ON A 1GB USB THUMB DRIVE.
THIS BLOG POST IS ALSO AVAILABLE IN PDF FORMAT AS A FREE TECHREPUBLIC DOWNLOAD AND AS A TECHREPUBLIC PHOTO GALLERY.
HOW IT WORKS
BASICALLY, BITLOCKER TO GO ALLOWS YOU TO ENCRYPT A USB DRIVE AND RESTRICT ACCESS WITH A PASSWORD. WITHOUT THE PASSWORD, THE USB DRIVE IS WORTHLESS. WHEN YOU CONNECT THE USB DRIVE TO A WINDOWS 7 COMPUTER, YOU ARE PROMPTED FOR THE PASSWORD AND UPON ENTERING IT YOU CAN READ AND WRITE TO THE DRIVE AS YOU NORMALLY WOULD.
DURING THE ENCRYPTION PROCESS, WINDOWS 7 INSTALLS A SPECIAL READER ON THE USB DRIVE. WHEN YOU CONNECT THE USB DRIVE TO A COMPUTER RUNNING XP OR VISTA, THE BITLOCKER TO GO READER TAKES CONTROL, PROMPTS FOR THE PASSWORD, AND THEN BASICALLY MAKES THE USB DRIVE A READ-ONLY DEVICE.
BITLOCKER TO GO CAN BE USED BY BOTH HOME AND BUSINESS USERS. IN A DOMAIN SYSTEM, IT ADMINISTRATORS CAN CONFIGURE A POLICY THAT REQUIRES USERS TO APPLY BITLOCKER PROTECTION TO REMOVABLE DRIVES BEFORE BEING ABLE TO WRITE TO THEM. FURTHERMORE, THE POLICY CAN SPECIFY PASSWORD LENGTH AS WELL AS COMPLEXITY.
FOR A COMPARISON, CHECK OUT “PRODUCT SPOTLIGHT: IRONKEY ENCRYPTED FLASH DRIVE.”
SETTING UP A USB DRIVE
SETTING UP BITLOCKER TO GO ON A USB DRIVE IS A SIMPLE PROCEDURE. ONCE YOU INSERT A USB DRIVE, RIGHT-CLICK ON IT AND SELECT THE TURN ON BITLOCKER COMMAND FROM THE MENU, AS SHOWN IN FIGURE A.
FIGURE A

WHEN YOU RIGHT-CLICK ON A USB DRIVE IN WINDOWS 7, YOU’LL SEE THE TURN ON BITLOCKER COMMAND.
AS SOON AS YOU DO, BITLOCKER TO GO WILL BEGIN INITIALIZING YOUR USB DRIVE, AS SHOWN IN FIGURE B. THE PROCESS IS NONDESTRUCTIVE, SO YOU DON’T HAVE TO WORRY ABOUT ANY DATA THAT IS ALREADY ON THE DRIVE.
FIGURE B

WHEN BITLOCKER TO GO INITIALIZES YOUR USB DRIVE, YOU DON’T HAVE TO WORRY ABOUT ANY DATA THAT IS ALREADY ON THE DRIVE.
ONCE THE INITIALIZATION PROCESS IS COMPLETE, BITLOCKER TO GO WILL PROMPT YOU TO SET UP A PASSWORD THAT YOU WILL USE TO UNLOCK THE DRIVE, AS SHOWN IN FIGURE C. IF YOU HAVE A SMART CARD, YOU CAN USE ITS PIN TO UNLOCK THE DRIVE.
FIGURE C

YOU CAN USE A PASSWORD OR A SMART CARD TO UNLOCK A BITLOCKER TO GO PROTECTED DRIVE.
AFTER YOU SET UP A PASSWORD OR USE A SMART CARD, BITLOCKER TO GO WILL PROMPT YOU TO STORE A RECOVERY KEY, AS SHOWN IN FIGURE D. YOU CAN USE THE RECOVERY KEY TO UNLOCK YOUR DRIVE IN THE EVENT THAT YOU FORGET THE PASSWORD OR LOSE YOUR SMART CARD.
FIGURE D

TO ENSURE THAT YOU DON’T LOCK YOURSELF OUT OF YOUR DRIVE, BITLOCKER TO GO WILL CREATE A RECOVERY KEY.
WHEN YOU CREATE THE PASSWORD AND SAVE YOUR RECOVERY KEY, YOU’LL BE PROMPTED TO BEGIN THE ENCRYPTION PROCESS, AS SHOWN IN FIGURE E.
FIGURE E

YOU’LL BE PROMPTED TO BEGIN THE ENCRYPTION PROCESS ONCE YOU SAVE THE RECOVERY KEY.
DURING THE ENCRYPTION PROCESS, YOU’LL SEE A STANDARD PROGRESS MONITOR THAT WILL KEEP YOU APPRISED OF THE OPERATION, AS SHOWN IN FIGURE F. THE AMOUNT OF TIME THAT IT WILL TAKE TO COMPLETE THE PROCESS WILL DEPEND ON HOW LARGE THE DRIVE IS. AS YOU CAN SEE, THERE IS A PAUSE BUTTON THAT WILL ALLOW YOU TO TEMPORARILY HALT THE PROCESS SHOULD YOU NEED TO PERFORM ANOTHER TASK.
FIGURE F

A PROGRESS MONITOR WILL KEEP YOU APPRISED OF THE ENCRYPTION PROCESS.
OF COURSE, ONCE THE ENCRYPTION IS COMPLETE, BITLOCKER TO GO DISPLAYS A CONFIRMATION DIALOG BOX AND CHANGES THE ICON ASSOCIATED WITH THE ENCRYPTED DRIVE, AS SHOWN IN FIGURE G.
FIGURE G

WHEN THE ENCRYPTION IS COMPLETE, YOU’LL NOTICE THAT THE DRIVE ICON SHOWS A LOCK ON THE DRIVE.
USING A BITLOCKER TO GO ENCRYPTED DRIVE IN WINDOWS 7
WHEN YOU LATER INSERT THE BITLOCKER TO GO ENCRYPTED DRIVE IN THE WINDOWS 7 SYSTEM, YOU WILL IMMEDIATELY BE PROMPTED TO ENTER THE PASSWORD, AS SHOWN IN FIGURE H. IF YOU WISH, YOU CAN SELECT THE SHOW PASSWORD CHARACTERS AS I TYPE THEM CHECK BOX, SO THAT YOU CAN SEE THE LETTERS; OTHERWISE, YOU’LL SEE ASTERISKS. AFTER YOU TYPE THE PASSWORD, YOU CAN SELECT THE AUTOMATICALLY UNLOCK ON THIS COMPUTER FROM NOW ON CHECK BOX TO STORE THE PASSWORD IN WINDOWS 7’S PASSWORD CACHE.
FIGURE H

WHEN YOU INSERT THE BITLOCKER TO GO ENCRYPTED DRIVE IN WINDOWS 7 SYSTEM, YOU WILL IMMEDIATELY BE PROMPTED FOR A PASSWORD.
ONCE YOU CLICK UNLOCK, YOU’LL SEE AN AUTOPLAY DIALOG BOX THAT PROMPTS YOU TO VIEW THE FILES OR USE READYBOOST, AS SHOWN IN FIGURE I. WHEN YOU CLICK THE OPEN FOLDER TO VIEW FILES BUTTON, YOU WILL BE ABLE TO ACCESS THE DRIVE AND ITS CONTENTS AS YOU NORMALLY WOULD.
FIGURE I

WHEN THE AUTOPLAY DIALOG BOX APPEARS, CLICK THE OPEN FOLDER TO VIEW FILES BUTTON.
USING A BITLOCKER TO GO ENCRYPTED DRIVE IN WINDOWS XP/VISTA
WHEN YOU INSERT THE BITLOCKER TO GO ENCRYPTED DRIVE IN A WINDOWS XP OR VISTA SYSTEM, YOU WILL SEE AN AUTOPLAY DIALOG BOX THAT PROMPTS YOU TO INSTALL THE BITLOCKER TO GO READER, AS SHOWN IN FIGURE J. WHEN YOU CLICK THIS BUTTON, IT WILL TAKE JUST A MOMENT TO INSTALL AND RUN THE READER.
FIGURE J

WHEN YOU INSERT THE BITLOCKER TO GO ENCRYPTED DRIVE IN A WINDOWS XP OR VISTA SYSTEM, YOU WILL BE PROMPTED TO INSTALL THE BITLOCKER TO GO READER.
YOU’LL THEN SEE THE BITLOCKER TO GO READER DIALOG BOX, WHICH WILL PROMPT YOU TO ENTER YOUR PASSWORD, AS SHOWN IN FIGURE K. NOTICE THAT THE AUTOMATICALLY UNLOCK ON THIS COMPUTER FROM NOW ON CHECK BOX IS MISSING FROM THIS DIALOG BOX. HOWEVER, THE SHOW PASSWORD CHARACTERS CHECK BOX IS STILL AVAILABLE.
FIGURE K

BITLOCKER TO GO READER WILL PROMPT YOU TO ENTER YOUR PASSWORD.
AFTER YOU TYPE THE PASSWORD AND CLICK THE UNLOCK BUTTON, YOU’LL SEE THE BITLOCKER TO GO READER WINDOW, WHICH ESSENTIALLY LOOKS LIKE WINDOWS EXPLORER, AS SHOWN IN FIGURE L. HOWEVER, IT DOESN’T WORK LIKE WINDOWS EXPLORER.
FIGURE L

THE BITLOCKER TO GO READER WINDOW ALLOWS YOU TO ACCESS FILES ON AN ENCRYPTED DRIVE ON A WINDOWS XP OR VISTA SYSTEM.
IF YOU ATTEMPT TO OPEN ANY FILE BY DOUBLE-CLICKING IT IN THE BITLOCKER TO GO READER WINDOW, YOU’LL IMMEDIATELY BE PROMPTED TO COPY THE FILE TO THE DESKTOP, AS SHOWN IN FIGURE M — YOU WON’T BE ABLE TO OPEN THE FILE ON THE USB DRIVE.
FIGURE M

YOU CANNOT OPEN FILES ON AN ENCRYPTED DRIVE FROM THE BITLOCKER TO GO READER.
IF YOU ATTEMPT TO COPY A FILE FROM THE COMPUTER TO THE BITLOCKER TO GO READER WINDOW, YOU’LL IMMEDIATELY SEE THE ERROR MESSAGE SHOWN IN FIGURE N.
FIGURE N

YOU CANNOT COPY FILES TO AN ENCRYPTED DRIVE FROM THE BITLOCKER TO GO READER.
WHAT’S YOUR TAKE?
WHAT DO YOU THINK ABOUT BITLOCKER TO GO? WILL YOU USE IT WHEN YOU GET WINDOWS 7? ARE YOU USING IT ALREADY? AS ALWAYS, IF YOU HAVE COMMENTS OR INFORMATION TO SHARE ABOUT THIS TOPIC, PLEASE TAKE A MOMENT TO DROP BY THE TECHREPUBLIC COMMUNITY FORUMS AND LET US HEAR FROM YOU.
TECHREPUBLIC’S WINDOWS VISTA AND WINDOWS 7 REPORT NEWSLETTER, DELIVERED EVERY FRIDAY, OFFERS TIPS, NEWS, AND SCUTTLEBUTT ON VISTA AND WINDOWS 7, INCLUDING A LOOK AT NEW FEATURES IN THE LATEST VERSION OF THE WINDOWS OS. AUTOMATICALLY SIGN UP TODAY

Saturday, April 24, 2010

Friday, April 23, 2010

End of support for Windows XP SP2 and Windows Vista RTM

End of support for Windows XP SP2 and Windows Vista RTM


As we announced in 2008, support for Windows XP Service Pack 2 (SP2) will end on July 13, 2010. Support for Windows 2000 will end on the same date. Support for Windows Vista Release to Manufacturing (RTM) will end on April 13, 2010.

NOTE: There is no Service Pack 3 for the 64-bit version of Windows XP. If you are running the 64-bit version of Windows XP with Service Pack 2, you are on the latest service pack and will continue to be eligible for support and receive updates until April 8, 2014.

To find out if you are running the 64-bit version of Windows XP, right-click My Computer, then click Properties. If you do not see "64-bit" listed, then you are running the 32-bit version and you need to install Service Pack 3 . If "64-bit" is listed under System, then you are running the 64-bit version.

Customers running an unsupported version of Windows or service pack will not be eligible for any of our support options. Updates, including security updates released with bulletins from the Microsoft Security Response Center, will be reviewed and built for the supported versions and service packs only. The most current service packs are available to organizations, and they are easily deployed via Windows Update, Windows Server Update Services/Microsoft System Center, and the Microsoft Download Center. To better understand the Microsoft Support Lifecycle Policy and your support options visit the Microsoft Support Lifecycle page.

There is no supported migration path from Windows 2000 to Windows 7 using the Windows User State Migration Tool (USMT). You will need to upgrade to Windows XP and then migrate to Windows 7 using USMT 4.0, a tool included with the Windows Automated Installation Kit (AIK). For more information on Windows 2000 and Windows 2000 Server End of Support visit Windows 2000 End of Support Solution Center.

Updating your Windows XP, Windows Vista and Windows 2000 PCs before the end of mainstream support dates will ensure your PCs stay supported and receive security updates. The best way to be secure and supported is by migrating to Windows 7.

■Small and midsize businesses should migrate to Windows 7 Professional, which is designed to help you work the way you want, help you get more done, and safeguard your work.

■Larger organizations should migrate to Windows 7 Enterprise, which enables enterprise users to be more productive from anywhere, manage risk through enhanced security and control, and reduce costs through streamlined PC management.

■There are tools to help test and mitigate application compatibility issues, including the Microsoft Application Compatibility Toolkit, Windows XP Mode, and Microsoft Enterprise Desktop Virtualization (MED-V) to help migration. To learn more about these tools, visit the Springboard Series on TechNet.

■Upgrading to Internet Explorer 8 improves the level of protection against current and emerging online threats

Monday, April 19, 2010

How do you get to Windows 7 Network configuration

At first glance there aren’t too many differences between configuring Windows 7 networking and configuring Windows Vista networking. However, there are important differences once you start using Windows 7. Let us find them out.

Navigation – getting to Windows 7 Network Configuration
How do you get to Windows 7 Network configuration? Just go to the Start Menu, then to Control Panel, and click onNetwork and Internet. You also can get to your network configuration, using the same navigation path in Windows Vista. However, when you get to the Network and Internet settings in Windows Vista, you will see a lot more options. Let us compare by starting with the Windows 7 Network and Internet window (shown in Figure 1, below).

Figure 1: Windows 7 Network and Internet Configuration
As you can see this new Windows 7 configuration window offers you a few new choices and a few old choices but, overall, not a lot of choices to choose from. We are used to seeing both the Network and Sharing Center and the Internet Options but the HomeGroup is new. I will come back to HomeGroup and the new and improved Network and Sharing Center in Windows 7, below.
Now let us compare what we saw in Windows 7 to the Network and Internet configuration in Windows Vista, shown in Figure 2, below:

Figure 2: Windows Vista Network and Internet Configuration
The first thing you notice is that there are tons of options to choose from in Vista. However, I do not think that this is such a good thing as some of these seem much less important than others. For example, I don’t think that the Windows Firewall or Offline Files deserve their own section here (these are removed in Windows 7).
Windows 7 Network and Sharing Center
99% of the time, in Windows 7 or Vista, to configure networking, you are going to click on the Network and Sharing Center. It offers the most functionality and the most common tasks that a Windows Vista or 7 Administrator would perform. So, let us look at how the Network and Sharing Center differs between these two operating systems.
First, here is the Network and Sharing Center from Windows Vista that most of us are familiar with:

Figure 3: Windows Vista Network and Sharing Center
Now, let us compare that to Windows 7’s Network and Sharing Center, below in Figure 4.

Figure 4: Windows 7 Network and Sharing Center
One of the big differences is caused by these two computers being different. The Vista computer has many more network adaptors as compared to the Windows 7 computer. That aside, as you can see, the Windows 7 computer actually has many fewer options than the Vista computer. Options have been removed from the left navigation and the Sharing and Discovery options have been removed from the main window. These options have just been moved to other sections.
The Network and Sharing options have been moved to the Choose homegroup and sharing options window (which we will look at in a minute). The left navigation options shown on the Vista computer have just been moved to the level above this, Network and Internet.
What I like about the new Windows 7 Network and Sharing center is that the less related options have been moved off to reduce the clutter on the page. There are two things that I do not care for, concerning the changes with the Network and Sharing center:
• Why did they remove the Sharing and Discovery options from this page? I mean, it is not that what the Network and Sharing center should have – sharing and discovery options?
• Also, I have never cared for how in Vista or Windows 7 there are no technical networking details on the network and sharing center page. I should be able to see if I have an IP address here. I should be able to see if it is 169.254.xxx.xxx automatic (useless) IP address or if it is a real IP address. I would think that they would have added / improved this in Windows 7.
What about Windows 7 Homegroup?
Above, I mentioned Windows 7 homegroup. What is this? Well, this is new in Windows 7. A homegroup is a simple way to link computers on your home network together so that they can share pictures, music, videos, documents, and printers. There is just a single password that is used to access the homegroup, making creating it and connecting to it easy.
If you click on Choose Homegroup and Sharing Options from the Network and Sharing Center in Windows 7, you will see this window (assuming your network location is not Home):

Figure 5: Homegroup and sharing options in Windows 7
If you change your network location to Home, you will see the option to create a homegroup. Or if you come to theChoose Homegroup and sharing options page when your network location is set to home, then you can chooseCreate now and create your new homegroup.

Figure 6: Creating a Windows 7 Homegroup
You will be able to select what you want to share in the homegroup.

Figure 7: Viewing the Windows 7 Password to connect to the homegroup
And you will be given a single password, used on other computers, to connect to the homegroup.
When you are done, the Homegroup and Sharing center will look something like this:

Figure 8: Windows 7 Homegroup configured
Fix a network problem
My favorite change to Windows 7 networking is the update to Vista’s diagnose and repair. In Windows 7 if you want to get assistance fixing a network issue, you just click Fix a network problem. Sound simple and clear, right? That’s what I like about it.
From Windows 7 Network and Sharing, if you click Fix a Network Problem, you get this window, asking you want you want to fix:

Figure 9: Fixing a Network Problem
Windows 7 will go through and attempt to fix any network issues that you select. It will even ask you if you want to fix it as a Windows Administrator. Here is what fixing a homegroup looks like:

Figure 10: Fixing a network problem