Software
Assurance (SA) is a way for Volume Licensing customers to keep up to date with
the latest and most innovative Microsoft products. Customers acquire the right
to install any new release of a product covered in the agreement during the
term of the coverage.
A
Windows Server Device CAL permits one device to access or use the server
software; whereas, a Windows Server User CAL permits one user irrespective of a
device to access or use the server software.
When
you acquire licenses from Microsoft and its partners in certain quantities or
volumes, they offer discounts from their retail product prices. Volume
Licensing programs offer companies of all sizes an economical way to buy and
manage multiple software licenses for as few as five desktops.
No,
Windows Server 2008 or Windows Server 2003 R2 can be upgraded to Windows Server
2008 R2.
FCI
provides a built-in solution to classify and manage files to users and help
them to save time and money. Administrators can automatically classify files
based on content and location, generate reports, and schedule file management
tasks to manage data.
Explain the difference between Windows Server 2008 R2
license and Windows Server 2008 CAL. | Networking
The
Windows Server 2008 CAL grants the right to a device or user to access the
server software; whereas, the Windows Server 2008 R2 license gives the license
holder the right to create, copy, store, and run the server software.
Hyper-V
Processor Compatibility Mode allows live migration across different CPU
versions within the same processor family, such as Intel Core 2 to Intel
Pentium 4 or AMD Opteron to AMD Athlon. It also enables migration across a
broader range of server host hardware.
Live
migration enables customers to move virtual machines from one host to another
with no perceivable downtime. It facilitates hardware maintenance, and upgrades
manual failover and the consolidation of workloads on fewer servers.
Netsh
is
a command-line scripting utility that is used to display or modify the network
configuration of a computer that is currently running. Both remote computers
and local computers can be configured by using the netsh command. Netsh also
provides a scripting feature that allows you to run a group of commands in
batch mode against a specified computer.
Multiple
active firewall profiles enable the firewall rules most appropriate for each
network adapter based on the network to which it is connected.
NDF,
Network Tracing, and Netsh Trace integrate the Network Diagnostics Framework
with Network Tracing and a new Netsh context, Netsh Trace, to simplify and
consolidate network connectivity troubleshooting processes.
Mobile broadband
device support provides a driver-based model for devices that are used to
access a mobile
broadband network.
URL-based QoS enables administrators to assign a priority level to traffic based on the Uniform Resource Locator (URL) from which the traffic originates.
BranchCache enables updated content from file and Web servers on a Wide Area Network (WAN) to be cached on computers at a local branch office, improving application response time and reducing WAN traffic.
VPN Reconnect automatically re-establishes a VPN connection as soon as Internet connectivity is restored, saving users from re-entering their credentials and recreating the VPN connection.
DirectAccess enables users to access an enterprise network without the extra step of initiating a Virtual Private Network (VPN) connection.
Following are the new networking features in Windows 2008 R2:
1. DirectAccess
2. VPN Reconnect
3. BranchCache
4. URL-based Quality of Service (QoS)
5. Mobile broadband device support
6. Multiple active firewall profiles
7. NDF, Network Tracing, and Netsh Trace
For both Windows 2003 and Windows 2008, available service packs are SP1 and SP2.
Client and server are two different machines (physical or virtual) connected in such a manner that whenever a client posts some request to a server, the server provides an appropriate response to the client.
Device
driver Is a software component that provides an interface between the hardware
of a computer and its operating system. Hardware, such as keyboards,
controllers, and graphics cards, requires device drivers so that the operating
system can detect the devices and handle them effectively and efficiently.
NetBIOS
stands for Network Basic Input / Output System. It is an application interface,
which operates at the session layer. It enables communication between applications
with NetBIOS compliant protocol.
NetBIOS applications can be supported over Transmission Control
Protocol/Internet Protocol (TCP/IP) and IPX/SPX.
IPX/SPX
stands for Internetwork Packet Exchange/Sequenced Packet Exchange. It is used
in the Netware environment. IPX runs at the network layer of the Open Systems
Interconnection (OSI) model; whereas, SPX runs at the transport layer of the
OSI model.
NetBEUI
is designed for peer-to-peer network and is a high speed protocol used on small
networks. It provides a good recovery and error protection.
No, it is not routable.
No, it is not routable.
A
network binding binds a protocol to an adapter to carry traffic using that
protocol.
FDDI
is a token-passing dual ring fiber optic LAN specification. It supports higher
transmission speeds across larger distances of around 2 km (1.3 miles) between
two stations.
The maximum network
length of 10Base2 is 185 m for each segment and can be extended up to five
segments.
The maximum network length of 10Base5 is 500m for each segment and can be extended up to five segments.
The maximum network length of 10Base5 is 500m for each segment and can be extended up to five segments.
Maximum
stations that can be connected to 10Base2 are 30 stations.
Maximum stations that can be connected to lOBaseT are 1024 stations per network.
Maximum stations that can be connected to 10Base5 are 100 nodes per segment and maximum network length of 10Base5 is five segments, that is, approximately 2500 m or 8200 ft.
Maximum stations that can be connected to lOBaseT are 1024 stations per network.
Maximum stations that can be connected to 10Base5 are 100 nodes per segment and maximum network length of 10Base5 is five segments, that is, approximately 2500 m or 8200 ft.
Transmission
failure can be caused by the following reasons:
1. Bad cabling
2. Improper termination
3. Collisions
4. Improper cable length.
1. Bad cabling
2. Improper termination
3. Collisions
4. Improper cable length.
A
token is a small frame, which is passed from one node to another in a token ring network. If a
node has data to send, it must wait until it receives a token. After the token
is received by the node, it seizes the token, marks it as used, and attaches
the data. The frame is then addressed to the destination node and the node
continues passing the data around the ring until it arrives at the destination
node. The destination node copies the data and marks the frame as received.
When the sender node receives the frame, it implies that the data is
successfully delivered. The sender node then frees the token to be used by
another node.
CSMA/CD is a
layer 2 access method in which if a transmitting data station detects another
signal while transmitting a frame, it stops transmitting the frame. Instead of
the frame, it transmits a jam signal, and then waits for a random time interval
before trying to send the frame again.
Multiple devices cannot communicate on the network
simultaneously; therefore, what type of method must be used to allow one device
to access network media at a time?
Carrier
Sense Multiple Access / Collision Detection (CSMA/CD) and token passing.
A
hub is a device that connects multiple user stations, each through a dedicated
cable.
A repeater is a device used to interconnect the media segments of an
extended network. It enables a series of cable segments to be treated as a single
cable. Repeaters receive signals from one network segment and amplify, retime,
and retransmit those signals to another network segment to prevent signal
deterioration caused by long cable lengths and large numbers of connected
devices.
The
commonly used devices in a LAN network are repeaters, hubs, LAN extenders,
bridges, LAN switches, and routers.
A
tree topology is a LAN architecture that is similar to the bus topology but
with multiple nodes. It can also be defined as a combination of the bus and
star topologies.
What types of topologies are commonly used for Local Area
Network (LAN) and Wide Area Network (WAN)? | Networking
Bus,
ring, star, mesh, tree, and cellular topologies are used for LANs; whereas,
point-to-point, multipoint, mesh, and cloud topologies are used for WANs.
Normally,
USB cables are limited to 5m; however, hubs can be used as an active USB
repeater to extend the cable length for up to 5m at a time.
USB hubs can
generally extend a USB network to a maximum of 127 ports.
RJ-11 is used to connect a modem to wall jack.
USB
is an external hardware interface and communications standard that is utilized
for connecting varied peripherals to a computer, such as mouse, external drive,
digital cameras, memory sticks, and gaming peripherals.
The
FU-45 connector is an industry standard for Ethernet and Fast Ethernet
networking. It is used to attach short cable (patch cable) to connect the
computer to wall jack.
The
RJ-11 connector is generally used to connect standard telephone cord.
The
different types of connectors are DB-9, DB-25, RJ-11, RJ- 45, Bayonet
Neill-Concelman (BNC), PS2/MINI-DIN, and Universal Serial Bus (USB).
Ethernet network cards use the RJ-45 connector; whereas, wireless network cards
usually have no external connections other than an antenna jack.
The different types of network card are as follows:
1. Ethernet card
2. Wireless network card
3. Token Ring network card.
1. Ethernet card
2. Wireless network card
3. Token Ring network card.
A network card Is an expansion card installed
in a computer that enables the computer to be physically connected to a
network.
0 comments:
Post a Comment