Sunday, 1 April 2018

Networking Devices

Networking Devices

Ratings:10+5=15

Introducing Networking Device:

  • Networking: Network is a collaboration or connection of two or more zones or devices through a common linking method. The network allows the nodes to share resources between the linked systems. This is applicable in telecommunication, internet &  even online data sharing.
  • Computer Hardware: Computer hardware is the physical part of the laptop or computer used for storing data, connecting, viewing & listening. The use of computer hardware in networking is detailed.
  • LAN & WAN devices: LAN, Local Area Network is a collection of devices or computer connectors to a common several. WAN or Wife Area Network devices cover a gige amount of area as the network apan longer. The devices can be connected through satellite & leased line.
  • Collision: In order to understand networking devices, knowledge of collision is important. A network collision occurs when two network devices tries to transmit the same data at the same point of time. If the network detects such a collision, it discards both the packets received.

What is the use of network devices?

Network devices or internetworking devices are used to establish a network connection inside the corporate environment. Take a look at the concept of internetworking devices & how they work.


There are certain hardware devices used within the network to connect two or more computers or peripherals.
  • NIC
  • Repeater
  • HUB
  • Bridge
  • Switch
  • Gateway
  • Router
  • Modem
The networking devices are intelligently designed to connect two or more computers through a data path. Apart from sharing files, these devices enable printer & fax machines sharing. The communicating devices set up a path that connects all computers in the network.

NIC: NIC stands for Network Interface Card. Sometimes it is also called by the name "Network Interface Controller". It is indeed a circuit board or a card that is installed in a computer so that it can be connected to a network. Actually the NIC provides the computers with a dedicated, full-time connection to a network.


Personal computers & workstations on a Local Area Network (LAN) typically contain a NIC specifically designed for the LAN transmission technology. Also there is WLAN (Wireless LAN) card.

Repeater: Repeater is a network device, which is used to regenerate or replicate a signal. It removes unwanted nokar in an incoming signal. Unlike an analog signal, the original digital signal, even if weak or disorted, can be clearly perceived & resorted. With analog transmission, signals are re-strenghtened with amplifiers which unfortunately also amplify noise as well as information. Repeater operates at Layer 1 of OSI.



Hub: Basically a Hub is a common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A Hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. HUB operates at Layer 1 of OSI.



Bridge: Bridge devices inspect incoming network traffic & determine whether to forward or discard it according to its intended destination. An Ethernet bridge, for example, inspects each incoming Ethernet frame, including the source & destination MAC addresses, & sometimes the frame size in mankind individual forwarding decisions. Bridge devices operate at the data link layer (Layer 2) of OSI Model.



Switch: A switch is a very common type of networking device that channels coming data from any of multiple input ports to the specific output port that will take the data toward it's intended destination in a telecommunications network. In the traditional circuit switched telephone network, one or more switches are used to set up a dedicated communication through temporary connection or circuit for data exchange between two or more network devices. On an Ethernet LAN, the switch determines from the physical device like MAC address in each incoming message frame which output port to forward it to & out of. In an Internet, a switch determines from the IP address in each packet, & the output port of switch is connected to the next part of the intended destination.



Gateway: A gateway is a network node which connects two networks in different protocols. Gateways can take several forms, including routers & computers can perform a variety of tasks.


These range from simply passing traffic onto the next hop on its path to offering complex traffic filtering, proxies or protocol translations at various network layers. The most common gateway is the internet gateway, which connects a home or enterprise network to the internet. An internet gateway also often acts as a security node, variously filling one or more security roles, such as proxy server, firewall or Network Address Translation (NAT) server. Software- Defined WAN ( SD-WAN) & virtual WAN systems serve as gateways between an enterprise network & two or more Wide Area Networks (WANs).

Router: Router is one of the most used networking devices used to share internet connection between two devices. The operation of router is complicated as it can be both software & hardware & operates at Layer 3 if OSI.


The connection established through router can be:

  • Ethernet to Ethernet- in this scenario, the main router can either be Linksys or a third party & will be referred to as the main router. The second router should be Linksys & will be called secondary router. If you want to cascade a non-Linksys router to the main router, you need to call its manufacturer for support.
  • MAN to WAN- Connecting one of the Ethernet ports of the main router (MAN) to the Internet port (WAN port) of the secondary router. This type of shopping requires the main router & the secondary router to have different IP segments. This connection makes it easier to identify which router the computers & other devices in the network are connected to since they will have different LAN IP segments. However, computers that are connected to the main router will not be able to communicate with the secondary router, & vice versa since there are two different networks. Before you connect a Linksys router to another router, make sure that both routers have different IP Addresses. This is necessary to avoid conflict & connectivity issues in the local network if they have similar IP Addresses.
  • Token Ring to Internet- Token Ring Local Area Network (LAN) technology is a communications protocol for local area networks.
Modem: MODEM stands for MOdulator-DEModulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms (analog to digital & vice versa).



Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 01-04-2018
Session Name: Networking Devices
Summary of learning: Understanding different types of networking devices & their uses

Transmission Media

Transmission Media

Ratings: 10+5=15


Networking Transmission Media:

Networking Transmission Media is the actual path over which an electrical signal goes as it moves starting with one part then onto the next.
There are 2 types of transmission media used in Networking
  1. Wired (Cables)
  2. Wireless (Air)
There are three types of wired transmission media,
  1. Coaxial Cables
  2. Twisted Pair Cables
  3. Fiber Optic Cables
Coaxial Cables: A Coaxial Cable or Coax is a cable, is used in the transmission of audio, video & communications. Mainly Coaxial Cables are used as network & broadband cable. These cables have high bandwidths & greater transmission capacity. The adjacent figure is of a commonly used Coaxial Cable. These cables have a metal male connector end that is screwed onto a female connector.
The Coaxial Cables are of two types-
  1. Thicker (10Base5)
  2. Thinner (10Base2)
Thicknet, also known as Thick Ethernet or 10Base5.
Thinnet also known as Thin Ethernet or 10Base2, are antiquated Ethernet networking technologies.
Both technologies use Coax that consists of solid copper core surrounded by an insulator. 10Base2 is known as Cheaper Net, Thin Ethernet, Thinnet & Thinwire which is a variant of Ethernet that uses Thin Coaxial Cable, terminated with BNC connectors. Here, 10Base2 means,
  • 10 MBps speed
  • Baseband signals & 
  • 200 meters length (actual usage is 185 metres).
And, 10Base5 is known as Thick Ethernet or Thicknet that was the first commercially available variant of Ethernet. Here, 10Base5 means
  • 10 Mbps speed
  • Baseband signals &
  • 500 metre length.

Understanding the Thinnet & Thicknet concepts:

The number 10: At the front each identifier, 10 denotes the standard data transfer speed over these media - ten Megabits per second (Mbps).
The word Base: Short for Baseband, this part of the identifier signifies a type of network that uses only one carrier frequency for signalling & requires all network stations to share it's use.
The segment type or segment length: This part of the identifier can be a digit or a letter
Digit: shorthand for how long (in metres) a cable segment may be before attenuation sets in. For example, a 10Base5 segment can be no more than 500 metres long.
Letter: identifies a specific physical type of cable. For example, the T at the end of 10BaseT stands for twisted-pair.

Twisted Pair Cables: Twisted Pair Cable is a very important network media. It can be used for phone communications & cable Ethernet networks. Twisted Pair cabling is a type of during in which two conductors of a single circuit are twisted tohtoget for the purlpurp of cancelling out ElectroMagnetic InerfeInterf (EMI) from external sources. There are two kinds of twisted Pair cable, UTP & STP.


UTP: UTP means Unshielded Twisted Pair, which is the copper media & inherited from telephony, which can be used for increasingly higher data rates, & is rapidly becoming the de facto standard for horizontal wiring, the connection between, & including the outlet & the termination in the communication closet.

  • The advantage of UTP is that they are very flexible, low cost media & can be used for either voice or data communications.
  • And, the main disadvantage with UTP is the bandwidth. We cannot achieve high bandwidth with UTP cables.
STP: STP cable is Shielded Twisted Pair copper conductive netting or casing, performed with individually or with external conductive shield around all pairs. It is heavier & more difficult to manufacture, but it can extraordinarily enhance the signalling rate in a vivek transmission plot. Twisting give cancellation of magnetically induced fields & currents on a pair of conductors.
  • The main advantage of STP is that it ensures greater protection from all types of external interference than UTP cable.
  • And the disadvantage, it is more expensive than UTP cable.
Fiber Optic Cables: Fibre Optic Cable is a fast information transmission medium. Fiber Optic Cables carry communication signals using pulses of light generated by small lasers or light-emmiting diodes (LEDs).


It contains minor glass or plastic fibres, which carry light beams & the coating helps preserve the fibres from heat, cold, electromagnetic delay from distinct types of wiring, as readily as some protection from ultraviolet raha from the sun. Fibre Optic manages for an essentially master data transmission than standard copper wires. And the Fibre Optic Cables bandwidth is much higher than older cables.

Advantages of Fibre Optic Cables:

  • Fibre cables offer several advantages over traditional long-distance copper cabling.
  • Fibre optics have a higher capacity. The amount of network bandwidth a fibre cable can carry easily exceeds that of a copper cable with similar thickness. Fiber cables rated at 10 Gbps, 40 Gbps & even 100 Gbps are standard. Since light can travel much longer distances down a fibre cable without losing it's strength, it lessens the need for signal boosters.
  • Fiber is less susceptible to interference. A traditional network cable requires special shielding (like in STP) to protect it from electromagnetic interference. While this shielding helps, it is not sufficient to prevent interference when many cables are strung together in close proximity to each other. The physical priorities of glass & fibre cables avoid most of these issues.

There are two types of Fibre Optic Cables they are:

  1. Single mode Fiber Optic Cable.
  2. Multi-mode Fiber Optic Cable.

Comparing Transmission Media:


Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 01-04-2018
Session Name: Transmission Media
Summary of learning: Learning about different types of networking media

Saturday, 31 March 2018

Network Topology

Network Topology

Ratings:10+5=15


What is Topology?

Network Topology is the arrangement of the various elements (links, nodes, etc) of a computer network. Essentially, it is the topological structure of a network & may be depicted physically or logically.
Topologies are devided into two types. One is called Physical Topology & another one is Logical Topology.

Physical Topology is the placement of the various components of a network, including device location & cable installation, while Logical Topology illustrates how data flows within a network,regardless of its physical design.

Distances between nodes, physical interconnections, transmission rates, or signal types may differ between two networks, yet there topologies may be identical.


There are a number of reasons to understand about topology:

  • The Network Topology impacts performance.
  • The Network Topology is a factor in determining the media type used to cable the network.
  • The Networking Topology impacts the cost of cabling the network.
  • Some access methods works only with specific topologies.
  • Knowledge of Network Layout/Topology helps to optimize the network performance & troubleshoot network performance issues.

Types of Topologies

There are 6 different types of Physical Topologies. They are:
  • BUS Topology
  • RING Topology
  • STAR Topology
  • MESH Topology
  • TREE Topology
  • HYBRID Topology
BUS Topology:
BUS Topology is a network where all the nodes are connected with each other with a single common cable. When one node wants to access another node on the network then it puts a message addressed to that device on the BUS Network.



Advantages of BUS Network:
  1. It is very easy to connect a node or peripheral in this network.
  2. BUS Network requires less cable length than any other topologies.
Disadvantages of BUS Network:
  1. As the total network is depended on a single cable so if any problem occurs in the main cable, the entire network shuts down.
  2. At the start & the end point of the main cable terminators are required to build up the network.
  3. This network cannot be used as a stand-alone solution in a large building.
RING Topology:
When each device is serially connected in a closed ring pattern with a single cable then the network system is called RING Topology. As a train crosses all the platforms to reach its destination, RING Topology does the same to pass a message from one node to another node.



Advantages of RING Topology:
  1. The network does not do anything without order. It needs to access the token & the opportunity to transmit.
  2. In this network each & every node has equal access to resources.
  3. The performance does not get interrupted by any additional components.
  4. Network server is not needed to control between nodes.
Disadvantages of RING Topology:
  1. In this ring network if any node breaks down then the entire network stops working.
  2. The speed of transferring data is slower than any other topologies just because a packet of data passes through all the nodes betweensender & receiver node.
  3. The entire network could be affected by moving, adding & changing of devices.
STAR Topology:
In this configuration all nodes are connected to a central HUB with separated cables. Here the central node/hub acts like the main server & the other nodes which are connected to the central node, act like client devices.



Advantages of STAR Topology:
  1. In this type of network it is very easy to add/remove a node to the network system.
  2. Here if any fault occurs it is very easy to find out & fix it up.
  3. If any one node faces problem, the rest nodes performs smoothly without effecting the whole network.
Disadvantages of STAR Topology:
  1. It is more expensive than any other topologies to build up the network because it requires excessive length of cable.
  2. The entire network goes down if the central node (HUB) does not work properly & also if the other important nodes are disconnected from the network, example file server node stops working.
  3. The central hub is expensive which makes the network more expensive.
MESH Topology:
Here each & every network is interconnected with each other. It works independently.



Advantages of MESH Topology:
  1. Adding/removing nodes in this network could be done easily without interrupting the other nodes & the network.
  2. Here the transmission of data is very easy because it transfers data from different nodes simultaneously.
  3. In this configuration transfer of data does not get affected by any peripherals because if one node fails there is always an alternative one.
Disadvantages of MESH Topology:
  1. It is very hard to configure the network & also very difficult to maintain.
  2. MESH Topology is comparatively expensive when compared with other topologies like RING/STAR Topology.
TREE Topology:
A TREE Topology looks like the branches of the tree where each & every nodes are connected with its parent's node. It is also called by the name STAR+BUS Topology.



Advantages of TREE Topology:
  1. Here finding out any fault is very easy & not too hard to maintain.
  2. If one of the nodes get damaged the other hierarchical nodes are not affected.
  3. It is very easy to extend the network as much as the administrator wants.
Disadvantages of TREE Topology:
  1. The network requires high maintenance.
  2. A lot of cable is required to establish the network system.
  3. Troubleshooting of problems is highly difficult.
HYBRID Topology:
HYBRID Topology is the combination of two or more different network topologies. This network is the mixture of both peer-to-peer & client-server network. It can be either wired or wireless network.


Advantages of HYBRID Topology:
  1. Here in this network the troubleshooting is far better than any other topologies.
  2. Thys type of network is very easy to expand.
Disadvantages of HYBRID Topology:
  1. The structure of the network is hard to understand.
  2. It is very expensive to build up the entire network because of the requirement of cables & other peripherals.
  3. Multi-station Access Unit MAU is required.
Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 01-04-2018
Session Name: Network Topology
Summary of learning: Understanding different types of topologies & their need

Friday, 23 March 2018

OSI Model

OSI Model

Ratings:10+5=15

What is OSI?

Open Systems Interconnection or OSI Model was first proposed by International Standards Organization (ISO) to solve multiple problems faced in telecommunication.
It is a conceptual model of telecommunication Networking where the whole process is divided into seven effective layers. It synchronizes the whole process & helps one understand the interoperation of the diverse communication system under the standard protocol. The seven layers we are talking about are abstraction layers & each layer is connected to either one or two layers depending on its position. The interlinked layers serve one another to forward the communication process.

Understanding the seven layers of OSI
Layer 1: Physical Layer
This layer is the primary layer of the OSI model & consists of connecting devices such as Ethernet cable, Token ring, hubs repeaters & electrical specification for data connection. This layer is responsible for connecting the devices to physical transmission medium such as copper or optical cable or radio frequency or pulses of infrared. When operating at the physical layer, the data is transmitted through electrical voltage, radio frequency or pulses.

Layer 2: Data Link Layer
Data Link Layer encodes & decodes data packet into bits & using its transmission protocol it handles the errors in the Physical Layer. It also controls flow & synchronization of the frames & at the same time it manages controlling access of the Physical Layer network devices.
There are two sub layers in Layer 2,
  • The Media Access Control (MAC) layer
  • The Logical Link Control (LLC) layer
While the MAC determinrs how the computer in the network will have access to the LLC layer, the LLC layer works in frame synchronization.

Layer 3: Network Layer
The Network Layer adds the concept of routing above the Data Link Layer. When data arrives at the Network Layer, the source & destination addresses contained inside each frame are examined to determine if the data has reached this final destination. If the data has reached the final destination, this Layer 3 formats the data into packets delivered up to the Transport Layer.
In Layer 3 logical paths are created for data transmission through network devices such as switch & routing devices. This works for transmitting data from one node to another.
Addressing, routing & forwarding are the three major functions at this layer. To support routing, the Network Layer maintains logical addresses such as IP addresses for devices on the network. The Network Layer also manages the mapping between these logical addresses and physical addresses. In IP networking, this mapping is accomplished through the Address Resolution Protocol (ARP).

Layer 4: Transport Layer
In the fourth layer, variable length data sequence has to be transferred from source to destination host through one or more network. This Transport Layer delivers data across network connections.
The Transport Layer is to be delivered the entire message from source to destination, & receiving data without any errors. Different transport protocols may support a range of optional capabilities including error recovery, flow control, & support for re-transmission.
The supported protocols at this layer are TCP (Transmission Control Protocol), UDP (User Datagram Protocol) & SPX(Sequential Packet Exchange- Novell Netware Operating System).

Layer 5: Sessions Layer
In the Sessions Layer, communication or connection between computers is controlled in a managed environment. It has the sole capacity of managing & terminating connection & helping in establishing connections between local & remote applications.
At Layer 5, it is built to support multiple types of connections that can be created dynamically & run over individual networks. Dynamically created connections that can run over individual networks can be controlled through the layer.

Layer 6: Presentation Layer
The Presentation Layer is the simplest in function of any piece of the OSI Model. At Layer 6, it handles syntax processing of message data such as format conversions & encryption/decryption needed to support the Application Layer above it.
The Presentation Layer is the most simplified layer in the OSI Model where data segregation is done based on the file type. Data can be classified in 4 types like ASCII- Text format, Audio format, Picture format & Video format. Encryption to formats such as GIF, ASCII, PICT, JPEG, & much more are done to make it suitable for the Application Layer. The major job of this layer is to translate between application & network format.

Layer 7: Application Layer
This is the last layer of the OSI Model & this layer represents the data that is understood by the end user. The Application Layer supplies network services to end user applications. Network services are typically protocols that work with user's data. For Example, in a Web Browser application, the Application Layer protocol "HTTP (Hyper Text Transfer Protocol)".
In this layer the user interacts with the software application & communicating component is implemented. In this layer communication partners are identified along with quality of service.
This Layer 7 provides data to (& obtains from) the Presentation Layer.

PDU in OSI Model
In telecommunication the term Protocol Data Unit (PDU) has the following meaning.
In a OSI layered model, a unit of data which is specified in a protocol of a given layer & which consists of protocol-control information & possibly user data of that layer.
The PDU for each layer of the OSI Model is listed below.

  • Physical Layer- raw bits (1s or 0s) transmitted physically via the hardware.
  • Data Link Layer- a frame (or series of bits).
  • Network Layer- a packet that contains the source & destination address.
  • Transport Layer- a segment that includes a TCP header & data.
  • Sessions Layer- the data passed to the network connection.
  • Presentation Layer- the data formatted for presentation.
  • Application Layer- the data received or transmitted by a software application.
As you cam see, the Protocol Data Unit changes between the seven different layers. The resulting information that is transferred from the application layer to the physical layer (& vice versa) is not altered, but the data undergoes a transformation in the process. The PDU defines the state of the data as it moves from one layer to the next.

Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 24-03-2018
Session Name: OSI Model
Summary of learning: Learning about different layers of OSI Model.

Wednesday, 21 March 2018

Basics Of Computer Network

Basics Of Computer Network

Ratings:10+5=15


What is Network?
A network is a group of  two or more computer systems, which are linked together. It also consists of a collection of computers, printers, scanner & other devices that are connected together.
Networking has single purpose to share the information as fast as possible.


  1. LAN- LAN stands for Local Area Network. It it used to network computers within a limited area like office, school by using the network media.
  2. CAN- Campus Area Network is an interconnection of Local Area Networks (LANs) within a limited geographical area. Campus network can be additional to the set of wireless connections, connect several buildings to the same network, but it's not the same thing. A CAN is smaller than a Wide Area Network.
  3. MAN- MAN means Metropolitan Area Network, which is optimized for a larger geographic area than a LAN, ranging from several blocks of bui;dings to entire city.
  4. WAN- WAN is Wide Area Network that is a network connection of wide area such as the world.
  5. PAN- PAN is a Personal Area Network that is a network which is referred to the interconnection of information technology devices mostly up to 10 meters. These interconnected devices might include laptop computers, mobole phones, printers or other computer devices. It is also known as a Wireless Personal Area Network (WPAN).
Broad Network Categories:
There are two broad network categories,

  1. Peer-to-Peer Networks- Peer-to-Peer (P2P) networks involve two more computers pooling individual resources such as disk drives. Each computer acts as both the client & the server. These computers can directly communicate with other computers. On a Peer-to-Peer network, for example, a scanner on one computer can be used by any other computer on the network. P2P networks are cheap to set up. It's connection type can be by using Ethernet cable or a Wi+Fi router.
  2. Client-Server Networks- This involves multiple client networks which are connected to atleast a central server on a network where, applications are installed. Clients need access to these server resources, they can access them only from the server. Servers often have private user directories for special users (Example, Windows has Work folders for Special users). Client-Server networks tend to have faster access speeds because the large number of clients they are designed to support. The clients are allowed to function as workstations without sharing any resources network. It is easier to upgrade software applications & files because it held on a single Server computer. System-wide services can be provided through the server software. Security is assured in this model of network, as the server controls access & permission to resources.
Benfits of Networking
  • File sharing: All types of data (Audio, Video, Text & Images) can be easily shared & accessed on network.
  • Resource sharing: Resources likes scanners, printers, network data & applications can be accessed by remote connection devices, using network-connected devices. Example, an application can be shared by multiple users.
  • Internet Sharing: A single internet connection can be shared with multiple users & devices.
  • Increasing storage capacity: Access any media files stored remotely on other computers storage devices (Example NAS-Network Attached Storage).
Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 22-03-2018
Session Name: Basics Of Computer Network
Summary of learning: Learning about Networking Basics.

Sunday, 25 February 2018

Basic Linux Commands

Basic Linux Commands

Ratings: 10+5=15


Linux Boot Process:

  1. Power On your Linux Machine- The system executes BIOS (Basic Input/Output System). BIOS passes the control to MBR.
  2. MBR (Master Boot Record)- Has a size of less than 512 bytes. MBR can't load the kernel since it is unaware of file system. So. MBR loads and executes GRUB (Grand Unified Boot Loader).
  3. GRUB- Is boot loader, there will be multiple kernel images installed on your system, GRUB, shows the available OS images and allows you to choose. GRUB executes the kernel images.
  4. Kernel- Is the heart of operating system, when kernel is loaded, it configures hardware and memory allocation. Kernel executes the INIT levels.
  5. INIT- Is the run level program stored in slash etc slash inittab file. There are six run levels,
  • Level Zero is Halt or Shutdown the system.
  • Level 1- is single user mode.
  • Level 2- is Multi user mode.
  • Level 3- is Full user mode.
  • Level 4- is unsued INIT mode.
  • Level 5- is Graphical mode (it is default mode).
  • Level 6- is Reboot of the system. Finally INIT executes the Run Level programs and the user can see Login screen on his machine.

Introduction to Linux Shell:

  • Layered components in Linux OS
  1. Hardware Layer (RAM/HDD/CPU etc.)
  2. Kernel
  3. Shell uses BASH (Bourne Again Shell)
  4. Application and Utilities

Linux Hierarchical File System:

  • Data files are stored in directories (folders)
  • A hierarchical file system is how drives, folders and files are arranged in an operating system.
  1. Slash/ is also known as root directory.
  2. /root is the default home directory of the root user.
  3. /home contains the home directory of all users.
  4. /boot contains the kernel, which is the core operating system named as vmlinuz.
  5. /sbin stands for system binary.
  6. /bin stands for binary.
  7. /usr is Unix System Resources.
  8. /var stands for variable.
  9. /dev stands for device.
  10. /etc stands for et cetra.
  11. /opt stands for optional.
  12. /media is the default mount point for removable media.

Windows Hierarchical File System and comparison with Linux.

  • In GUI based Windows operating systems, the expands a drive or folder to see its contents by double-clicking the icon.
  • In Non-GUI console like MS-DOS, the drive and director is are listed  in text format.
  • The image illustrates Windows File System Hierarchy. In the image, the windows directory (Windows/) folder hierarchy that contains the System32, Tasks and Web folders. Each of these folders could have hundreds of their own files, but unless they are opened the files are not displayed.
  • Linux is case-sensitive while Windows is not case-sensitive. This means that you could have files named file, File and FILE in the same folder. Each file would have different contents. Linux treates capitalized letters and lower-case letters as different characters.
  • Windows uses backslashes (C;:\Users\Name), whereas Linux uses forward slashes (/home/name)
  • Windows have Drive letters like C:\, D:\ while Linux has /(slash).
Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 20-02-2018
Session Name: Basic Linux Commands
Summary of learning: Learning about basic commands to operate Linux.

Monday, 19 February 2018

Introduction to Unix/Linux

Unix & Linux

Ratings:10+5=15



Introduction to UNIX Operating System:

  • Developed in 1970s at Bell Labs research center by Ken Thompson & Dennis Ritchie.
  • Written in C and assembly language.
  • Designed as portable, multi-tasking and multi-user.

History Of UNIX:

MULTICS
  • Started in mid-1960s as joint project of MIT, Bell Labs and General Electric.
  • It was a time sharing operating system.
UNICS
  • The project was developed in 1970 by Ken Thompson and Dennis Ritchie.
UNIX
  • Written in C programming language in 1972.
  • In 1975, the first source license for UNIX was sold to University Of Illions.
UNIX OS Variants:
  • The variants of UNIX Operating System, the table illustrates thevendors and the corresponding operating system released by the vendors.
  • The most prominent UNIX Operating Systems used in present environments are:
  1. SUN or Oracle with its Solaris operating system.
  2. IBM with AIX operating system.
  3. Hewlett Packard with HP-UX operating system.
  4. Apple with MacOS X server operating system.
  5. Berkeley Software Design Inc. with FreeBSD UNIX operating system.
  6. Also, Linux is the leading UNIX-like operating system.

Introduction to Linux:

  • Linux is a UNIX like computer OS.
  • Developed by Linus Torvalds in 1991.
  • Source model can be Open-source or Proprietary.
  • Available for Mobile devices, Desktops, Servers, Mainframes and Supercomputers.
  • 35% of Internet Servers and 99% of Supercomputers are powered by Linux OS.

Compare Linux & UNIX:

  • Linux shares similar architecture and concepts from UNIX. Additionally, Linux Kernel and other components are free and open-source software.
  • Linux was originally developed for Intel's x86 hardware while UNIX was originally designed for x86 and Itanium systems, while MAC OSX is compliant with PowerPC/x86/x64 systems.

Popular Linux Distributions:

  1. Red Hat- A Billion Dollar commercial Linux Company developing Linus, editions supported are Fedora (free edition) and CentOS (free,community supported).
  2. Ubuntu Linux- Free Linux version from Canonical Company. Popular among home users. Provides graphical Linux Desktop without any need to access command line.
  3. Debian- Extremely popular among advanced users due to its technical excellence and expectations from Linux community. Example Kali Linux.
  4. Arch Linux- Supported on x86-64 hardware architecture. Arch Linux ARM is a prominent version, used on devices like BeagleBoard, Raspberry Pi and Trimslice.
  5. Slackware Linux- Created in 1993, is one of the oldest distributions of Linux. OpenSUSE is a descendent of Slackware Linux.
  6. BOSS (Bharat Operating System Solutions)- A GNU Linux developed in INDIA by C-DAC Chennai. Used on Desktop PCs of GOVERNMENT Of INDIA Employees.

Companies Using Linux:


Red Hat OS variants:

RED HAT is the most popular Linux version used in Commercial Market. However RED HAT Enterprise Linux is not directly rolled out in companies, rather it is released in various variants like Fedora, CentOS and RHEL. Each of the variants are explained as:

Fedora:
  • Free, community driven, run by Red Hat company.
  • Focused on quick releases (~ 6 months)
Red Hat Enterprise:
  • Commercial version based on Fedora
  • Focused on long stable release
CentOS (Community ENTprise Operating System):
  • Free version based on commercial Red Hat
  • Community supported, stable features
Name of Student: Harsh Tiwari
Faculty Name: Naresh  Sir
Roll No: JK-ENR-SW-1621
Date: 19-02-2018
Session Name: Introduction to Unix/Linux
Summary of learning: Learning about UNIX & Linux

Friday, 16 February 2018

Configuring Windows Recovery & Windows Update

Windows Recovery & Windows Update

Ratings:10+5=15

Understanding Windows Updates

  • Windows Update is a Free Online Service from Microsoft. It allows users to detect and install updates for Microsoft products installed on a Windows system.
  • The types of updates are:


  1. Service Packs: It is a periodic update that corrects problems in one version of a product. Service packs provide tools, drivers and updates that extend product functionality, including enhancements developed after the product was released.
  2. Regular Updates: These are code fixes for products that are provided to individual Windows 10 customers. Updates are not intended for general installation. It can be noted that, customers may receive a custom update that is designed to enhance functionality present only within their organisation.
  3. Security Updates: These updates address security vulnerabilities. Attackers seeking to break into systems can exploit such vulnerabilities. Security updates are similar to regular updates but it is considered mandatory and it must be deployed as an when required.

Deploying Windows Updates

There are 3 methods to deploy windows update to corresponding Windows 10 PCs. They are:

  • Manual Method: It is recommended for local users of Windows 10 PCs, typically for Personal Devices or Non-Networked Devices.
  • WSUS, Windows Server Update Services Method: It is recommended for Small to Medium Enterprises. To deploy windows updates on corporate devices. The WSUS service is installed on the company server and this WSUS server authorizes the corresponding devices to receive the updates deployed by the Server.
  • The large diversified enterprises prefer automated method of Update Deployment, this is possible through integration of SCCM, System Center Configuration Manager and WSUS Server. This integration leads to automated deployment of Updates. It should be noted that, in Windows 10 Manual method, the users cannot select specific individual updates to install. While Administrators from SCCM, WSUS and Intune can select updates to be approved for installaion.
Name of Student : Harsh Tiwari
Faculty Name : Naresh  Sir
Roll No :  JK-ENR-SW-1621
Date :16-02-2018
Session Name : Configuring Windows Recovery & Windows Update
Summary of learning : Learning about Windows Recovery & Windows Update

Wednesday, 7 February 2018

Manage Storage

Managing Windows 10 BitLocker

Ratings: 10+5=15

BitLocker Basics:

  • Encryption software like BitLocker war introduced in Windows 7 and revised in later Operating System version like Windows 8.1.
  • The objective of Bitlocker is to encrypt data stored on Operating System and Data Volumes.
  • BitLocker provides Offline and Start-Up Protection to the data stored on the volumes.
  • BitLocker uses TPM Chip to protect the kyes used to encrypt your computer's data. TPM (Trusted Platform Module), TPM 1.2 supports a single "owner" authorization, with RSA 2048 Bits security standards.
  • While, TPM 2.0 has the similar functionality, additionally it used for signing/attestation with unique "owner" authorization encryption.
  • BitLocker To Go is a process in BitLocker used to encrypt the removable media.

BitLocker and Windows 10:

  • BitLocker is supported on Windows 10 editions like Windows 10 Pro, Enterprise, Education, Mobile and Mobile Enterprise.
  • BitLocker in Windows 10 supportd XTS-AES encryption algorithm. XTS stsnds for XEX-based tweaked-codebook mode with cipher text stealing, AES (Advanced Encryption Standard), to encrypt data on drives.
  • Bitlocker can encrypt a drive and the recovery keys can be saved on Azure Active Directory.
  1. Device Health Attestation, is introduced in Windows 10, it integrates with Windows 10 Mobile Device Management (MDM), framework for Open Mobile Alliance (OMA) standards.
  2. Device Guard is ability to lockdown devices in a way that meets malware protection against new and unknown malware variants.
  3. Credential Guard is the ability to store credentials (that is NTLM hashes and Kerberos tickets), credentials are stored in isolated containers which use Hyper-V and virtualization based security for additional protection.

BitLocker Deployment Options:

  • Start-Up Key: In this method, no TPM chip is required. USB contains the start-up key. Computer BIOS must support USB drive access during system boot.
  • TPM Chip Only: TPM is  a security chip on motherboard used to provide secure storage. TPM is activated in BIOS. It must be oted that if drives are moved to another system, it will no longer be protected.
  • TPM with PIN: The encryption key is stored in TPM. The user needs to enter a pin to unlock this device.This option can be enabled through Group Policy.
  • TPM with Start-Up Key: The TPM chip controls the Boot-Up process, the start-up key is stored in USB stick, it should be enabled through Group Policy.
  • TPM+PIN+Start-Up Key: This is the most secure and potentially hardest to manage option. The start-up key is stored in the USB stick, encryption key is stored in TPM. This model supports the Multi-Factor Authentication. This method is enabled through Group Policy.

BitLocker To Go:

  • BitLocker To Go, is used to support encryption for devices like:
  1. Flash Drives
  2. SD Cards
  • The condition is removable drives must be formatted with NTFS or FAT file systems
  1. You can Use Password Or Smartcard to unlock the BitLocker To Go Drives.
  2. Note, in a Windows 10 Device, access conntrol panel, Navigate to BitLocker Drive Encryption, to access the features of "bitLocker To Go".


Name of Student : Harsh Tiwari
Faculty Name : Naresh
Roll No :  JK-ENR-SW-1621
Date :09-02-2018
Session Name : Manage Storage
Summary of learning : Learning about managing Windows 10 BitLocker

Networking Devices

Networking Devices Ratings:10+5=15 Introducing Networking Device: Networking: Network is a collaboration or connection of t...