CSS Reviewer
CSS Reviewer
3 Meters
Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in
units called blocks and rewrites data at the byte level. Flash memory is widely used for storage
and data transfer in consumer devices, enterprise systems and industrial applications.
Flash memory is a long-life and non-volatile storage chip that is widely used in embedded
systems. It can keep stored data and information even when the power is off. It can be
electrically erased and reprogrammed. Flash memory was developed from EEPROM
(electronically erasable programmable read-only memory).
Types of flash memory
- SSDs store data permanently inside an integrated circuit, typically using flash memory. The
flash memory inside an SSD means data is written, transferred, and erased electronically
and silently
M. 2 is a Form Factor used for expansion cards Storage Drives, and connectors that are internally
mounted into a computer.
3. Read-only memory, or ROM, is a type of computer storage containing non-volatile,
permanent data that, normally, can only be read, not written to. Inside the ROM there’s a
Firmware.
Firmware is software that provides basic machine instructions that allow the hardware to
function and communicate with other software running on a device. Firmware provides low-level
control for a device's hardware.
ROM provides the necessary instructions for communication between various hardware
components. As mentioned before, it is essential for the storage and operation of the BIOS, but it can
also be used for basic data management, to hold software for basic processes of utilities and to read
and write to peripheral devices.
The major advantage of ROM is its non-volatile nature, which helps it retain information even after
you turn off the power or shut down the computer. ROM stores all the data necessary for your PC to
start and load the operating system. It's a more reliable memory since all of its circuitry is very
simple
Function:
An ISO file (often referred to as an ISO image) is an archived file containing an accurate copy (or
image) of data found on an optical disk, for example, a CD or a DVD. This file format is often
used to back up optical disks or arrange large sets of files for further writing to an optical disk.
For Windows 10
16 GB for Windows 10 32-bit, 20 GB for Windows 10 64-bit.
For Windows Server
Windows Server 2012 requires at least 10 GB of disk space for installation, and at
least 32 GB of available disk space is recommended.
T568A t568B
Cross Over
connect two devices of the same type together.
Ex. Pc to Pc ,switch to switch
Straight Through
connect two devices of different types together.
Ex. PC to Switch , Pc to Router or Access point,
Roll Over
Rollover cable (also known as a Yost cable, Cisco cable, or a Console cable) is a type of null-modem
cable that is used to connect a computer terminal to a router's console port.
-referred to as Yost cables are most commonly used to connect to a device's console
port to make programming changes to the device. Unlike crossover and straight-wired cables,
rollover cables are not intended to carry data but instead create an interface with the device.
9. Lan problem
10. Network Interface Card NIC
-also known as Lan Card or Ethernet Card, is a computer expansion card that allows your PC, laptop, or
server to connect to a network via an ethernet cable and has 2 LED Light Emitting Diode.
therefore it allow your different devices to communicate together and share information and data for a more
productive and efficient IT system.
It is used to create an additional communication port on a computer or similar, which can then be connected
to a network. This will often mean the internet, for which the connection will either be wireless (Wi-Fi) or
via an RJ45 Ethernet cable.
11. Router
It is a networking device that forwards data packets between computer networks. It
connects two or more packet-switched networks or subnetworks. It serves two primary
functions: managing traffic between these networks by forwarding data packets to their intended IP
addresses, and allowing multiple devices to use the same Internet connection.
12.Wifi
Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-
speed Internet access. A common misconception is that the term Wi-Fi is short for "wireless
fidelity," however Wi-Fi is a trademarked phrase that refers to IEEE 802.11x standards.
less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.
-is used for connecting the computer devices of personal use is known as Personal Area
Network.
-Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area
Network.
-Personal computer devices that are used to develop the personal area network
are the laptop, mobile phones, media player and play stations.
Example Body Area network - mobile network moves with a person. Suppose a person
establishes a network connection and then creates a connection with another device to
share the information.
Small Home Office - It is used to connect a variety of devices to the internet and to a
corporate network using a VPN.
Offline Network - it is also known as a home network is designed to integrate the devices
such as printers, computer, television but they are not connected to the internet.
MAN (Metropolitan Area Network)
-is a network that covers a larger geographic area by interconnecting a different LAN to
form a larger network.
-Government agencies use MAN to connect to the citizens and private industries.
-In MAN, various LANs are connected to each other through a telephone exchange line.
-The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL,
etc.
is the network that connects your offices, data centers, cloud applications, and cloud
storage together. It is called a wide-area network because it spans beyond a single building or large
campus to include multiple locations spread across a specific geographic area, or even the world.
-A Wide Area Network is a network that extends over a large geographical area such as
states or countries.
-is not limited to a single location, but it spans over a large geographical area through a
telephone line, fibre optic cable or satellite links.
-A Wide Area Network is widely used in the field of Business, government, and education.
Examples
A logical subnetwork that groups collection of devices from the same network switch.
is a virtualized connection that connects multiple devices and network nodes from different LANs
into one logical network.
VLANs allow multiple LANs and associated devices to communicate via wireless internet.
Network Latency - is the delay in network communication. Shows the time that data takes to
transfer across the network
allows users to move around the coverage area in a line of sight while maintaining a network connection.
use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users
to move around the coverage area, often a home or small office, while maintaining a network
connection.
is a specialized, high-speed network that provides network access to storage devices. SANs are typically
composed of hosts, switches, storage elements, and storage devices that are interconnected using a variety
of technologies, topologies, and protocols. SANs may span multiple sites.
Benefits.
Improved application availability- increased reliability, availability and serviceability
Better application performance- move storage processing from servers onto separate networks
Central and consolidated - make simpler management, scalability, flexibility and high availability
possible
Remote site data transfer and vaulting -protect data from disaster and malicious attacks
Simple centralized management- simplify management by creating single images of storage media.
16. WIRELESS Security Protocol/ Wireless Encryption Protocol
WiFi Protected Access or WPA was created in 2003. This temporary enhancement still has relatively poor
security but is easier to configure. WPA uses Temporal Key Integrity Protocol (TKIP) for more secure
encryption than WEP offered.
WPA 2
WPA2 has stronger security and is easier to configure than the prior options. The main difference with
WPA2 is that it uses the Advanced Encryption Standard (AES) instead of TKIP. AES is able to secure top-
secret government information, so it’s a good option for keeping a personal device or company WiFi safe.
WPA2 is the latest security protocol developed by the Wi-Fi Alliance. There are two versions of
WPA2, Personal and Enterprise. Both use a strong encryption method called AES-CCMP to
encrypt data transmitted over the air. The main difference between these security modes is in
the authentication stage.
WPA2-Personal
-is a type of encryption that uses either the TKIP (Temporal Key Integrity Protocol) or AES
(Advanced Encryption Standard) encryption mechanism to safeguard network access and
data transfer.
Verifies network users through a server and requires a more complicated setup, but
provides additional security.
-802.1X is a network authentication protocol that opens ports for network access when
an organization authenticates a user's identity and authorizes them for access to the network.
An IEEE standard for port-based network access control (PNAC) on wired and wireless
access points. 802.1X defines authentication controls for any user or device trying to
access a LAN or WLAN.
provides better protects critically important information and can save a sufficient amount
of time and money over time.
The network security standard that tries to make connections between a router and wireless devices
faster and easier.
is an optional certification program based on technology designed to ease the setup of security-enabled
Wi-Fi® networks in home and small office environments. Wi-Fi Protected Setup supports methods
(pushing a button or entering a PIN) that are familiar to most consumers to configure a network and
enable security.
There are two primary approaches to network setup within Wi-Fi Protected Setup: push-button and PIN
entry. PIN entry is mandatory in all Wi-Fi Protected Setup devices, while push-button is optional and may
also be found in some devices.
Lan Card
Broadbrand Router
Broadband routers are built for ease of installing home networks, especially for households
with high-speed Internet service. In addition to allowing all consumer appliances devices
to share an internet connection, broadband routers often allow data, printers as well as
other electronic devices to be shared between home computers and other devices.
Edge Router
This router is placed at the edge of an ISP network, which is configured to an external protocol like BGP
(Border Gateway Protocol) to another ISP or BGP.
These routers help to Grow resiliency and density by providing programmability for a scalable network
edge.
Edge routers work to secure the network edge and protect the core by characterizing and securing IP
traffic from other edge routers as well as core routers.
supports data transfer rates from 100 kbps to 300 kbps, delivers application performance, and enables
devices to dynamically optimize for both range and performance.
Virtual Router
provide multitenant network services for private, public, as well as provider-hosted clouds.
It works as per the redundancy protocol for the virtual router (VRRP), it becomes active when the main
or primary router is disabled.
open source software based router for PCs running Windows 8, Windows 7 or Windows Server 2008 R2.
Using Virtual Router, users can wirelessly share any internet connection (Wifi, LAN, Cable Modem, Dial-
up, Cellular, etc.) with any Wifi device (Laptop, Smart Phone, iPod Touch, iPhone, Android Phone, Zune,
Netbook, wireless printer, etc.) These devices connect to Virtual Router just like any other access point,
and the connection is completely secured using WPA2 (the most secure wireless encryption.)
Wireless Router
A wireless router is also known as a WLAN (wireless local area network) Or Wifi Router
device. This wireless Network established is termed a Wi-Fi network. Wireless routers must
be secured with Login ID and password. use in Home.
Core Router
A core router is a computer communication device and it is design to operate in the Internet backbone
of the network, which means it links all network devices. It allows for fast data communication.
It is a wired or wireless router that distributes data packets within a network but does not distribute data
packets within multiple networks.
refers to the largest and most capable routers of the then-current generation.
Bandwidth
is the data transfer capacity of a network in bits per second (Bps).
is a measure of how much information a network, a group of two or more devices that
communicate between themselves, can transfer.
is the amount of data that can be transmitted in a specified amount of time.
Encryption the method by which information is converted into secret code that hides the information's
true meaning.
Molex Connector
Known as Molex power Often refers to the 4-pin connectors used to attach DC power to the drives inside
a PC cabinet. Molex is a large manufacturer of electronics plugs and sockets that dates back to the 1940s.
ATX
is (Advanced Technology eXtended) a motherboard and power supply configuration specification,
patented by David Dent in 1995 at Intel.
is the most common motherboard design.
ITX
Information Technology Extended, or ITX, is a form factor for small computer motherboards developed
by VIA Technologies.
Mini-ITX was to build computing systems for industrial and consumer use with useful features and a
high-speed processor in a compact footprint.
1. Thermal Paste
A silvery-gray substance that you apply to a processor before installing a cooling solution.
It allows for an efficient transfer of heat from the IHS of the processor to the base plate or water
block of the CPU cooler that is designed to dissipate that heat.
3.
Firmware is software that provides basic machine instructions that allow the hardware to
function and communicate with other software running on a device. Firmware provides low-level
control for a device's hardware.
5. The minimum hardware requirements of the computer RAM For Windows 10, 8 ,7,
1 gigabyte (GB) for 32-bit or 2 GB for 64-bit
6. Network Administrator
7. File Server
is used to store the user documents with a large amount of memory and storage space.
A file server is a central server in a computer network that provides file systems or at least parts
of a file system to connected clients. File servers therefore offer users a central storage place
for files on internal data media, which is accessible to all authorized clients.
Application Server
are network computers that store and run an application for client computers. Application servers,
whatever their function, occupy a large chunk of computing territory between database servers and the
end user.
Most broadly, this is called “middleware”
provide access to a wide variety of data on the network.
application servers connect database information (usually coming from a database server) and the
end-user or client program (often running in a Web browser)
IP Internet Protocol
An IP address is a unique address that identifies a device on the internet or a local network. IP stands for
"Internet Protocol," which is the set of rules governing the format of data sent via the internet or local
network.
They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a
division of the Internet Corporation for Assigned Names and Numbers (ICANN)
Types of IP Address
Private IP addresses
Every device that connects to your internet network has a private IP address. This includes computers,
smartphones, and tablets but also any Bluetooth-enabled devices like speakers, printers, or smart TVs.
With the growing internet of things, the number of private IP addresses you have at home is probably
growing. Your router needs a way to identify these items separately, and many items need a way to
recognize each other. Therefore, your router generates private IP addresses that are unique identifiers for
each device that differentiate them on the network.
Public IP addresses
A public IP address is the primary address associated with your whole network. While each connected
device has its own IP address, they are also included within the main IP address for your network. As
described above, your public IP address is provided to your router by your ISP. Typically, ISPs have a
large pool of IP addresses that they distribute to their customers. Your public IP address is the address that
all the devices outside your internet network will use to recognize your network.
Public IP Address Comes in two Forms
Dynamic IP addresses
Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of IP addresses and
assign them automatically to their customers. Periodically, they re-assign them and put the older IP
addresses back into the pool to be used for other customers. The rationale for this approach is to generate
cost savings for the ISP. Automating the regular movement of IP addresses means they don’t have to carry
out specific actions to re-establish a customer's IP address if they move home, for example. There are
security benefits, too, because a changing IP address makes it harder for criminals to hack into your
network interface.
Static IP addresses
In contrast to dynamic IP addresses, static addresses remain consistent. Once the network assigns an IP
address, it remains the same. Most individuals and businesses do not need a static IP address, but for
businesses that plan to host their own server, it is crucial to have one. This is because a static IP address
ensures that websites and email addresses tied to it will have a consistent IP address — vital if you want
other devices to be able to find them consistently on the web.
Class Of IP Address
CLASS A
Range to 0-127
are to be utilized for addresses with larger networks, with a large number of hosts
CLASS B
Range to 128-191
are for medium-sized to large-sized networks.
CLASS C
Range to 192-223
are for small networks.
CLASS D
Range to 224-239
are not allocated to hosts and are used for multicasting. Multicasting allows a single host to send a single
stream of data to thousands of hosts across the Internet at the same time.
CLASS E
Range to 240-255
are not allocated to hosts and are not available for general use. These are reserved for research purposes.
Directory Services
is a database that stores and maintains information about users and resources.
are used in many different applications, including email systems, enterprise resource planning (ERP)
systems, and content management systems.
can be either centralized or distributed.
In a centralized service, all the information is stored on one server. With a distributed directory service,
information is stored on multiple servers. This can be done for redundancy or to provide faster
performance.
Directory Server
provides a central repository for storing and managing information.
allows the central administration and management of network users and network resources.
provides the foundation for the new generation of e-business applications and Web services, with a
centralized and distributed data repository that can be used in your intranet or over your extranet with
your trading partners.
Directory Server two ways in which applications can access its enterprise-wide directory;
provides a common language that client applications and servers use to communicate with one
another.
LDAP-based applications can easily search, add, delete and modify directory entries.
is a markup language that enables you to represent directory entries and commands in XML.
XML-based applications using HTTP can take advantage of directory services while staying
within the existing web infrastructure.
Directory Services
is the collection of software and processes that store information about your enterprise, subscribers, or
both. An example of a directory service is the Domain Name System (DNS), which is provided by DNS
servers.
are an essential part of today's network-centric computing infrastructure. Directory-enabled applications
now power almost all the mission critical processes of an enterprise, including resource planning, value
chain management, security and firewalls, and resource provisioning. Directory services also provide the
foundation for deployment of e-business and extranet applications.
Terminal Server
is a powerful tool that can provide cost savings, energy efficiency, remote access, centralized
management, and increased security for businesses and organizations such as educational institutions,
healthcare facilities, and government organizations.
Network Protocol
are a set of rules outlining how connected devices communicate across a network to exchange
information easily and safely.
serve as a common language for devices to enable communication irrespective of differences in
software, hardware, or internal processes.
Types Of Communication Protocol
Communication Protocol
Network Security Protocol
Network Management Protocol
Communication Protocol
Or an established set of rules that determine how data is transmitted between different devices in the
same network.
Communication protocols govern various aspects of analog and digital communications, such as syntax,
authentication, semantics, and error detection.
set of rules that describe how software and hardware should interact within a network
Protocols Use in Network Communications Protocol
Hyper-Text Transfer Protocol (HTTP)
Commonly referred to as the protocol of the internet that allows communication between a server
and browser.
These protocols ensure safe data transmission over the network connections. Network security
protocols define the procedures to secure data from any unauthorized access. These protocols leverage
encryption and cryptography to safeguard.
Encryption - protects the data by ensuring that only authorized entities have access;
Authentication - ensures that the devices on a network are who they claim to be;
Transportation - ensure the security of data while it is transmitted from one network device to
another.
Network managers require standard policies and procedures to manage and monitor the
network for maintaining smooth communication. Network management protocols ensure quick
troubleshooting and optimal performance across the network.
USB-C
v formally known as USB Type-C, A 24-pin USB connector system with a rotationally symmetrical
connector.
Chipset
a set of chips that extends the interfaces between all of the components of a motherboard.
It facilitates communication between the CPU and other devices in the system
manages the flow of data between components on a motherboard.
it controls communications between the processor and external devices
handles a computer’s faster interaction requirements and controls communication between the
CPU, RAM, ROM, the basic input/output system (BIOS), the accelerated graphics port (AGP) and the
southbridge chip.
ANSI (American National Standards Institute)
is the main organization supporting the development of technology standards in the United States. ANSI
works with industry groups.
is a private nonprofit organization that oversees the development of voluntary consensus standards for
products, services, processes, systems, and personnel in the United States.
TIA (Telecommunications Industry Association)
accredited by the American National Standards Institute (ANSI) to develop voluntary, consensus-based
industry standards for a wide variety of Information and Communication Technologies (ICT) products,
and currently represents nearly 400 companies.
represents the interests of the global information and communications technology (ICT) industry.
develops industry standards, drafts policy initiatives, and conducts market intelligence.
brings together communities of interest across -- Technology, Government Affairs, Standards, and
Business Performance -- to enable high-speed networks and accelerate next-generation Information and
Communications Technology (ICT). Ensure quality performance and connectivity. Support technological
innovation.
ANSI/TIA-568
is a technical standard for commercial building cabling for telecommunications products and
services. The title of the standard is Commercial Building Telecommunications Cabling Standard and is
published by the Telecommunications Industry Association (TIA).
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules.
can be viewed as gated borders or gateways that manage the travel of permitted and prohibited web
activity in a private network.
for web traffic management — typically intended to slow the spread of web threats.
Types of Cables
IEEE (Institute of Electrical and Electronics Engineers)
was formed from the amalgamation of the American Institute of Electrical Engineers and the Institute of
Radio Engineers[6] in 1963.
It is designed to serve professionals involved in all aspects of the electrical, electronic, and Computer
Engineering and related areas of science and technology that underlie modern civilization.
is the world's largest technical professional organization dedicated to advancing technology for
the benefit of humanity. with more than 423,000 members in over 160 countries around the
world.
Media type specified in the IEEE 802.3 standard for Ethernet local area networks (LANs).
10BASE-2
-consists of Thinwire coaxial cable with a maximum segment length of 185 up to 200 meters.
supports Ethernet’s 10 Mbps data rate
10BASE-5
consists of Thickwire coaxial cable with a maximum segment length of 500 meters.
10BASE-F
10BASE-T
10BASE-36
10-megabit Ethernet that compose of broadband coaxial cable carrying multiple baseband
channels for a maximum length of 3,600 meters.
“10" in the media type designation refers to the transmission speed of 10 Mbps. The
"BASE" refers to baseband signaling, which means that only Ethernet signals are carried
on the medium. "T" represents twisted-pair; the "F" represents fiber optic cable "2", "5",
and "36" refer to the coaxial cable segment length.
In 100 Mbps (megabits per second) Ethernet (known as Fast Ethernet), there are three types of
physical wiring that can carry signals:
IEEE 1394 or i.LINK, commonly known as FireWire, high-speed computer data-transfer interface that
was used to connect personal computers, audio and video devices, and other professional and consumer
electronics.
a standard connection type for many electronic devices such as digital video cameras, printers and
scanners, external hard drives, and other peripherals.
its fast and reliable transfer rate
interface offered data-transfer rates of up to 3,200 megabits (millions of bits) per second, at that time
considerably faster than other serial buses.
frequently used in professional video editing and real-time video transmissions.
commonly used to connect electronic appliances in automobiles, such as DVD players, stereo sound
systems, and GPS (global positioning system) navigators.
-is a family of Intel southbridge microchips used to manage data communications between a CPU and
a motherboard, specifically Intel chipsets based on the Intel Hub Architecture.
-microchip to manage data communication between a CPU and a motherboard is also known as
Southbridge.
-ICH is used to connect and control peripheral devices.
-It is designed to be paired with a second support chip known as a northbridge. As with any other
southbridge.
-connects input and output (I/O) devices to the bus system of a central processing unit (CPU).