Beruflich Dokumente
Kultur Dokumente
p£¢ja
p£¢ja
p§Q£fœ
Øfn¡¢mø/CE¢V¢m¢V fË¢nrZ
®S¢pJ He¢pJ L¢ÇfEV¡l ®eVJu¡LÑ ®L¡pÑ
fªù¡
pw¢rç f¡WÉœ²j 1
¢hÙ¹¡¢la f¡WÉœ²j 2
Basic Network:
1z Intro to com network, types of network, network related terms.
2z Network accessories and connectors (Switch, hub, router).
3z Transmission media.
4z Concept of IP Address (static & dynamic)
5। Establishing of LAN and WAN
1
p£¢ja
p£¢ja
SCHOOL OF SIGS
JCO/OR ICT ADV COURSE (LEVEL-1 NETWK TECH)
DETAIL SYLLABUS
2
p£¢ja
p£¢ja
SCHOOL OF SIGS
JCO/OR ICT ADV COURSE (LEVEL-1 NETWK TECH)
DETAIL SYLLABUS
3
p£¢ja
p£¢ja
Computer Network ¢L ?
p¡d¡le AbÑ ®eVJu¡LÑ hma A¡jl¡ S¡¢mL¡ pð¢ma HL¢V L¡W¡j¡L h¤T b¡¢L z HC S¡¢mL¡ pð¢ma Hl Efl ¢i¢š LlC °al£
Ll¡ quR L¢ÇfEV¡l ®eVJu¡LÑ z c¤C h¡ aa¡¢dL L¢ÇfEV¡l kMe HL¢V fÜ¢al j¡dÉj flØfll p¡b k¤š² qu H®L Afll p¡b
¢h¢ieÀ abÉ A¡c¡e - fÊc¡e Ll b¡L aMe a¡L L¢ÇfEV¡l ®eVJu¡LÑ hm z HC ®eVJu¡LÑ pwk¤š² pLm L¢ÇfEV¡l HL Afll
¢h¢ieÀ dlel ¢Xi¡Cp h¡ k¿»¡wn hÉhq¡l Lla f¡l z H…m¡ qa f¡l ¢fʾV¡l , úÉ¡e¡l , jXjpq A¡lJ ¢h¢ieÀ dlel ¢Xi¡Cp z
¢ejÀ HL¢V ®eVJu¡LÑl ¢Qœ ®cJu¡ qmx
Switch
¢h¢ieÀ fÊL¡ll ®eVJu¡LÑ z NWe Hhw hÉhq¡ll Efl ¢i¢š Ll ®eVJu¡LÑL ¢h¢ieÀ i¡N i¡N Ll¡ ®ka f¡l z ¢ejÀ ¢h¢ieÀ
dlel ®eVJu¡LÑ pÇfLÑ pw¢rç A¡m¡Qe¡ Ll¡ qm¡ x
LAN (Local Area Network) z HL¢V ¢e¢cÑø ihe h¡ LÉ¡Çf¡p k¢c HLcm L¢ÇfEV¡l ®eVJu¡LÑi¤š² qu a¡qm ®p¢V
LAN e¡j f¢l¢Qa qh z LAN Hl Ad£e ®L¡e HL¢V ihel HLC am¡u Ah¢ÙÛa p¡h…m¡ L¢ÇfEV¡l b¡La f¡l Abh¡ ®L¡e
HL¢V ®L¡Çf¡e£l HLC ihel HL¡¢dL am¡u L¡R¡L¡¢R ®gÓ¡ll L¢ÇfEV¡l…m¡ mÉ¡ei§š² qa f¡l z ah Hrœ HL¢V ¢e¢cÑø
c§l¦aÆl jdÉ L¢ÇfEV¡l…m¡L b¡La qhz ¢ejÀ HL¢V p¡d¡le j¡el ®m¡L¡m H¢lu¡ ®eVJu¡LÑl ¢Qœ ®cJu¡ qm x
Switch
4
p£¢ja
p£¢ja
MAN ( Metropoliton Area Network ) z jÉ¡e h¡ ®jVÊ¡f¢mVe H¢lu¡ ®eVJu¡LÑ qµR La…m¡ L¢ÇfEV¡l Hl
®eVJu¡LÑ h¡ ®m¡L¡m H¢lu¡ ®eVJu¡LÑl pj¢ø k¡ HL¢V f¤l¡ nql h¡ hs A¡L¡ll ®L¡e Hm¡L¡hÉ¡f£ ¢hÙ¹«a z jÉ¡el A¡L¡l mÉ¡el
Q¡Ca hs ¢L¿¹¤ Ju¡el Q¡Ca ®R¡V zmÉ¡el a¤me¡C jÉ¡e ¢XS¡Ce Ll¡ ¢LR¤V¡ S¢Vm Hhw H L¡Sl SeÉ ¢hno cra¡a¡l fÊu¡Se qu
z¢LR¤ ¢LR¤ fÊ¢aù¡e ¢hno Ll hÉ¡wLl n¡M¡pj§q hs nqll ¢h¢ieÀ S¡uN¡hÉ¡f£ ¢hÙ¹ªa b¡L z Hdlel fÊ¢aù¡e jÉ¡el p¡q¡kÉ a¡cl
n¡M¡ A¢gp…m¡L k¤š² Lla f¡l z ¢ejÀ HL¢V jÉ¡el ¢Qœ ®cJu¡ qmx
Mirpur
Malibag
LAN
Uttara
LAN
MAN Backbone
Dhanmondi
LAN
WAN – Wide Area Network z Ju¡e h¡ Ju¡CX H¢lu¡ ®eVJu¡LÑ qµR La…m¡ mÉ¡el h¡ jÉ¡el hªqšj ®eVJu¡LÑ k¡l¡
¢h¢ieÀ ®i±N¢mL c§l¦aÆ Ah¢ÙÛa z Ju¡el A¡Ja¡u L¢ÇfEV¡l…m¡ ¢hnÄl ¢h¢ieÀ fÊ¡¿¹ b¡La f¡l z ah Ju¡el L¡kÑœ²j ¢eiÑl LlR
¢pNeÉ¡m p’¡me j¡dÉj h¡ m¡Ce ®kje g¡Ch¡l Af¢VL LÉ¡hm , pÉ¡Vm¡CV VÊ¡¾p¢jne , j¡Cœ²¡Jui VÊ¡¾p¢jne CaÉ¡¢cl Efl z
C¾V¡leV HL fÊL¡l Ju¡e z Ju¡e ¢XS¡Ce , ÙÛ¡fe Hhw hÉ¡hÙÛ¡fe¡ AeÉ¡eÉ ®k ®L¡e dlel ®eVJu¡LÑl a¤me¡C S¢Vm z Ju¡e
¢XS¡Ce¡lL ®V¢mk¡N¡k¡N ¢pøj pÇfLÑ i¡m d¡le¡ b¡La qh z
5
p£¢ja
p£¢ja
M¤me¡ l¡Sn¡q£
Q–NÊ¡j Y¡L¡
eVJu¡LÑl p¡b pÇfªš² BeÉ¡eÉ ¢houpj¤q (Network related terms) ¢eu ¢ejÀ Bm¡Qe¡ Ll¡ qm¡ x
†bUIqvK© Uª‡cvjRx z †bUIqv‡K©i wWRvBbMy‡jv‡K e‡j †bUIqvK© Uª‡cvjRx| HL¢V ®eVJu¡LÑl ¢g¢SLÉ¡m ¢Xi¡Cp h¡
LÇf¡e¾V (component) ®kje- LÉ¡hm, ¢f¢p, l¡EV¡l CaÉ¡¢c ®eVJu¡LÑ flØfll p¡b pwk¤š² b¡L a¡L hm¡ qu Vf¡m¢S z
®eVJu¡LÑ Vf¡m¢S j¤ma ®eVJu¡LÑl ¢g¢SLÉ¡m ®m-BEV (Layout) h¡ ®eVJu¡LÑl ¢XS¡CeL heÑe¡ Ll z ¢g¢SLÉ¡m ®m-BEV
hma HM¡e ®h¡T¡e¡ quR L¢ÇfX~V¡l h¡ ¢f˾V¡ll AhÙÛ¡e Hhw LÉ¡hm h¡ a¡l…m¡ HclL pwk¤š² Lla ¢Li¡h ¢heÉ¡Ù¹ quR ®p
¢hou¢V z ®eVJu¡LÑ Vf¡m¢SL Bh¡l ®LE ®LE ¢g¢SLÉ¡m Vf¡m¢S ¢qph J BMÉ¡¢ua Lle z
kpLm p¡d¡lZ ®eVJu¡LÑ LÇf¡e¾V ®kje ¢j¢Xu¡ h¡ LÉ¡hm, L¡eƒl CaÉ¡¢c ®eVJu¡LÑ Vf¡m¢S pª¢ø Ll, ®p…m¡ j¤max JHpBC
jXml ¢g¢SLÉ¡m mu¡l ¢Xi¡CS ¢qph ¢Q¢q²a z ®eVJu¡LÑ Vf¡m¢S p¡d¡lZa fy¡Q¢V z ®kje- h¡p Vf¡m¢S, ØV¡l Vf¡m¢S, ¢lw
Vf¡m¢S, ØV¡l h¡p Vf¡m¢S h¡ ®jp Vf¡m¢S Hhw ¢VÊ Vf¡m¢S z ¢ejÀ ®eVJu¡LÑ Vf¡m¢S pÇfLÑ ¢hÙ¹¡¢la Bm¡Qe¡ Ll¡ qm¡x
h¡p Vf¡m¢S z h¡p Vf¡m¢S Hje HL¢V Vf¡m¢S ®kM¡e HL¢V LÉ¡hml p¡b AeL…m¡ L¢ÇfEV¡l pwk¤š² b¡L Hhw
LÉ¡hml ®no j¡b¡u HL¢V V¡¢jÑeVl (Terminator) m¡N¡e¡ b¡L z Ec¡qlZpl©f HM¡e hm¡ k¡u ¢beeV ®L¡-H¢„um (Thinnet
Co-axial) LÉ¡hm à¡l¡ pwk¤š² Cb¡leV ®eVJu¡LÑ h¡p Vf¡m¢S NWe Ll z h¡p Vf¡m¢Sa pªø pjpÉ¡ ¢eZÑu a¥me¡j¤mL ®hn
S¢Vmz LÉ¡hml HL¢V j¡œ ÙÛ¡e pªø œ¦¢V h¡ ®hËL (Break) f¤l¡ ®eVJu¡LÑL AQm Ll ¢ca f¡l z
ØV¡l VÊf¡mS£ z AeL ®q¡j ®eVJu¡LÑ CES¡l HC VÊf¡mS£ hÉhq¡l Ll b¡L z HC VÊf¡mS£a p¡d¡lea HL¢V ®p¾VÊ¡m
fu¾V h¡ ®L¾cУu ¢Xi¡Cp Hl p¡b pwk¤š² b¡L z ®L¾cУu ¢Xi¡Cp¢V qa f¡l HL¢V q¡h, p¤CQ h¡ l¡EV¡l z HC ¢Xi¡CS qa UTP
6
p£¢ja
p£¢ja
Cable Hl p¡q¡kÉ Ethernet Port Hl p¡b pwk¤š² Ll¡ qu z L¡e L¢ÇfEV¡l X¡V¡ VÊ¡¾p¢jV Lla Q¡Cm a¡ fËbj q¡h h¡ p¤CQ H
f¡¢Wu ®cu Hhw flha£Ña q¡h h¡ p¤CQ ®p ¢pNeÉ¡mL mrÉÙÛm f¡W¡e¡l SeÉ kb¡kb l¦V f¡¢Wu ®cu z ®L¡e ®eVJuLÑ HL¡¢dL q¡h
h¡ p¤CQ k¤š² qm a¡L hm¡ qu ¢VÊ (Tree) h¡ q¡ul¡l¢LLÉ¡m (Hierarchical) Vf¡m¢S z p¡d¡lea ØV¡l Vf¡m¢Sa h¡p
VÊf¡m¢Sl a¥me¡u ®hn£ LÉ¡hm fËu¡Se qu ¢L¿º HC fËk¤¢š²a ®eVJu¡LÑl ®kL¡e HL¢V m¡Ce ¢h¢µRæ qm eVJu¡LÑl AeÉ pwk¡Nl
L¡e pjpÉ qu e¡ z
¢lw Vf¡m¢S z HC Vf¡m¢Sa ®eVJu¡LÑi¨š² pLm L¢ÇfEV¡l pl¡p¢l HL Afll p¡b ¢lw h¡ j¡m¡ BL«¢aa pwk¤š² b¡L z ¢lw
Hl ®L¡e HL ÙÛ¡e ®hËL (Break) qm a¡ f¤l¡ ®eVJu¡LÑL AQm Ll ®cu z H L¡lZ ¢l Vf¡m¢Sl ®eVJu¡LÑ ®XV¡ Vʾp¢jne
hÉhÙÛ¡ ¢e¢ÕQa Lla ¢àa£u HL¢V ¢lw ®k¡N Ll¡ qu z ¢àa£u ¢lw¢VL hm¡ qu ®pLä¡l£ ¢lw (Secondary Ring) z
¢VÊ Vf¡m¢S z ¢ae¢V hÉfL hÉhq©a mÉ¡e A¡¢LÑVLQ¡l Hl jdÉ HL¢V qµR Cb¡leV/BC ¢VÊfm C 802.3 z Hl j¡dÉj h¡p
Vf¡m¢S h¡Ù¹h¡ue Ll¡ qu z ®V¡Le ¢lw h¡ BC¢VÊfmC 802.3 Hhw Hg¢X¢XBC ®eVJu¡LÑ ¢lw Vfm¢S h¡Ù¹h¡ue Ll z m¢SLÉ¡m h¡p
Hhw ¢lw Vf¡m¢S HC Vf¡m¢Sa ®eVJu¡LÑi¨š² pLm L¢ÇfEV¡l pl¡p¢l HL Afll p¡b ¢lw h¡ j¡m¡ BL«¢aa pwk¤š² b¡L z
¢lw Hl ®L¡e Vf¡m¢S p¢Çj¢mai¡h ¢g¢SLÉ¡m£ ØV¡l Vf¡m¢S NWe Ll z ¢VÊ Vf¡m¢S HL¢V mÉ¡e B¢LÑVLQ¡l k¡ h¡p Vf¡m¢Sl
Ae¤l©fz ah Ha hÉ¢aœ²j qµR ®eVJu¡LÑ HL¡¢dL ®e¡Xpq n¡M¡ ®~al£ Ll¡ k¡u z
®jp Vf¡m¢S z ®jp Vfm¢S Hje HL¢V Vf¡m¢S ®kM¡e fË¢a¢V L¢ÇfEV¡l fË¢a¢Vl p¡b pwk¤š² b¡L z k¢c ®L¡e L¡lZ HL¢V
L¢ÇfEV¡l hå qu k¡u a¡qm I ®eVJu¡LÑl ®L¡e pjpÉ¡ qu e¡ z Ju¡e p¡¢iÑpL k¢c ®L¡e ®eVJu¡LÑ ¢XS¡Ce¡l f¤l¡f¤¢l ¢eiÑlk¡NÉ
Lla Q¡u a¡qm a¡l SeÉ Ešj fR¾c qµR f§eÑ ®jp Vf¡m¢S z H ®L±nm fË¢a¢V ®eVJu¡LÑ e¡X (Network Node) Ju¡ei¨š²
AeÉ¡eÉ pLm ®e¡Xl p¡b pl¡p¢l k¤š² b¡L z gm H dlel VfmhSl fk¡Ñç pwMÉL A¢a¢lš² l¦V f¡Ju¡ k¡u X¡V¡ fÉ¡LV
7
p£¢ja
p£¢ja
VÊ¡¾p¢jnel SeÉ z l¦V pwMÉ¡ ®kqa¥ HM¡e AeL ®h¢n a±q ØVÉ¡¢VL l¡E¢Vw fËV¡Lm Hrœ hÉhq¡l Ll¡ pñh eu z ®eVJu¡LÑ
¢XS¡Ce¡l a¡C h¡dÉ qe X¡u¡e¡¢jL l¡E¢Vw fËV¡Lm hÉhq¡l Lla z ¢ejÀ ®jp Vf¡m¢Sl LuL¢V ¢Qœ fËcš qm¡ x
8
p£¢ja
p£¢ja
CE ¢V ¢f LÉ¡hm (UTP Cable) z UTP AbÑ¡v Unshielded Twisted Pair Cable HC a¡l …m¡ c¤C¢V Ll ®S¡s¡u
®S¡s¡u b¡L HC SeÉ H®L Twisted pair Cable hm¡ qu z ¢ejÀ UTP Cable Hhw ®eVJu¡¢LÑw pÇf¢LÑa ¢h¢ieÀ fÊu¡Se£u
q¡XÑJuÉ¡l pj§®ql ¢Qœ ¢ej fËcš q®m¡ x
Modem (External)
Modem (Internal)
p¤CQ Hl L¡S ¢L ? p¤CQ J q¡®hl L¡kÑfÊZ¡m£ fÊ¡u HLC dlel z ah p¤CQ ¢pNeÉ¡m NÊqe Ll¡l fl a¡ pl¡p¢l fÊ¡fL
L¢ÇfEV¡l h¡ L¢ÇfEV¡lpj§qL fÊlZ Ll b¡L z p¤CQ J q¡hl jdÉ f¡bÑLÉ qm¡ kMe ®L¡e X¡V¡ ¢e¢cÑø ®L¡e fË¡fLl ¢eLV f¡W¡e¡
qu p¤CQ öd§ ®k fË¡fLl L¡RC a¡l ¢e¢cøÑ ®f¡VÑ ¢cu f¡¢Wu ®cu, AeÉ p¤CQ ®f¡VÑ ®bL pwk¡NL«a L¢ÇfEV¡l…m¡ ®p ®rœ ®L¡e
¢LR¤ h§Ta f¡l e¡ z ¢L¿º q¡h Hl ®rœ X¡V¡ kMe f¡W¡e¡ qu aMe ¢e¢cÑø NË¡qL R¡s¡J JC q¡hl p¡b pwk¤š² pLm L¢ÇfEV¡ll
L¡R X¡V¡ Qm k¡u Hhw f¢lno k¡l SeÉ X¡V¡¢V f¡W¡e¡ qu Ab¡Ñv ®k BC¢fl SeÉ a¡l L¡R f¡¢Wu ®cu z
¢Qœ x p¤CQ
9
p£¢ja
p£¢ja
q¡h ¢L ? q¡h qµR ®eVJu¡¢LÑw Hl HL¢V ®L¾cУu hÉhÙÛ¡, LuL¢V L¢ÇfEV¡lL ®eVJu¡LÑ k¤š² Ll¡l HL¢V AeÉaj j¡dÉj z k¡l
p¡q¡kÉ CE¢V¢f LÉ¡hml j¡dÉj ®eVJu¡LÑ L¡eLne ®cu¡ qu z q¡h ®cMa HL¢V h¡L¡Êl ja¡ qu b¡L Hhw Ha ¢h¢iæ LÉ¡hm
L¡eLne ®cu¡l SeÉ ®f¡VÑ b¡L z HC ®f¡VÑ…¢ma p¡d¡lZa RJ-45 L¡eƒl hÉhq©a qu z q¡hL Bjl¡ HL¡¢dL ®f¡ø ¢h¢nø HL¢V
¢l¢pi¡l ¢qphJ ¢Q¿¹¡ Lla f¡¢l z LlZ H¢V HL¢V LÉ¡hm ®bL CmL¢VÊLÉ¡m ¢pNeÉ¡m ®fm ®p¢VL Hj¢fÔg¡C Ll AeÉph Ju¡LÑ
®pLne f¡W¡u z
¢Qœ x q¡h
l¡EV¡l Hl L¡S ¢L ? c¤¢V ¢ieÀ fÊL«¢al ®eVJu¡LÑl f¡lØf¡¢lL pwk¤¢š²l SeÉ l¡EV¡l (Router) hÉhq©a qu z l¡EV¡lL
A¡h¡l ®NVJuJ hm¡ qu z NVJu h¡ l¡EV¡l c¤¢V ¢pøjl jdÉ AhÙÛ¡e Ll Ae¤h¡cLl ja L¡S Ll¡l f¡n¡f¡¢n ®XV¡ ¢gÒV¡¢lw Hl
L¡S Ll z
¢Qœ x l¡EV¡l
NVJu Hl L¡S ¢L ? ®m¡L¡m H¢lu¡ ®eVJu¡LÑl p¡b ®jCeéj h¡ p¤f¡l L¢ÇfEV¡ll ja Afl HL¢V n¢š²n¡m£ L¢ÇfEV¡l
pwk¤š² Lla ®NVJu hÉhq©a qu z NVJul hs °h¢nøÉ qm¡ H¢V ®eVJu¡LÑ hÉhq©a ¢h¢ieÀ dlel ®fÊ¡V¡Lm Ae¤h¡c Hhw hÉ¡MÉ¡
Lla prj z
VÊ¡¾p¢jne ¢j¢Xu¡ z VÊ¡¾p¢jV¡l Hhw ¢l¢pi¡ll jdÉ X¡V¡ VÊ¡¾p¢jnel SeÉ ®L¡e e¡ ®L¡e VÊ¡¾p¢jne ¢j¢Xu¡ h¡ j¡dÉj hÉhq©a
quz VÊ¡¾p¢jne j¡dÉj fËd¡ea c¤C dlel z Hl HL¢V qµR N¡CXX (Guided) AeÉ¢V qµR BeN¡CXX (Unguided) z Eiu
®rœC CmƒÊ¢eL Juil BL¡l VÊ¡¾p¢jV¡l Hhw ¢l¢pi¡ll jdÉ ®k¡N¡k¡N pwN¢Wa qu z N¡CXX j¡dÉjl rœ Juh HL¢V
¢g¢SLÉ¡m fb Ae¤ülZ Ll z ¢g¢SLÉ¡m fb qa f¡l, ®kje- V¥CØVX ®fu¡l, ®L¡-H¢„uÉ¡m LÉ¡hm ¢Lwh¡ g¡Ch¡l Af¢VLpÚ z
BeN¡CXX j¡dÉj CmƒÊjÉ¡Ne¢VL ¢pNeÉ¡m h¡ al‰L N¡CX Ll e¡, öd¤ Hl jdÉ ¢cu al‰ Hl HL fË¡¿¹ qa AeÉ fË¡¿¹ Qm¡Qm
Ll z Hdlel BeN¡CXX j¡dÉj qµR h¡u¤, öeÉÙÛ¡e h¡ pj¤â f¡¢e z
¢Xlƒ ¢mwL hma Hje VÊ¡¾p¢jne f¡bL ®h¡T¡e¡ qu ®kM¡e ¢pNeÉ¡m pl¡p¢l VÊ¡¾p¢jV¡l qa ¢p¢li¡l k¡u Hhw Hcl j¡T ®L¡e
fËL¡l jdÉha£Ñ ¢Xi¡Cp b¡L e¡ z ah ¢pNeÉ¡ml n¢š² h¡s¡e¡l SeÉ Hj¢fÔg¡u¡l h¡ ¢l¢fV¡l hÉhq©a q®a f¡l z ¢Xlƒ ¢mwL në¢V
N¡CXX Hhw BeN¡CXX Eiu fËL¡l ¢j¢Xu¡l ®rœC fËk¡SÉ qa f¡l z HL¢V N¡CXX VÊ¡¾p¢jne j¡dÉjL fu¾V V¥ fu¾V hm¡
qu, k¢c H¢V c¤¢V ¢Xi¡Cp Hl jdÉ pl¡p¢l pwk¡N ÙÛ¡fe Ll z j¡¢ÒVfu¾V N¡CXX Le¢gN¡lnel rœ c¤ul ®h¢n ¢Xi¡Cp HLC
j¡dÉj ®nu¡l Ll b¡L z Bjl¡ ®eVJu¡LÑ hÉhq¡ll ®rœ ¢h¢iæ dlel ¢Xi¡Cp hÉhq¡l L¢l z hÙºa ®k pLm ¢Xi¡Cp Hl j¡dÉj
®eVJu¡LÑl X¡V¡ VÊ¡¾p¢jV h¡ Bc¡e fËc¡e qu ®p pLm ¢Xi¡CpLC VÊ¡¾p¢jne ¢j¢Xu¡ hm¡ k¡u z N¡CXX VÊ¡¾p¢jne ¢j¢Xu¡ pÇfLÑ
¢hÙ¹¡¢la Bm¡Qe¡ Ll¡ qm¡ x
1z N¡CXX (Guided) VÊ¡¾p¢jne ¢j¢Xu¡ z ¢ejÀ N¡CXX VÊ¡¾p¢jne ¢j¢Xu¡ pÇfLÑ ¢hÙ¹¡¢la Bm¡Qe¡ Ll¡ qm¡x
10
p£¢ja
p£¢ja
V¥CØVX ®fuÉ¡l LÉ¡hm (Twisted Pair Cable)z c¡j pÙ¹¡ AbQ AaÉ¿¹ L¡kÑLli¡h hÉ¡fL ¢i¢ša hÉhq²a qµR
Hje HL¢V LÉ¡hm qµR V¥CØVX ®fu¡l LÉ¡hmz V¥CØVX ®fuÉ¡l LÉ¡hm Bh¡l c¤C lLjz kb¡-(1) BhlZq£e V¥CØVX ®fuÉ¡l
h¡ CE¢V¢f (UTP-Unshielded Twisted Pair ) Hhw BhlZk¤š² V¥CeØVX ¢fu¡l h¡ Hp¢V¢f (Shielded Twisted
Pair) z ¢pNeÉ¡m VÊ¡¾p¢jV Ll¡l SeÉ V¥CØVX ®fuÉ¡l LÉ¡hm HL¡¢dL V¥CØVX h¡ ®j¡s¡e¡ ®S¡s¡ Lf¡l a¡l hÉhq¡l Ll¡
quz Lf¡l a¡l ®j¡s¡e¡l SeÉ œ²pVLl (Crosstlak) f¢lj¡e Lj k¡uz L¡lZ H fÜ¢aa a¡l ®bL ¢h¢L¢la
(Radiated) ¢pNeÉ¡m HL AflL ¢e¢ûu Ll ®gmz L¢jE¢eLne LÉ¡hm ¢qph V¥CØVX ®fuÉ¡l LÉ¡hm hÉ¡fLi¡h
hÉhq²a qµRz ®cM¡ ®NR mÉ¡el SeÉ hÉhq²a Lf¡ll LÉ¡hm ®eVJu¡LÑ ¢j¢Xu¡l jdÉ AeÉaj Se¢fËu HL¢V ®XV¡
L¢j¢eELne ¢j¢Xu¡z
(L) CE¢V¢f (UTP) LÉ¡hm z CE¢V¢f LÉ¡hm j¤ma HL¡¢dL ®S¡s¡ V¥CØVX ®fu¡l LÉ¡hml pj¢ØV k¡
Bh¡l fÔ¡¢ØVL BhlZ ®j¡s¡e¡ b¡Lz e¡j ®bL h¥T¡ k¡µR CE¢V¢f LÉ¡hml Efl ®L¡e ®jV¡m ¢ûe ®eCz öd¤ HL¢V
Cep¤mVll jdÉ LÉ¡hm ®fu¡l …m¡ BµR¡¢ca b¡Lz e£Ql ¢Qœ CE¢V¢f LÉ¡hml ej¤e¡ ®cM¡e¡ qm¡ k¡a ®j¡V Q¡l
®S¡s¡ V¥CØVX a¡l luRz CE¢V¢f LÉ¡hml Bh¡l ¢h¢iæ ®NËX h¡ LÉ¡V¡N¢l BRz CE¢V¢f LÉ¡hml LÉ¡V¡N¢l hma h¤T¡u
H¢V ®eVJu¡LÑ phÑ¡µQ La N¢al ®XV¡ VÊ¡¾p¢jne p¡f¡VÑ Lla f¡lz pwrf LÉ¡V¡N¢lL CAT e¡j A¢i¢qa Ll¡ quz
CE¢V¢f LÉ¡hml jdÉ 6 Ru LÉÉV¡N¢ll a¡l h¡S¡l f¡Ju¡ k¡uz kb¡ x Lz CAT 1, CAT 2, CAT 3, CAT 4, CAT
5 Hhw CAT 6 z haÑj¡e Lj¢fEV¡l ®eVJu¡LÑ CAT 5 J CAT 6 LÉ¡hm ®hn£ hÉhq²a quz
(M) Hp¢V¢f (STP) LÉ¡hm z Hp¢V¢f Hhw CE¢V¢f LÉ¡hml jdÉ HLj¡œ f¡bÑLÉ qµR Hp¢V¢f LÉ¡hml h¡Cl
SÉ¡LV h¡ a¡ll jdÉ HL¢V nš² BhlZ b¡Lz H BhlZ¢V p¡d¡lea HÉ¡m¤¢j¢eu¡j h¡ f¢mØV¡l à¡l¡ ®~a¢l k¡ Hp¢V¢f
LÉ¡hmL CmƒÊ¡jÉ¡Ne¢VL C¾V¡lgl¾pl q¡a ®bL lr¡ Llz ah CE¢V¢f LÉ¡hml ®Qu Hp¢V¢f LÉ¡hm ®k ¢pNeÉ¡m
H¢V¢eEupel ¢cL ®bL A¢dL ¢el¡fc plLj ®L¡e NÉ¡l¡¢¾V ®eCz ®L¡e ®L¡e BC¢hHj ®eVJu¡¢LÑw Hl SeÉ f§hÑnaÑ b¡L
Ha ¢j¢Xu¡ ¢qph Hp¢V¢f LÉ¡hm hÉhq¡l Lla qhz H¢V p¡d¡lea ®V¡Le ¢lw Vf¡mS£l ®eVJu¡LÑ hÉhq²a quz e£Ql
¢Qœ Hp¢V¢f LÉ¡hml ej¤e¡ ®cM¡e¡ qm¡ k¡a ®j¡V Q¡l ®S¡s¡ V¥CØVX a¡l luRz
®L¡-H¢„u¡m (Co-axial ) LÉ¡hm z ®L¡-H¢„u¡m LÉ¡hm Hje HL dlel LÉ¡h¢mw ¢pØVj k¡ H¢¾Ve¡ ®bL ¢pNeÉ¡m
Bfe¡l ®V¢m¢ine, ®l¢XJ Hhw Lj¢fEV¡l ¢eu Bpz Cb¡leV ®eVJu¡¢Lw ØVÉ¡ä¡XÑ Q¡m¤ qh¡l fl 1973 p¡m ®bLC ®L¡-
H¢„u¡m LÉ¡hm ®hn cra¡l p¡bC hÉhq²a qu BpRz haÑj¡e H Se¢fËu ®eVJu¡LÑ ¢j¢Xu¡¢V ¢h¢iæ glj ®eVJu¡LÑ
LÉ¡hm ¢qph hÉhq²a qµRz ®L¡-H¢„u¡m LÉ¡hm (Co-axial Cable) ®L¡-H„ (Coax) e¡jJ f¢l¢Qaz ®L¡-H¢„u¡m
LÉ¡hml c¤¢V p¤f¢lh¡q£ h¡ L䡃l (Conductor) Ù¹l HL¢V A¢iæ H¢„p (Axis) ®nu¡l Ll b¡Lz H SeÉ Hl e¡j LlZ
Ll¡ quR ®L¡-H¢„u¡m LÉ¡hmz ®L¡-H„ LÉ¡hml L¾cÐ ¢cu A¢aœ²j Ll HL¢V p¢mX (Solid) Lf¡l a¡lz H a¡lL
¢Ol Ss¡e¡ b¡L fÔ¡¢ØVL ®g¡jl Cep¤mne (Insulation) z Cepp¤mne Ù¹ll Efl b¡L HL¢V ®jV¡m ¢ûe h¡ ¢nô k¡
Lf¡l ®jp h¡ fÔ¡¢ØVL ¢cu ®~a¢lz H ph …m¡l Efl b¡L SÉ¡LV (Jacket) e¡jl Ù¹l¢Vz SÉ¡LV¢V f¤l¡ LÉ¡hml SeÉ
Cep¤mVl ¢qph L¡S Llz
g¡q~h¡l Af¢Y~L (Fiber Optic) LÉ¡hmz Af¢VLÉ¡m g¡Ch¡l qm¡ p¤rÈ L¡yQl Bn à¡l¡ ®~al£ HL fËL¡l LÉ¡hmz
g¡Ch¡l Af¢VL LÉ¡hml phQu hs ®~h¢nø qm¡ H¢V Cm¢ƒÊLÉ¡m ¢pNeÉ¡ml f¢lhaÑ Bm¡L h¡ m¡CV ¢pNeÉ¡m VÊ¡¾p¢jV
Llz HL¢V Af¢VLÉ¡m g¡Ch¡l j¤max 03 ¢V Ef¡c¡e ¢eu N¢Waz kjex (1) g¡Ch¡l (2) LÓÉ¡¢Xw Hhw (3) Cep¤Ém¢Vw
SÉ¡LVz HR¡s¡J LÉ¡hml j¡el Efl ¢i¢š Ll Bl¡ AeL lLj fËVL¢Vi Ef¡c¡e b¡La f¡l z Bm¡L ¢pNeÉ¡m
p’¡mel fËd¡e L¡S¢V Ll g¡Ch¡ll AiÉ¿¹l NÔ¡p h¡ fÔ¡¢øL ®L¡lz ®L¡ll ¢WL h¡Cll Ù¹l¢V qµR L¡Ql ®~al£, k¡ ®L¡l
®bL ¢eNÑa Bm¡Ll¢nÈ fË¢ag¢ma Ll a¡ f¤e¤l¡u ®L¡l ®gla f¡W¡uz H Ù¹l¢V LÓÉ¡¢Xw e¡jJ f¢l¢Qaz fË¢a¢V üa¿» g¡Ch¡l
Bh¡l fÔ¡¢øL ¢cu ®j¡s¡e¡ b¡L z H A¡hlZ¢V nš² h¡ q¡mL¡ ®k ®L¡e lL®jl qa f¡lz Af¢VLÉ¡m g¡Ch¡ll jdÉ ¢cu
®XV¡ Ceé¡lX h¡ m¡CV BL¡l ®fËle Ll¡ quz Af¢VLÉ¡m g¡Ch¡ll jdÉ ¢cu ®k ¢pNeÉ¡m k¡a¡u¡a Ll p ¢pNeÉ¡m
L¢ÇfEV¡l h¤Ta f¡le¡z L¡lZ L¢ÇfEV¡l ¢X¢SV¡m ¢pNeÉ¡m R¡s¡ AeÉ ®L¡e ¢pNeÉ¡m h¤Te¡ a¡C L¢ÇfEV¡ll ®h¡dNjÉ
Ll¡l SeÉ Af¢VLÉ¡m g¡Ch¡ll ¢pNeÉÉmL ¢X¢SV¡m ¢pNeÉ¡m l©f¡¿¹l Ll¡l SeÉ ¢j¢Xu¡ Lei¡V¡l hÉhq¡l Ll¡ quz ¢j¢Xu¡
Lei¡lV¡l c¤i¡¢o ¢qph L¡S Llz fËbL L¢ÇfEV¡ll ¢X¢SV¡m ¢pNeÉ¡mL m¡CV ¢pNeÉ¡m Ll g¡Ch¡l f¡W¡u Bh¡l
g¡Ch¡ll m¡CV ¢pNeÉ¡mL ¢X¢SV¡m Ll L¢ÇfEV¡l ®fËlZ Llz ¢Qœ g¡Ch¡l Af¢VL ®cM¡e¡ qm¡z
2z BeN¡CXX (Unguided) h¡ a¡l¢hq£e/Ju¡lmp VÊ¡¾p¢jne ¢j¢Xu¡ z BeN¡CXX VÊ¡¾p¢jne ¢j¢Xu¡ hma I pjÙ¹
¢j¢Xu¡L h¤T¡e¡ qu k¡l¡ h¡u§, n§eÉÙÛ¡e J pj¤âl f¡¢el jdÉ ¢cu ¢pNeÉ¡m ®fËlZ J NËqe Ll b¡Lz a¡l¢hq£e h¡ Ju¡lmp j¡dÉj
Cm¢ƒÊLÉ¡m h¡ Af¢VLÉ¡m L䡃¡l h¡ a¡l hÉhq¡l Ll e¡ z pÉ¡Vm¡CV ¢i¢šL ®V¢mL¢jE¢eLnel rœ fª¢bh£l h¡u¤jämC ®XV¡
p’¡mel ¢g¢SLÉ¡m fb ¢qph L¡S Ll z kMe ®XV¡ p’¡mel fb fË¢ahåLa¡ b¡L Hhw a¡lk¤š² j¡dÉj ÙÛ¡fe pjpÉ¡l pª¢ø qu
aMe JuÉ¡lmp j¡dÉj Bh¢nÉLi¡h ®hR ¢ea qu z JuÉ¡lmp j¡dÉj Bh¡l ¢ae dlel z ®kje x
Lz l¢XJ Juh
Mz j¡Cœ²¡Juh Hhw
Nz Ceé¡lX
¢Qœ x j¡Cœ²¡Juh
12
p£¢ja
p£¢ja
¢Qœ x Ceé¡lX
Efl Eõ¢Ma VÊ¡¾p¢jne ¢j¢Xu¡ R¡s¡J ®eJu¡LÑl p¡b pÇfªš² Bl¡ ¢LR¤ ¢LR¤ ¢j¢Xu¡l ¢Qœ ¢ejÀ fËcš qm¡ x
13
p£¢ja
p£¢ja
Af¢VLÉ¡m g¡Ch¡l z Af¢VLÉ¡m g¡Ch¡l qm¡ p¤rÈ L¡Ql Bn à¡l¡ ®~al£ HL fËL¡l LÉ¡hmz g¡Ch¡l Af¢VL LÉ¡hml phQu
hs ®~h¢nø qm¡ H¢V Cm¢ƒÊLÉ¡m ¢pNeÉ¡ml f¢lhaÑ Bm¡L h¡ m¡CV ¢pNeÉ¡m VÊ¡¾p¢jV Llz HL¢V Af¢VLÉ¡m g¡Ch¡l j¤max 03 ¢V
Ef¡c¡e ¢eu N¢Waz kjex (1) g¡Ch¡l (2) LÓÉ¡¢Xw Hhw (3) Cep¤Ém¢Vw SÉ¡LVz HR¡s¡J LÉ¡hml j¡el Efl ¢i¢š Ll Bl¡
AeL lLj fËVL¢Vi Ef¡c¡e b¡La f¡l z Bm¡L ¢pNeÉ¡m p’¡mel fËd¡e L¡S¢V Ll g¡Ch¡ll AiÉ¿¹l NÔ¡p h¡ fÔ¡¢øL ®L¡lz
®L¡ll ¢WL h¡Cll Ù¹l¢V qµR L¡Ql ®~al£, k¡ ®L¡l ®bL ¢eNÑa Bm¡Ll¢nÈ fË¢ag¢ma Ll a¡ f¤e¤l¡u ®L¡l ®gla f¡W¡uz H Ù¹l¢V
LÓÉ¡¢Xw e¡jJ f¢l¢Qaz fË¢a¢V pa¿» g¡Ch¡l Bh¡l fÔ¡¢øL ¢cu ®j¡s¡e¡ b¡L z H A¡hlZ¢V nš² h¡ q¡mL¡ ®k ®L¡e lL®jl qa f¡lz
Øfm¡C¢pw j¢ne z Øf¡m¡C¢pw ®j¢ne haÑj¡e HL¢V AeÉ¡¿¹ Se¢fËu Hhw hÉuhým ¢Xi¡CS z k¡q¡l j¡dÉj Af¢VLÉ¡m
LÉ¡hmL ®S¡s¡ m¡N¡e¡ qu z HL¢V Øf¡m¡C¢pw ®j¢ne Hl jdÉ AeL …m¡ CL¥Cfj¾V b¡L k¡q¡ LÉ¡hm Su¾V Hl ®rœ M¤hC
…l¦aÄf§eÑ L¡S Ll z Øf¡m¡C¢pw ®j¢nel p¡b ®kpLm CL¥Cfj¾V b¡L a¡q¡ ¢ejÀl¦f x
14
p£¢ja
p£¢ja
Ju¡l ¢ØVÊf¡l Hl j¡dÉj g¡Ch¡l LÉ¡hm Hl Cep¤mne LV ®L¢mi¡l H h¢pu ®L¡l¢VL p¤rÈi¡h L¡Va qh z
Hi¡h c¤V¡ LÉ¡hm Hl j¡b¡ p¤¾cl Ll ®LV ®j¢ne h¢pu ¢cu Hl Y¡Le¡ m¡¢Nu ¢ca qh z
15
p£¢ja
p£¢ja
X¡Le¡ m¡¢Nu ®cu¡l fl start Button H fËp Llm LÉ¡hm c¤V¡l ØVÉ¡V¡p ®cM¡h Hhw k¢c p¢WLi¡h L¡V¡ qu a¡qm
LÉ¡hm¢V ®S¡s¡ ®mN k¡hz
LÉ¡hm c¤V¡ ®S¡s¡ m¡N¡l fl ®j¢ne Hl status ®p¡ Llhz k¢c pÇf¤eÑ p¢WLi¡h ®S¡s¡ m¡N ®prœ 0% Loss
cM¡hz ah AeL ®rœ 0.1% bL 0.3% fkÑ¿¹ Loss ®cM¡m LÉ¡hm¢V L¡S Llh z Hi¡h Øf¡m¡C¢pw Hl L¡S
pÇfæ Ll¡ k¡u z
16
p£¢ja
p£¢ja
BC¢f HXÊp pÇfLÑ d¡lZ¡ (Concept of IP Address) z BC ¢f Hl f¤eÑ AbÑ qm¡ C¾V¡leV ®fË¡V¡Lm Bl fËV¡Lm
qm¡ l¦mp h¡ BCe k¡l Efl ¢i¢š Ll L¢ÇfEV¡l a¡l X¡V¡ AeÉ L¢ÇfEV¡l ®fËlZ Ll z BC¢f j¤ma X¡V¡NË¡j ¢ed¡ÑlZ J l¡E¢Vw Hl
L¡S Ll b¡L z HC HÉ¡XÊpl j¡dÉj HL¢V L¢ÇfEV¡l BlL¢V L¢ÇfEV¡ll p¡b ®k¡N¡k¡N ÙÛ¡fe Lla f¡l z L¡kÑrœ j¤ma
Bjl¡ c¤C fÜ¢aa BC¢f HÉ¡XÊp hÉhq¡l L¢lz HL¢V qm¡ ØVÉ¡¢VL Hhw AeÉ¢V qm¡ X¡u¡e¡¢jL z kMe ®L¡e p¡i¡Ñl a¡l LÓ¡u¾VL
¢eS ¢eSC BC¢f hl¡Ÿ Lla f¡l aMe ®p¢VL hm¡ qu X¡u¡e¡¢jL BC¢f z Bl kMe HC HÉ¡XÊp fË¢a¢V L¢ÇfEV¡l
hÉhq¡lL¡l£®L V¡Cf Ll h¢pu ¢ea qu aMe hm¡ ØVÉ¡¢VL z ØVÉ¡¢VL BC¢fl ®rœ CES¡l f¢lhaÑe e¡ Llm ®L¡eœ²jC BC¢fl
f¢lhaÑe qh e¡ ¢L¿º X¡u¡e¡¢jLl ®rœ L¢ÇfEV¡l ¢lØV¡VÑ Llm AeL ®rœ BC¢f f¢lhaÑe qu ®ka f¡l z BC¢f HÉ¡XÊp ¢eu
L¡S Lla ®Nm fËbj ®k ¢hou¢V ¢Q¢q²a Ll¡l fËu¡Se qu a¡qm¡ H¢V ®L¡e ®nËe£i¥š² z f¤l¡ BC¢f HÉ¡XÊpL fy¡Q¢V i¡N/LÓ¡p
¢hiš² Ll¡ quR z ®kje x
LÓ¡p H (Class-A) - 0.0.0.0 qa 126.0.0.0 no qh 0.255.255.254
LÓ¡p ¢h (Class-B) - 128.0.0.0 qa 191.0.0.0 no qh 191.255.255.254
LÓ¡p ¢p (Class-C) - 192.0.0.0 qa 223.0.0.0 no qh 223.255.255.254
LÓ¡p ¢X (Class-D) - 224.0.0.0 qa 239.0.0.0 no qh 239.255.255.254
LÓ¡p C (Class-E) - 240.0.0.0 qa 255.0.0.0 no qh 255.255.255.254
k¢cJ öd¤ fËbj ¢ae ®nËe£l AbÑ¡v LÓ¡p H, LÓ¡p ¢h Hhw LÓ¡p ¢p - H ¢ae dlel BC¢f HÉ¡XÊp f¡h¢mL h¡ h¡¢e¢SÉL ®eVJu¡LÑ hÉhq©a
qu z
LÓ¡p H (Class-A)z BC¢f HÉ¡XÊp Q¡l¢V BLVVl jdÉ fËbj BLVV LÓ¡p ¢ed¡ÑlZ Ll b¡L z k¢c fËbj ALVVl phÑ
h¡jl ¢hV Ab¡Ñv ®j¡ØV ¢pN¢e¢gL¾V ¢hV (MSB- Most Significant Bit) öeÉ (0) qu, a¡qm h¤Ta qh H¢V LÓ¡p-H ®nËe£i¨š²,
Hrœ AeÉ¡eÉ ¢hVl AhÙÛ¡ h¡ j¡e k¡C ®q¡L e¡ ®Le, LÓ¡p H BC¢f HÉ¡XÊpl fËbj ALVVl phÑ¢ejÀ j¡e 0 Hhw ph¡ÑµQ j¡e 127
qh z
128 64 32 16 8 4 2 1
LÓ¡p ¢h (Class-B)z k¢c BC¢f HÉ¡XÊpl fËbj BLVVl fËbj c¤¢V ¢hV HjHp¢h (MSB- Most Significant Bit) 1 J
0 qu a¡qm h¤Ta qh ®plV LÓ¡p ¢h dlel BC¢f HÉ¡XÊp z LÓ¡p ¢h BC¢f HÉ¡XÊp fËbj c¤¢V BLVV hÉhq¡l Ll b¡L ®eVJu¡LÑ
Awn Hhw ®no c¤¢V ALVV hÉhq¡l Ll b¡L ®q¡ØV Awnl HÉ¡XÊpl SeÉ z LÓ¡p-¢h BC¢f HÉ¡XÊpl p£j¡ 128.0.0.0 ®bL
191.255.0.0 fkÑ¿¹ z fËbj ALVVl j¡e ¢eZÑu Ll¡ qu Hi¡h -
¢edÑ¡¢la
kje dl¦e, 130.34.27.66 HL¢V LÓ¡p-¢h BC¢fHÉ¡XÊp z Hja¡hÙÛ¡u LÓ¡p-¢h Hl ¢XgÒV p¡heV j¡ú qh 255.255.0.0 z
Hrœ ®eVJu¡LÑ Awnl SeÉ HÉ¡XÊp qh 130.34.0.0 Hhw ®q¡ØV Awnl HÉ¡XÊp qh 0.0.27.66 z LÓ¡p-H Hl ®hm¡u ®kl©f
¢qph Ll¡ quR ®pi¡h ¢qph Llm ®cM¡ k¡h LÓ¡p -¢h'l SeÉ ®eVJu¡LÑ HÉ¡XÊpl pwMÉ¡ qµR 16384 ¢V Hhw fË¢a¢V ®eVJu¡LÑ
®q¡ØV pwMÉ¡ qµR 216-2 Ab¡Ñv 65634 ¢V z
LÓ¡p ¢p (Class-C)z k¢c BC¢f HÉ¡XÊpl fËbj BLVVl fËbj ¢ae¢V ¢hV HjHp¢h (MSB- Most Significant Bit)
kb¡œ²j 1.1 J 0 qu a¡qm h¤Ta qh ®p¢V LÓ¡p ¢p dlel BC¢f HÉ¡XÊp z LÓ¡p ¢p BC¢f HÉ¡XÊp fËbj ¢ae¢V BLVV hÉhq¡l
Ll b¡L ®eVJu¡LÑ Awn Hhw ®no HL¢V ALVV hÉhq¡l Ll b¡L ®q¡ØV Awnl HÉ¡XÊpl SeÉ z LÓ¡p-¢h BC¢f HÉ¡XÊp öl¦ qu
192.0.0.0 ®bL Hhw ®no qu 223.255.255.255 fkÑ¿¹ z fËbj ALVVl phÑ¢ejÀ j¡e 192 J ph¡ÑµQ j¡e 223 z Hl ¢qph¢V
Lla qh ¢ejÀl¦fi¡h-
¢edÑ¡¢la
kje dl¦e, 200.34.27.66 HL¢V LÓ¡p-¢h BC¢fHÉ¡XÊp z Hja¡hÙÛ¡u LÓ¡p-¢h Hl ¢XgÒV p¡heV j¡ú qh 255.255.255.0 z
Hrœ ®eVJu¡LÑ Awnl SeÉ HÉ¡XÊp qh 200.34.0.0 Hhw ®q¡ØV Awnl HÉ¡XÊp qh 0.0.0.66 z ¢qph Llm ®cM¡ k¡u LÓ¡ p-¢p
Hl ®eVJu¡LÑ HÉ¡XÊp qµR 2097125 ¢V Hhw fË¢a¢V ®eVJu¡LÑZ ®rœ ®q¡ØV pwMÉ¡ 2-8-2 Ab¡Ñv 254 ¢V z
BC¢f HÉ¡XÊpl i¡N z BC¢f HÉ¡XÊpl ®j¡V c¤C¢V Awn luR z HL¢V qm¡ ®eVJu¡LÑ Awn Afl¢V qm¡ ®q¡ØV Awn z ¢ejÀ
¢Qœ hs, jdÉj J R¡V ®eVJu¡LÑl SeÉ ®eVJu¡LÑ Hhw ®q¡ØV AwnL pe¡š² Ll¡ qm¡ x
18
p£¢ja
p£¢ja
LÓ¡p ¢X (Class-D)z eVJu¡LÑl ®rœ LÓ¡p-¢X J LÓ¡p-C Hl …l¦aÄ M¤hC Lj z LÓ¡p ¢X Hl ®hm¡u fËbj ALVVl fËbj Q¡l¢V
HjHp¢h'l ®p¢Vw kb¡œ²j 1.1.1 J 0 z LÓ¡p-¢X HÉ¡XÊp öl¦ qu 224.0.0.0 qa Hhw ®no qu 239.255.255.254 H ¢Nu zLÓ¡p-
¢X BC¢f HÉ¡XÊp j¡¢ÒVL¡ØV N˦fl (Multicust Group) SeÉ pwl¢ra z j¡¢ÒVL¡ØV Af¡lne ®L¡e ®q¡ØV h¡ ®eVJu¡LÑ HÉ¡XÊpl
h¡m¡C ®eC z HM¡e öd¤j¡œ HL¢V N˦f Ef¢ÙÛa z Bf¢e kMe ®L¡e j¡¢ÒVL¡ØV N˦fl pcpÉ qhe aMe N˦fl AeÉ¡eÉ pcpÉl¡ ®k ab¡
h¡ ®XV¡ f¡h, Bf¢eJ ýhý I X¡V¡ a¡ abÉl e¡N¡m ®fu k¡he z ¢i¢XJ Leg¡l¢¾pw Hl ja¡ H¢fÔLne H dlel HÉ¡XÊp
hÉhq¡l Ll¡ qu z
LÓ¡p C (Class-E)z LÓ¡p-C BC¢f HÉ¡XÊpl fËbj ALVVl fËbj Q¡l¢V HjHp¢h 1 à¡l¡ f§eÑ b¡L z LÓ¡p-C Hl HÉ¡XÊp öl¦
qu 240.0.0.0 à¡l¡ Hhw ®no qu 255.255.255.254 H ¢Nu z i¢hoÉa hÉhq¡ll SeÉ LÓ¡p-C HÉ¡XÊp pwl¢ra Ll l¡M¡ quR z
19
p£¢ja
p£¢ja
®m¡L¡m H¢lu¡ ®eVJu¡LÑ °al£ z ®m¡L¡m H¢lu¡ ®eVJu¡LÑ °al£ Ll¡l SeÉ L¢ÇfEV¡l ¢LR¤ Le¢gN¡l f¢lhaÑe Lla qu z
A¡jl¡ HMe ®pC ®p¢Vw…m¡ d¡l¡h¡¢qLi¡h S¡ehx
L¢ÇfEV¡l ®ej Hhw Ju¡LÑNʦf f¢lhaÑe Ll¡l ¢euj d¡l¡h¡¢qL i¡h ¢ejÀ ®cJu¡ qm¡ x
L¢ÇfEV¡l ®ej ®mM¡l pju AhnÉC je l¡Ma qh ( z ; : x / - + Space \ ) ¢Qq² cJu¡ k¡h e¡ ah ®R¡V q¡al Hhw hs
q¡al ®mM¡ V¡Cf Ll¡ k¡h z
Ju¡LÑNʦf ®mM¡l pju ph…m¡ ®mM¡ hs q¡al qh z
L¢ÇfEV¡l ®ej Hhw Ju¡LÑNʦf ®mM¡l fl OK – OK – OK Lla qh Hhw phno L¢ÇfEV¡lL ¢lø¡VÑ Lla qh AeÉb¡u
®k EŸnÉ ¢eu L¢ÇfEV¡l ®ej Hhw Ju¡LÑNʦf f¢lhaÑe Ll¡ quR a¡q¡ p¢WL i¡h L¡S Llh e¡z ( ®e¡V x ®eVJu¡LÑ AeÉ¡eÉ
L¢ÇfEV¡l ®ej HLC lLj ®mM¡ k¡h e¡ ¢L¿º Workgroup HLC qm ®L¡e pjpÉ¡ qh e¡ z )
20
p£¢ja
p£¢ja
A¡C ¢f HÉ¡XÊp ®p¢Vw Hl SeÉ (Start > Setting > Control Panel > Network Connection > Open) Abh¡
fÊbj Desktop H My Network Place > Right Click
Properties > Click
LAN or High Speed Internet : Local Area Connection Icon > Right Click
Properties > Click
Step-1 Click
Step -2 Click-1
21
p£¢ja
p£¢ja
pl¡p¢l k¤š² eu Hje c¤lha£Ñ AhÙÛ¡el p¡i¡Ñl h¡ ®eVJu¡LÑl p‰ ®k¡N¡k¡N ÙÛ¡fel SeÉ HMe fkÑ¿¹ pl¡p¢l X¡u¡m Bf fÜ¢aC
phQu ®h¢n hÉhq©a qµR Hhw H¢V HL¢V Se¢fËu fÜ¢aJ hV z X¡u¡m Bf pwk¡N fË¢œ²u¡¢Vl p§Qe¡ qu NË¡qL h¡ LÓ¡u¾V L¢ÇfEV¡l
®bL z Hrœ LÓ¡u¾V L¢ÇfEV¡l ®L¡e X¡u¡m Bf ¢Xi¡Cpl pq¡ua¡ ¢eu b¡L z H X¡u¡m Bf ¢Xi¡Cp¢V qµR HL¢V jXj z
jXj Bh¡l c¤C lLjl z ®kje - HÉ¡e¡mN jXm Hhw ¢X¢SV¡m jXj z ®kpLm jXj Hl p¡b ®V¢mg¡e m¡Cel pwk¡Nl j¡dÉj
X¡V¡ L¢jE¢eLne Ll¡ qu h¡ C¾V¡leV hÉhq¡l Ll¡ qu a¡q¡ p¡d¡lZa HÉ¡e¡mN jXjl BJa¡i¨š² Hhw haÑj¡e pju Bjl¡
®j¡h¡Cm ®g¡e, C¢X¢SC jXj, ¢S¢fBlHp General packet radio service (GPRS) jXj CaÉ¡¢c hÉhq¡®ll j¡dÉj ®k
C¾V¡leV hÉhq¡l L¢l a¡q¡ ¢X¢SV¡m jXjl BJa¡i¥š² z ¢ejÀ LuL¢V jXjl ¢Qœ a¥m dl¡ qm¡ x
22
p£¢ja
p£¢ja
A. Landline Modems
B. Wireless Modems
c. LAN Modems
A. Landline Modems:landline modems are modems which connect to the public switched telephone
network (PSTN). To connect to PSTN, these modems have a jack known as RJ-11, or regular phone
jack. A telephone cable with a RJ-11 plug connects the modem to the nearest phone jack, which also
conforms to the RH-11standard.
Landline modems can be further classified into the followings types
1.Internal modems
2.External modems
3.PCMCIA modems
4. Voice/data/fax modems
B. Wireless Modems: Wireless modems are radio transmitters/receivers installed into mobile
computing devices(i.e devices that are used while you are moving such as mobile phones, laptops etc.)
Using wireless modems, one can connect to a network while being mobile. Unlike landline modems,
wireless modems do not plug into an RJ-11 jack.
C. LAN Modems: LAN modems allow shared remote access to LAN (Local Area
Network)resources. LAN modem comes fully p reconfigured for a single particular network architecture
such as Ethernet or Token RIng and/or a particular network software such as IPX, NetBIOS, NetBEUI
etc. LAN modems are of various types depending upon the number of ports, network architecture(s)
supported, network protocols supported, client platforms supported, memory requirements, security etc.
23
p£¢ja
p£¢ja
24
p£¢ja
p£¢ja
25
p£¢ja
p£¢ja
Important Note
If you get to this poing and the screen will not allow you to choose "Connect using a dial-up modem"
Then hit the Cancel button.
11. In the ISP Name field, type a name to identify your connection (ie. AztecaNet).
12. Click the Next button.
26
p£¢ja
p£¢ja
13. In the Phone number field, type your local access number exactly as it needs to be dialed.
Note: If you require 10-digit dialing in order to access a local number, make sure to include
your area code.
27
p£¢ja
p£¢ja
22. Check the box next to Add a shortcut to this connection to my desktop if you wish to have a
shortcut to the connection on your desktop.
23. Click the Finish button.
http://www.azteca.net/support/windowsxp.html
28
p£¢ja
p£¢ja
1. Click on Start
2. Than click on Computer
5. Once you are in the Network and Sharing Center, click on the Set up a new connection or
network option.
30
p£¢ja
p£¢ja
8. Enter the EarthLink Dial-up (POP) phone number you were given by EarthLink to dial for your
Dial-up connection in the Dial-up phone number field.
For User name, enter in your full EarthLink email address including the @earthlink.net,
mindspring.com, or other @domain-name.com part of your address.
For Password, enter in your full EarthLink email address password.
Check the option for Remember this password if you want the password automatically saved
when you connect. If you do not check this option, you will have to manually enter your
password every time you connect to EarthLink.
For Connection name, name your connection EarthLink Dial Connection or something similar
you will recognize as your EarthLink Dial-up connection.
Click the Connect option to dial your new Dial-up Connection. This will also save this
connection for future use.
(Note: You can check the Allow other people to use this connection option if you have more than one
user account on your computer and you want that person to be able to use this dial connection as well.
There is no harm in leaving this option unchecked.)
9. After clicking Connect, Windows 7 will attempt to connect to the EarthLink network over a
Dial-up connection. You will need to have a Dial-up modem installed in the computer with an available
phone line plugged into the modem port on the computer to connect to EarthLink.
31
p£¢ja
p£¢ja
10. Once connected, you will see a The connection to the Internet is ready to use window. Click
Close. You have now successfully connected to EarthLink via Dial-up and Windows 7 will save this
connection for future use.
11. If you are already connected you will see a button to Disconnect from EarthLink button when
you click on the connection name. Just click the Disconnect button to disconnect from EarthLink.
32
p£¢ja
p£¢ja
http://support.earthlink.net/articles/dialup/create-a-dial-up-networking-connection-on-windows-7.php
33
p£¢ja
p£¢ja
¢fu¡l-V¥-¢fu¡l ®eVJu¡LÑ x ¢fu¡l-V¥-¢fu¡l ®eVJu¡LÑ fËaÉL CES¡l AeÉ CES¡ll p¡b abÉ ®nu¡l Ll z H dlZl ®eVJu¡LÑ Q¡m¤
qu 1984 p¡m ®bL, kMe Hfm L¢ÇfEV¡l a¡cl jÉ¡¢L¾Vn fÔ¡p Eá¡he Llm z j¡Cœ²¡pgV 1992 p¡m a¡cl Eá¡¢ha ECä¡S 3|11
®L ¢fu¡l-V¤-¢fu¡l ®eVJu¡LÑl Efk¡N£ Ll a¥m z ¢fu¡l-V¤-¢fu¡l ®eVJu¡LÑl j¡dÉj CES¡l a¡cl ¢f˾V¡l, ®g¡ô¡l, ¢p¢Xlj XÊ¡Ci, gÓ¢f
¢Xú CaÉ¡¢c AeÉl p¡b ®nu¡l Lla f¡l z
After installing the operating systems on the computers that will primarily participate in the network,
you can "physically" connect the computers and the router.
১। L¢ÇfEV¡l Hhw l¡EV¡l Hl f¡Ju¡l hå Lla qh (k¢c fËu¡Se qu) z Shut down all computers and the router (if
necessary)
২। l¡EV¡l ®pVBf Ll¡l SeÉ HL¢V L¢ÇfEV¡l Ae Lla qh z Turn on one computer you will use to setup
the router
৩। l¡EV¡l Le¢gN¡l Ll¡l fl L¢ÇfEV¡l Hhw l¡EV¡l hå Ll ¢ea qh Hhw ®kM¡e hÉhq¡l Ll¡ qh ®p ÙÛ¡e ¢eu ®pV Ll ¢ea qh
z
After setting up and configuring the router, turn it off and turn off the computer you used to set
it up (this step is optional)
৪। BlS-45 LÉ¡hm ¢cu ph…m¡ L¢ÇfEV¡lL l¡EV¡ll p¡b pwk¡N fËc¡e Lla qh z
Connect each of the other computers to the router using an RJ-45 cable for each connection:
k¢c ph ¢LR¤ hå AhÙÛ¡u b¡L ®prœ fËbj l¡EV¡lL Ae Lla qh Hhw ¢LR¤rZ fl L¢ÇfEV¡l…m¡ Ae Lla qh z k¢c ®eVJu¡LÑ ¢XV¡ƒ
LlR H dlel ®L¡e jÉ¡pS Bp a¡qm i¡m ¢L¿º k¢c e¡ Bp a¡qm qa¡n e¡ qu flha£Ña ®QL Ll ¢ea qhz ( If you had turned
off (some of) the machines, first turn on the router. Then, after a few seconds, turn on the
computers. If you receive some messages indicating that a network was detected, fine. If not,
don't worry, we will check the network later.)
k¢c Ju¡lmp l¡EV¡l ®pVBf Lla qu ®prœ HL¢V L¢ÇfEV¡l l¡EV¡l¢V ®pVBf Ll ¢ea qh z ( If you plan to setup a
wireless network using a wireless router, you will need to use one computer to set it up).
১। fËbjC L¢ÇfEV¡l Hhw l¡EV¡l¢V Ae Lla qh Hhw AeÉ ph…m¡ L¢ÇfEV¡l hå Lla qh z (Start the computer you will
use to setup the router (you should turn the others off):
34
p£¢ja
p£¢ja
২। ®h¢nl i¡¡N l¡EV¡llC pqS ®pV¡f Ll¡l SeÉ p¡b HL¢V ¢p¢X ®cu¡ b¡L z p¡d¡lZa AeL l¡EV¡l Hl ®rœ L¢ÇfEV¡ll p¡b
m¡N¡e¡l fl Hl pgVJu¡l ¢cu ®pV¡f Lla qu z ¢p¢Xl jdÉ CES¡l ®je¤u¡m gm¡ Ll l¡EV¡l ®pV¡fl L¡S pÇfæ Ll¡ ®ua f¡l z ¢e-
jÀ HL¢V l¡EV¡lL L¢ÇfEV¡ll p¡b pwk¡N ¢cu ®cM¡e¡ qm¡ x (Most, if not all, wireless routers come with very
easy to follow instructions. Most of them usually ask you to first insert the CD that
accompanies the router, that is, before physically installing the router. Consult the
documentation (usually just one or a few pieces of paper or a small brochure) and faithfully
follow its CD's instructions. At one time, the instructions would indicate to you when to connect
the computer and the wireless router. To do this, you will use a cable (usually supplied to you)
to connect one end to the computer and another end to the router):
• 3 Because the steps to perform depend on the router (or the manufacturer), we will
let you perform as described by their documentation
• 4 After installing and setting up the wireless router, turn it off and turn the computer
off
5 If you didn't yet, install the wireless network card(s) on the other computer(s).
For any computer that doesn't have a wireless network card but has a wired network card,
connect it to a port of the wireless router using an RJ-45 cable. The computers that have a
network card will not need a physical connection to the wireless router
6 Turn on the router. After a few seconds, turn on the computers one by one.
You may not need to check whether they work at this time or not. We will check this later
35
p£¢ja
p£¢ja
Network Connections
To "virtually" connect the network, Microsoft Windows XP provides the Network Setup Wizard,
which is a series of dialog boxes that can guide you in this process. To start this wizard:
1. On one of the computers that runs either Microsoft Windows XP (HE or Pro), click Start >
(All) Programs > Accessories > Communications > Network Setup Wizard
2. The first page of the wizard will present a message and a bulleted list but nothing to
choose:
Once you have built a computer network, from time to time, you will need to check what computers are
available and/or what files or folders have been shared. To assist you with this, Microsoft Windows XP
provides a window named My Network Places.
36
p£¢ja
p£¢ja
If you don't see that option in the right column of the Start menu, depending of your
configuration, click Start > Settings > Network Connections. Then, under Other Places, click
My Network Places. As an alternative, you can click Start > Control Panel or Start >
Settings > Control Panel. Under Other Places, click My Network Places.
37
p£¢ja
p£¢ja
C¾V¡leV ¢L?
C¾V¡leV në¢Vl pÇf§eÑ AbÑ qµR C¾V¡lL¡eLVX ®eVJu¡LÑ ( Interconnected Network ) z C¾V¡leV Hje HL¢V ¢pøj h¡
hÉhÙÛ¡ k¡ p¡l¡ ¢hnÄhÉ¡f£ ¢hÙ¹ªa z C¾V¡leVl Ef¡c¡e qµR Hl CES¡l, abÉ, V¢mk¡N¡k¡N hÉhÙÛ¡ Hhw L¢ÇfEV¡l z Hph Ef¡c¡el
j¡dÉj HL ÙÛ¡e ®bL AeÉ ÙÛ¡e HL Afll p¡b abÉ A¡c¡e-fÊc¡e Ll b¡L z H¢V A¡pm j§ma HL¢V ®eVJu¡LÑ k¡ öd¤
fÊu¡SeLC ®jV¡ue¡, a¡l p¡b L¢ju A¡e pjul c£OÑa¡ z fÊ¢a¢ce A¡jl¡ C-jCm Ll¢R, ¢h¢ieÀ abÉ pwNÊq Ll¢R C¾V¡leVl
j¡dÉj z ¢eaÉ ea¤e Eá¡hel gm ¢ce ¢ce C¾V¡leVl p¤k¡N-p¤¢hd¡ Hhw abÉl pj¡l¡q ®hs QmR z pª¢ø qµR ea¤e ea¤e në J
¢hou z p¡Ch¡l LÉ¡g, p¡Ch¡l Lue, C¾V¡leV Lj¡pÑ, C¾V¡leV ®g¡e, CmLVÊ¢eL ®jCm, CmLVÊ¢eL h¤L, CmLVÊ¢eL m¡ChÊl£,
CmLVÊ¢eL LÉ¡Çf¡p H dlel LuL¢V ¢hou z
ADSL and cable are types of broadband connection, the term "broadband" only refers to the
performance of an internet connection, not to any particular type of connection.
Dial-up Connections
ADSL Connections
Cable Connections
Dial-up connections: Dial-up connections are one type of internet connection available from ISPs,
they are the slowest and (usually) the most inexpensive.
A dial-up connection allows you to connect to the internet via a local server using a standard 56k
modem. Your PC literally dials (hence the name) a phone number (provided by your ISP) and connects
to the server and therefore the internet
ADSL connections. ADSL (Asymmetric Digital Subscribers Line) connections are becoming more
and more widely available and can provide an excellent internet connection.
The connections work by splitting your phone line into two separate channels, one for data (internet)
and one for voice (phone calls), which means you can talk on the phone and be connected to the internet
at the same time.
You will often see ADSL connection services advertised as having different speed specifications, below
are some common configurations:
256Kbps/128Kbps
512Kbps/128Kbps
1Mbps/256Kbps
2Mbps/512Kbps
8Mbps/1024Kbps
Notice there are two values to each configuration, the first figure states the download speed and the
second figure is the maximum upload speed.
Cable connections
Cable connections are considered one of the best types of internet connection available to the home
user, they offer very fast and reliable connections with a fixed monthly fee.
38
p£¢ja
p£¢ja
Cable companies usually offer different packages to suit different internet subscribers, your choice of
package, as with all internet connections, will depend on how you intend to use the internet.
The different packages will offer different speed specifications and bandwidth limits. Because a cable
connection uses a totally separate medium to transfer data it doesn't affect your ability to make/receive
phone calls.
http://www.computertooslow.com/internet-connections.asp
http://www.helpwithpcs.com/internet/internet-connections.htm
39
p£¢ja
p£¢ja
What is Server
2. Servers often provide essential services across a network, either to private users
inside a large organization or to public users via the Internet. Typical computing servers
are database server, file server, mail server, print server, web server, gaming server,
application server, or some other kind of server.
Types of servers:
h. Game server, a server that video game clients connect to in order to play
online together
40
p£¢ja
p£¢ja
DEMO
41
p£¢ja
p£¢ja
f¡W-2z Installing Win 2008 Server, Adding client to active directory, domain controller, DNS.
1. Insert the appropriate Windows Server 2008 installation media into your DVD drive.
2. Reboot the computer.
3. When prompted for an installation language and other regional options, make your selection
and press Next.
42
p£¢ja
p£¢ja
5. Product activation is now also identical with that found in Windows Vista. Enter your Product
ID in the next window, and if you want to automatically activate Windows the moment the installation
finishes, click Next.
If you do not have the Product ID available right now, you can leave the box empty, and click Next.
You will need to provide the Product ID later, after the server installation is over. Press No.
43
p£¢ja
p£¢ja
6. Because you did not provide the correct ID, the installation process cannot determine what kind
of Windows Server 2008 license you own, and therefore you will be prompted to select your correct
version in the next screen, assuming you are telling the truth and will provide the correct ID to prove
your selection later on.
7. If you did provide the right Product ID, select the Full version and click Next.
44
p£¢ja
p£¢ja
8. Read and accept the license terms by clicking to select the checkbox and pressing Next.
9. In the "Which type of installation do you want?" window, click the only available option–
Custom (Advanced).
45
p£¢ja
p£¢ja
10. In the "Where do you want to install Windows?", if you're installing the server on a regular
IDE hard disk, click to select the first disk, usually Disk 0, and click Next.
Click Drive Options and manually create a partition on the destination hard disk.
46
p£¢ja
p£¢ja
11. The installation now begins, and you can go and have lunch. Copying the setup files from the
DVD to the hard drive only takes about one minute. After 20 minutes, the operating system is installed.
The exact time it takes to install server core depends upon your hardware specifications.
12. Then the server reboots you'll be prompted with the new Windows Server 2008 type of login
screen. Press CTRL+ALT+DEL to log in.
47
p£¢ja
p£¢ja
14. The default Administrator is blank, so just type Administrator and press Enter.
15. You will be prompted to change the user's password. You have no choice but to press Ok.
48
p£¢ja
p£¢ja
16. In the password changing dialog box, leave the default password blank (duh, read step #15…),
and enter a new, complex, at-least-7-characters-long new password twice. A password like "topsecret"
is not valid (it's not complex), but one like "T0pSecreT!" sure is. Make sure you remember it.
17. Someone thought it would be cool to nag you once more, so now you'll be prompted to accept the
fact that the password had been changed. Press Ok.
49
p£¢ja
p£¢ja
18. Finally, the desktop appears and that's it, you're logged on and can begin working. You will be
greeted by an assistant for the initial server configuration, and after performing some initial
configuration tasks, you will be able to start working.
50
p£¢ja
p£¢ja
Exchange 2007 is a 64-bit application and requires 64-bit versions of Windows Server 2003 or
Windows Server 2008. You should select a computer that is capable of running the 64-bit version of
Windows Server 2003 or 2008. For this example we will start with a clean installation of Windows
Server 2008 64-bit version that has not had any roles installed.
After installing Windows Server 2008, we set the clock and the name of the server to be "EX2007". At
this point this server is configured to be a stand-alone computer with default settings.
The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use DHCP. Since we
will be configuring this computer to be a domain controller, you must change the IP address of the
computer to be a static IP address.
To change your IP address, click on "View Network Connections" in the Server Manager
screen.
This will display the list of active network interfaces.
51
p£¢ja
p£¢ja
Highlight "Internet Protocol Version 4 (TCP/IPv4)" and press the Properties button.
52
p£¢ja
p£¢ja
Change the radio button to "Use the following IP address" and enter an IP address you want to
use for this server. In our example, we chose to assign this server the internal IP address
"192.168.1.25". We also have a firewall appliance that operates as a gateway at the IP address
"192.168.1.1".
NOTE: It is important to include this computer in the DNS list. You should list the IP address of this
computer as the first entry in the list of DNS servers. In the "Alternate DNS server" field, enter the IP
address of a DNS server provided by your ISP.
The process of installing Active Directory consists of two steps, the first step is to install Active
Directory and then you will need to configure your Active Directory. Once this is complete your
Windows Server will now be a domain controller.
At the Computer Management Screen press the "Add Roles" link. At the Select Server Roles dialog
check/tick the option "Active Directory Domain Services" and press Next.
53
p£¢ja
p£¢ja
Active Directory Domain Services will present information about the changes it will make to your
server. Review this information and press Next.
54
p£¢ja
p£¢ja
Now the installation will scan your configuration and inform you if there are any pre-requisites that
you have not fulfilled. If the Active Directory Installation presents an errors, correct these at this
time and then repeat the installation. Once the Setup program indicates that you have met all pre-
requisite, then press the Install button to start the installation process.
The setup program will now install Active Directory on your Server.
55
p£¢ja
p£¢ja
When the installation is complete you should see a message indicate "Installation Succeeded", press
Close to return to the Server Management Screen.
At the Server Management screen you should now see that you have 1 role installed. The Active
Directory Domain Services may indicate that it is installed but there are errors. This is because the
software is installed but not configured.
To configure Active Directory click on the line under Roles labeled "Active Directory Domain
Services". The Server Manage will show you a page about the status of the Active Directory Role.
56
p£¢ja
p£¢ja
Click on the link "Run the Active Directory Services Installation Wizard (dcpromo.exe)" and the
Active Directory Domain Services Installation Wizard will appear, press Next.
The Installation Wizard will present information about the version of Active directory, press Next.
57
p£¢ja
p£¢ja
Since we are assuming this Exchange Server will be the first Domain Controller, we chose to create
a new domain in a new forest. Press Next.
58
p£¢ja
p£¢ja
Enter the name of your domain. The domain name you enter here is the domain name that
Exchange will associate with all of your email. If you use a hosting company to host your Internet
Domain, then you may want to enter the name of your Internet domain with ".local". If you host
your own Internet Domain then you would enter your domain name here.
NOTE: Once you enter your domain name it is very hard to change it in the future, so you should take
great care when enter this name.
Press Next once you have decided on the name of your internal domain, that will be your Active
Directory Domain and the domain serviced by Exchange.
Next the Installation Wizard will ask you about compatibility. If you plan to have domain
controllers running various versions of Active Directory then you will want to chose a function level
to include the lowest version of Windows that you are using for domain controllers. Press Next.
59
p£¢ja
p£¢ja
Next you will be asked a similar question which is at the domain level instead of the forest level on
the previous screen. You should follow the same approach and include the function level to include
the lowest version of Windows you plan to use for domain controllers. Press Next.
60
p£¢ja
p£¢ja
The first Domain Controller needs to have a DNS server running locally. The optimal location is to
start out with having the installation wizard install the DNS server locally. Also it will
automatically make this computer a global catalog server. Press Next.
You can specify where you want Active Directory to store its data. If you only have one drive in
your Server then use the defaults. If you have multiple drives, you can select which drive to use.
Press Next.
61
p£¢ja
p£¢ja
Should you need to restore Active Directory in the event of a hard drive failure you will need to
boot your Server into a special mode called "Directory Restoration Mode". Should you need to boot
your computer into this special mode, you will need to use a special password just for this
restoration. You can define this password at this time. NOTE: This password is different than the
administrator account and if you change the administrator password this password will not change.
So you will need to store this password forever in a safe place. Press Next.
Now the Installation Wizard will summarize the configuration that it is about to create. Press Next
to start the process of configuring your new Domain Controller.
62
p£¢ja
p£¢ja
The Installation Wizard will show its progress as it configures your Server. This will take a long
time.
When the installation is complete, you will be shown a final screen. Press Finish.
63
p£¢ja
p£¢ja
After restarting your computer Windows should show you the Server Manager. You should see on
the Server Manager screen that you have Active Directory and DNS Server roles installed. Also the
process of installing Active Directory will add the features "Group Policy Management" and
"Remote Server Administration Tools".
http://www.igetmail.com/how-to-setup-exchange-2007/how-to-setup-exchange-2007.html
64
p£¢ja
p£¢ja
DNS role
Figure D
65
p£¢ja
p£¢ja
Install DNS
DNS console and configuration
After installing DNS, you can find the DNS console from Start | All Programs | Administrative Tools |
DNS. Windows 2008 provides a wizard to help configure DNS.
When configuring your DNS server, you must be familiar with the following concepts:
A forward lookup zone is simply a way to resolve host names to IP addresses. A reverse lookup zone
allows a DNS server to discover the DNS name of the host. Basically, it is the exact opposite of a
forward lookup zone. A reverse lookup zone is not required, but it is easy to configure and will allow
for your Windows Server 2008 Server to have full DNS functionality.
When selecting a DNS zone type, you have the following options: Active Directory (AD) Integrated,
Standard Primary, and Standard Secondary. AD Integrated stores the database information in AD and
allows for secure updates to the database file. This option will appear only if AD is configured. If it is
configured and you select this option, AD will store and replicate your zone files.
A Standard Primary zone stores the database in a text file. This text file can be shared with other DNS
servers that store their information in a text file. Finally, a Standard Secondary zone simply creates a
copy of the existing database from another DNS server. This is primarily used for load balancing.
To open the DNS server configuration tool:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Highlight your computer name and choose Action | Configure a DNS Server… to launch the
Configure DNS Server Wizard.
3. Click Next and choose to configure the following: forward lookup zone, forward and reverse
lookup zone, root hints only (Figure E).
4. Click Next and then click Yes to create a forward lookup zone (Figure F).
5. Select the appropriate radio button to install the desired Zone Type (Figure G).
66
p£¢ja
p£¢ja
6. Click Next and type the name of the zone you are creating.
7. Click Next and then click Yes to create a reverse lookup zone.
8. Repeat Step 5.
9. Choose whether you want an IPv4 or IPv6 Reverse Lookup Zone (Figure H).
10. Click Next and enter the information to identify the reverse lookup zone (Figure I).
11. You can choose to create a new file or use an existing DNS file (Figure J).
12. On the Dynamic Update window, specify how DNS accepts secure, nonsecure, or no dynamic
updates.
13. If you need to apply a DNS forwarder, you can apply it on the Forwarders window. (Figure K).
14. Click Finish (Figure L).
Figure E
Configure
Figure F
67
p£¢ja
p£¢ja
Desired zone
Figure H
68
p£¢ja
p£¢ja
IPv4 or IPv6
Figure I
Figure J
69
p£¢ja
p£¢ja
Forwarders window
Figure L
70
p£¢ja
p£¢ja
Finish
The Start of Authority (SOA) resource record is always first in any standard zone. The Start of
Authority (SOA) tab allows you to make any adjustments necessary. You can change the primary server
that holds the SOA record, and you can change the person responsible for managing the SOA. Finally,
one of the most important features of Windows 2000 is that you can change your DNS server
configuration without deleting your zones and having to re-create the wheel (Figure M).
Figure M
71
p£¢ja
p£¢ja
Change configuration
Name Servers
Name Servers specify all name servers for a particular domain. You set up all primary and secondary
name servers through this record. To create a Name Server, follow these steps:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone.
3. Right-click on the appropriate domain and choose Properties (Figure N).
4. Select the Name Servers tab and click Add.
5. Enter the appropriate FQDN Server name and IP address of the DNS server you want to add.
Figure N
72
p£¢ja
p£¢ja
Name Server
A Host (A) record maps a host name to an IP address. These records help you easily identify another
server in a forward lookup zone. Host records improve query performance in multiple-zone
environments, and you can also create a Pointer (PTR) record at the same time. A PTR record resolves
an IP address to a host name. To create a Host record:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone and click on the folder representing your domain.
3. From the Action menu, select New Host.
4. Enter the Name and IP Address of the host you are creating (Figure O).
5. Select the Create Associated Pointer (PTR) Record check box if you want to create the PTR
record at the same time. Otherwise, you can create it later.
6. Click the Add Host button.
Figure O
73
p£¢ja
p£¢ja
A Pointer (PTR) record creates the appropriate entry in the reverse lookup zone for reverse queries. As
you saw in Figure H, you have the option of creating a PTR record when creating a Host record. If you
did not choose to create your PTR record at that time, you can do it at any point.To create a PTR record:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Choose the reverse lookup zone where you want your PTR record created.
3. From the Action menu, select New Pointer (Figure P).
4. Enter the Host IP Number and Host Name.
5. Click OK.
Figure P
74
p£¢ja
p£¢ja
New Pointer
Canonical Name (CNAME) or Alias records
A Canonical Name (CNAME) or Alias record allows a DNS server to have multiple names for a single
host. For example, an Alias record can have several records that point to a single server in your
environment. This is a common approach if you have both your Web server and your mail server
running on the same machine. To create a DNS Alias:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone and highlight the folder representing your domain.
3. From the Action menu, select New Alias.
4. Enter your Alias Name (Figure Q).
5. Enter the fully qualified domain name (FQDN).
6. Click OK.
Figure Q
Alias Name
Mail Exchange records help you identify mail servers within a zone in your DNS database. With this
feature, you can prioritize which mail servers will receive the highest priority. Creating MX records will
help you keep track of the location of all of your mail servers. To create a Mail Exchange (MX) record:
1. Select DNS from the Administrative Tools folder to open the DNS console.
2. Expand the Forward Lookup Zone and highlight the folder representing your domain.
3. From the Action menu, select New Mail Exchanger.
4. Enter the Host Or Domain (Figure R).
5. Enter the Mail Server and Mail Server Priority.
1. Click OK.
75
p£¢ja
p£¢ja
Figure R
Host or Domain
Figure S
When troubleshooting DNS servers, the nslookup utility will become your best friend. This utility is
easy to use and very versatile. It’s a command-line utility that is included within Windows 2008. With
nslookup, you can perform query testing of your DNS servers. This information is useful in
troubleshooting name resolution problems and debugging other server-related problems. You can access
nslookup (Figure T) right from the DNS console.
Figure T
Nslookup utility
Get IT Tips, news, and reviews delivered directly to your inbox by subscribing to TechRepublic’s free
newsletters.
You May Also Like
DNS tip for Windows Server 2012 systems using iSCSITechRepublic
Windows Server 2012 deduplication: How and where to tweakTechRepublic
5 Signs Stocks Will Collapse in 2013Money News
Donald Trump Tells Americans to Prepare for "Financial Ruins"Money News
77
p£¢ja
p£¢ja
When the Add Roles Wizard comes up, you can click Next on that screen.
Next, select that you want to add the DHCP Server Role, and click Next.
78
p£¢ja
p£¢ja
If you do not have a static IP address assigned on your server, you will get a warning that you
should not install DHCP with a dynamic IP address.
On the other hand, you can optionally configure your DHCP Server during this part of the
installation.
In my case, I chose to take this opportunity to configure some basic IP settings and configure my
first DHCP Scope.
I was shown my network connection binding and asked to verify it, like this:
What the wizard is asking is, “what interface do you want to provide DHCP services on?” I took the
default and clicked Next.
Next, I entered my Parent Domain, Primary DNS Server, and Alternate DNS Server (as you see
below) and clicked Next.
79
p£¢ja
p£¢ja
80
p£¢ja
p£¢ja
Back in the Add Scope screen, I clicked Next to add the new scope (once the DHCP Server is
installed).
I chose to Disable DHCPv6 stateless mode for this server and clicked Next.
Then, I confirmed my DHCP Installation Selections (on the screen below) and clicked Install.
After only a few seconds, the DHCP Server was installed and I saw the window, below:
I clicked Close to close the installer window, and then moved on to how to manage my new DHCP
Server.
82
p£¢ja
p£¢ja
Like the installation, managing Windows Server 2008 DHCP Server is also easy. Back in my
Windows Server 2008 Server Manager, under Roles, I clicked on the new DHCP Server entry.
While I cannot manage the DHCP Server scopes and clients from here, what I can do is to manage
what events, services, and resources are related to the DHCP Server installation. Thus, this is a good
place to go to check the status of the DHCP Server and what events have happened around it.
However, to really configure the DHCP Server and see what clients have obtained IP addresses, I
need to go to the DHCP Server MMC. To do this, I went to Start à Administrative Tools à DHCP
Server, like this:
83
p£¢ja
p£¢ja
When expanded out, the MMC offers a lot of features. Here is what it looks like:
84
p£¢ja
p£¢ja
The DHCP Server MMC offers IPv4 & IPv6 DHCP Server info including all scopes, pools, leases,
reservations, scope options, and server options.
If I go into the address pool and the scope options, I can see that the configuration we made when
we installed the DHCP Server did, indeed, work. The scope IP address range is there, and so are the
DNS Server & default gateway.
So how do we know that this really works if we do not test it? The answer is that we do not. Now,
let’s test to make sure it works.
85
p£¢ja
p£¢ja
To test this, I have a Windows Vista PC Client on the same network segment as the Windows
Server 2008 DHCP server. To be safe, I have no other devices on this network segment.
I did an IPCONFIG /RELEASE then an IPCONFIG /RENEW and verified that I received an IP
address from the new DHCP server, as you can see below:
Figure 13: Vista client received IP address from new DHCP Server
Also, I went to my Windows 2008 Server and verified that the new Vista client was listed as a client
on the DHCP server. This did indeed check out, as you can see below:
Figure 14: Win 2008 DHCP Server has the Vista client listed under Address Leases
With that, I knew that I had a working configuration and we are done!
86
p£¢ja
p£¢ja
HpHj¢V¢f (SMTP- Simple Mail Transfer Protocol) z CmƒÊ¢e„ ®jCm Bc¡e fËc¡el SeÉ HpHj¢V¢f hÉhq©a
qu z HpHj¢V¢f'l LjÑL¡ä CES¡ll ¢eLV AaÉ¡¿¹ f¢lú¡l z cª®nÉl A¿¹l¡m HpHj¢V¢f c¤lha£Ñ L¢ÇfEV¡l pwk¡N ÙÛ¡fe Ll Hhw
AeLV¡ Hg¢V¢f'l g¡Cm VÊ¡¾pg¡l fË¢œ²u¡l ja¡C ®jpS h¡ h¡a¡Ñ VÊ¡¾pg¡l Ll b¡L z HpHj¢V¢f'l LjÑ fË¢œ²u¡ ¢eu CES¡ll
¢Q¿¹¡ LlmJ Qm z Hje¢V ¢pØVj HÉ¡X¢j¢eØVÊVll J H ¢eu M¤h ®h¢n j¡b¡ O¡j¡a qu e¡ z hm¡ h¡ýmÉk, HpHj¢V¢f qµR
C¾V¡leVl AeÉaj hým hÉhq©a HL¢V fËV¡Lm k¡ CES¡ll SeÉ pjpÉ¡j¤š² HL¢V fËV¡Lm ¢qphC ph¡Ñ¢dL f¢l¢Qa z
With our handy guide, you'll have Exchange 2010 installed and running on top of Windows Server 2008
R2 in no time.
This is the second part of a two part series on Microsoft Exchange 2010. In the first article we examined
the changes and enhancements in Exchange 2010. This time we'll walk through the steps required to
install a fully functional Exchange 2010 server on Windows Server 2008 R2.
System Requirements
1. First, you need to make sure that your Active Directory (AD) environment and your Exchange
server meet the minimum requirements:
Prerequisites
In this example we are going to install Exchange 2010 on a Windows Server 2008 R2 operating system.
Before installing Exchange we need to install some Windows components. It's important that you don't
miss anything here because the Exchange 2010 installer does not provide very good feedback if Server
2008 R2 is missing required components.
3. Open PowerShell via the icon on the task bar or Start >> All Programs >> Accessories >> Windows
PowerShell >> Windows PowerShell. Be sure that PowerShell opened with an account that has rights to
install Windows components/features.
4. Run the following command: Import-Module ServerManager
5. For a typical install with the Client Access, Hub Transport, and Mailbox roles run the following
command:Add-WindowsFeature NET-Framework,RSAT-ADDS,Web-Server,Web-Basic-Auth,Web-
87
p£¢ja
p£¢ja
Windows-Auth,Web-Metabase,Web-Net-Ext,Web-Lgcy-Mgmt-Console,WAS-Process-Model,RSAT-
Web-Server,Web-ISAPI-Ext,Web-Digest-Auth,Web-Dyn-Compression,NET-HTTP-Activation,RPC-
Over-HTTP-Proxy -Restart. For a full matrix of the required Windows components with regards to the
Exchange server roles see:http://technet.microsoft.com/en-us/library/bb691354.aspx#WS08R2
6. If your Exchange server will have the Client Access Server role set the Net.Tcp Port Sharing Service
to start automatically
7. Open PowerShell via the icon on the task bar or Start >> All Programs >> Accessories >> Windows
PowerShell >> Windows PowerShell. Be sure that PowerShell opened with an account that has rights to
modify service startup settings.
8. Run the following command: Set-Service NetTcpPortSharing -StartupType Automatic
88
p£¢ja
p£¢ja
Now we're ready to run the Exchange 2010 installer. We'll go through a typical installation that includes
the Client Access, Hub Transport, and Mailbox roles. This is what you will want to install if you are
only going to be running one Exchange server. If you scale out your Exchange architecture with
multiple servers then you will want to familiarize yourself with the Exchange server roles for a proper
deployment.
1. Logon to the desktop of your soon to be Exchange server with a Domain Admin account.
2. Run setup from the Exchange 2010 media.
3. Click on "Step 3: Choose Exchange language option" and choose one of the options (Install only
languages from the DVD will be fine in most cases).
4. Click on "Step 4: Install Microsoft Exchange."
5. Click Next at the Introduction page.
6. Accept the license terms and click Next.
7. Make a selection on the Error Reporting page and click Next.
8. Stick with the default "Typical Exchange Server Installation" and click Next.
9. Choose a name for your Exchange Organization and click Next.
10. Make a selection on the Client Settings page and click Next.
11. If you want your Exchange server to be available externally then choose a domain name such as
mail.myorganization.com, click Next.
12. Make a selection on the Customer Experience Improvement Program page and click Next.
13. If all the prerequisites are there then you can click Install.
14. Grab a cup of coffee or take a walk while the installation process does its thing.
15. When the installation has finished go back to the Exchange installation page click on "Step 5:
Get critical updates for Microsoft Exchange."
16. Install Microsoft Update (if necessary) so that Windows update will check for non-OS updates,
and verify that there are no Exchange updates.
89
p£¢ja
p£¢ja
90
p£¢ja
p£¢ja
91
p£¢ja
p£¢ja
92
p£¢ja
p£¢ja
93
p£¢ja
p£¢ja
94
p£¢ja
p£¢ja
Security settings
Group: Authenticated Users
Permissions:
Traverse folder/execute file List folder / read data Read attributes
Read extended attributes Read permissions
95
p£¢ja
p£¢ja
96
p£¢ja
p£¢ja
97
p£¢ja
p£¢ja
98
p£¢ja
p£¢ja
99
p£¢ja
p£¢ja
100
p£¢ja
p£¢ja
101
p£¢ja
p£¢ja
LÓ¡u¾V p¡i¡Ñl ®eVJu¡LÑl ®rœ ®eVJu¡¢LÑw Hl L¡S¢V p¡d¡lZa ¢f˾V p¡i¡Ñl Hl j¡dÉj pÇfæ Ll¡ qu z ¢f˾V p¡i¡Ñl e¡jL
¢Xi¡Cpl Ljfr c¤V¡ pwk¡N p¤¢hd¡ h¡ ®f¡VÑ b¡L z Hl HL¢V ¢f˾V¡ll SeÉ Hhw Afl¢V pl¡p¢l ®eVJu¡LÑ LÉ¡h¢mw Hl p¡b k¤š²
b¡L z AeL ¢f˾V p¡i¡Ñll Bh¡l c¤ul A¢dL ®f¡VÑ b¡L z A¢a¢lš² ®f¡VÑ…m¡ à¡l¡ HLp‰ 2,3 Hhw 4 ¢V ¢f˾V¡lL k¤š² Ll¡ qu z
kMe ®L¡e CES¡l HL¢V ¢f˾V Sh f¡W¡u aMe H¢V ®eVJu¡¢Lw ®Lhml j¡dÉj Hp g¡Cm p¡i¡Ñl Sj¡ qu z ¢f˾V p¡i¡Ñl pe¡š² Ll
¢fË¢¾Vw Hl SeÉ HL¢V g¡Cm p¡i¡Ñl Afr¡ LlR z aMe ®p g¡Cm p¡i¡Ñl ®bL g¡Cm¢V pwk¤š² ¢f˾V¡l f¡¢Wu ®cu ¢f˾V Ll¡l SeÉ z
¢fË¢¾Vw pj¡ç qm ¢f˾V p¡i¡Ñl g¡Cm p¡i¡Ñl HL¢V jÉ¡pS ®gla f¡¢Wu S¡¢eu ®cu ®k, ¢f˾V fË¢œ²u¡ pÇfæ quR z ¢ejÀ HL¢V ¢f˾V
p¡i¡Ñll ¢Qœ ®cu¡ qm¡ x
LÓ¡u¾V -p¡i¡Ñl ®eVJu¡LÑl f¡n¡f¡¢n ¢fu¡l-V¥-¢fu¡l ®eVJu¡LÑJ ¢f˾V p¡i¡Ñl hÉhq¡l Ll¡ qu z ah LÓ¡u¾V -p¡i¡Ñl ®eVJu¡LÑC ¢f˾V
p¡i¡Ñl ®h¢n hÉhq¡l qu b¡L z ¢f˾V p¡i¡Ñl ¢Xi¡Cpl phQ®u hs p¤¢hd¡ qµR H¢V ®eVJu¡LÑl ®k ®L¡e S¡uN¡a ¢f˾V¡l ÙÛ¡fel
p¤k¡N ®cu z Ha L¢ÇfEV¡ll p¡b ¢f˾V¡l pwk¤š² Ll¡l ¢hou ®L¡e h¡dÉh¡dLa¡ ®eC z ¢fu¡l-V¥-¢fu¡l ®eVJu¡LÑ ¢f˾V¡l ®k ®L¡e
HL¢V L¢ÇfEV¡ll p¡b k¤š² Ll a¡ k¢c ®nu¡l Ll¡ qu, a¡qm ®eVJu¡LÑl AeÉ¡eÉ L¢ÇfEV¡l M¤h pqSC I ¢f˾V¡l ¢f˾V Lj¡ä
f¡W¡a f¡l z HSeÉ Bm¡c ®L¡e ¢Xi¡Cpl fËu¡Se qu e¡ z
102
p£¢ja
p£¢ja
Configure TCP/IP
Configure TCP/IP properties so that DC1 has a static IP address of 192.168.0.1 with the subnet mask
255.255.255.0 and a default gateway of 192.168.0.2.
1. On DC1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Configure networking.
Note : If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the Network Connections window, right-click Local Area Connection, and then click
Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties
4. Click Use the following IP address. Type 192.168.0.1 for the IP address, type 255.255.255.0 for the
subnet mask, type 192.168.0.2 for the default gateway, and type 192.168.0.1 for the preferred DNS
server.
5. Click OK, and then click Close.
103
p£¢ja
p£¢ja
Configure the computer as a domain controller for the Contoso.com domain. This will be the first and
only domain controller in this network.
24. The Active Directory Domain Services Installation Wizard will begin configuring Active
Directory. When the configuration is complete, click Finish, and then click Restart Now.
104
p£¢ja
p£¢ja
Create a user account and configure the account with remote access permission.
105
p£¢ja
p£¢ja
Configuring VPN1
VPN1 is a computer running Windows Server 2008 that provides the following roles:
Active Directory Certificate Services, a certification authority (CA) that issues the computer
certificate required for an SSTP-based VPN connection.
Certification Authority Web Enrollment, a service that enables the issuing of certificates through a
Web browser.
Web Server (IIS), which is installed as a required role service for Certification Authority Web
Enrollment.
Note : Routing and Remote Access does not require IIS because it listens to HTTPS connections
directly over HTTP.SYS. IIS is used in this scenario so that CLIENT1 can obtain a certificate over the
Internet from VPN1.
Network Policy and Access Services, which provides support for VPN connections through Remote
Access Service.
Configure TCP/IP
Configure TCP/IP properties so that VPN1 has a static IP address of 131.107.0.2 for the public
(Internet) connection and 192.168.0.2 for the private (intranet) connection.
106
p£¢ja
p£¢ja
5. Configure the IP address and subnet mask with the following values:
a. On the interface connected to the public (Internet) network, type 131.107.0.2 for the IP address,
and type 255.255.0.0 for the subnet mask.
b. On the interface connected to the private (intranet) network, type 192.168.0.2 for the IP address,
type 255.255.255.0 for the subnet mask, and type 192.168.0.1 for the preferred DNS server.
6. Click OK, and then click Close.
7. To rename the network connections, right-click a network connection, and then click Rename.
8. Configure the network connections with the following names:
a. On the interface connected to the public (Internet) network, type Public.
b. On the interface connected to the private (intranet) network, type Private.
Run the ping command from VPN1 to confirm that network communication between VPN1 and DC1
works.
1. On VPN1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Provide computer name and domain.
Note
If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. In Computer name, clear the text and type VPN1.
4. In Member of, click Domain, type contoso, and then click OK.
5. Enter administrator for the user name and P@ssword for the password.
6. When you see a dialog box welcoming you to the contoso.com domain, click OK.
7. When you see a dialog box telling you to restart the computer, click OK. Click Close, and then click
Restart Now.
107
p£¢ja
p£¢ja
To support SSTP-enabled VPN connections, first install Active Directory Certificate Services and Web
Server (IIS) to enable Web enrollment of a computer certificate.
108
p£¢ja
p£¢ja
8. Click Next.
9. Click Standalone, and then click Next.
10. Click Root CA (recommended), and then click Next.
11. Click Create a new private key, and then click Next.
12. Click Next to accept the default cryptographic settings.
13. In the Configure CA Name dialog box, click Next to accept the default CA name.
109
p£¢ja
p£¢ja
The Server Authentication certificate is used by CLIENT1 to authenticate VPN1. Before installing the
certificate, you must configure Internet Explorer to allow certificate publishing.
110
p£¢ja
p£¢ja
6. Under Identifying Information, in the Name field, type vpn1.contoso.com, and in the
Country/Region field, type US.
Note
The name is the certificate subject name and must be the same as the Internet
address used in the SSTP connection settings configured later in this document.
7. Under Type of Certificate Needed, select Server Authentication Certificate.
8. Under Key Options, select the Mark keys as exportable check box, and then click
Submit.
9. Click Yes in the confirmation dialog box.
111
p£¢ja
p£¢ja
The Server Authentication certificate is now pending. It must be issued before it can be installed.
9. In the middle pane, right-click the pending request, point to All Tasks, and then click
Issue.
10. In Internet Explorer, in the Certificate Pending page, click Home. If this page is not
visible, browse to http://localhost/certsrv.
11. Under Select a task, click View the status of a pending certificate request.
12. Under View the Status of a Pending Certificate Request, select the just-issued
certificate.
13. Click Yes to allow the ActiveX control.
14. Under Certificate Issued, click Install this certificate.
15. Click Yes in the confirmation dialog box.
Move the installed certificate from the default store location.
112
p£¢ja
p£¢ja
113
p£¢ja
p£¢ja
114
p£¢ja
p£¢ja
Important
If the procedures in this document are not followed in the order presented, the presence of an all
purpose certificate (contoso-VPN1-CA) could create issues. Delete the contoso-VPN1-CA
certificate in the Local Computer store to ensure the SSTP listener binds to the server
authentication certificate (vpn1.contoso.com).
Configuring CLIENT1
CLIENT1 is a computer running Windows Vista with SP1 that functions as a remote access VPN client
for the Contoso.com domain.
CLIENT1 configuration consists of the following steps:
Install the operating system.
Configure TCP/IP.
The following sections explain these steps in detail.
116
p£¢ja
p£¢ja
Configure TCP/IP
Configure TCP/IP properties so that CLIENT1 has a static IP address of 131.107.0.3 for the public
(Internet) connection.
Configure TCP/IP properties
1. On CLIENT1, click Start, and then click Control Panel.
2. Click Network and Internet, click Network and Sharing Center, and then click Manage
network connections.
3. Right-click Local Area Connection, and then click Properties. If a dialog box is displayed that
requests permissions to perform this operation, click Continue.
4. In the Local Area Connection Properties dialog box, click Internet Protocol Version 4
(TCP/IPv4), and then click Properties.
5. Click Use the following IP address. In IP address, type 131.107.0.3 for the IP address, and
type 255.255.0.0 for the subnet mask.
6. Click OK, and then click Close.
117
p£¢ja
p£¢ja
Configure the hosts file to have a record for VPN1. This simulates a real-world scenario in which
the corporate VPN server would have a publicly resolvable host name.
Run the ping command from CLIENT1 to confirm that network communication between CLIENT1 and
VPN1 works.
1. On VPN1, click Start, point to Administrative Tools, and then click Windows Firewall
with Advanced Security.
2. In the console tree, click Inbound Rules.
3. In the details pane, scroll down and double-click File and Printer Sharing (Echo Request -
ICMPv4-In) for the Public profile. Verify that this rule is enabled.
118
p£¢ja
p£¢ja
Figure 14. File and Printer Sharing (Echo Request - ICMPv4-In) Properties dialog box.
4. Under General, select the Enabled check box, and then click OK.
5. On CLIENT1, in the command window, type ping vpn1.contoso.com, and then press ENTER.
6. Verify that you can successfully ping VPN1.
For the purpose of this test lab, this connection signifies that the remote user can connect to the
office VPN server over the public Internet.
7. Close the command window.
119
p£¢ja
p£¢ja
Configure TCP/IP
Configure TCP/IP properties so that DC1 has a static IP address of 192.168.0.1 with the subnet mask
255.255.255.0 and a default gateway of 192.168.0.2.
1. On DC1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Configure networking.
Note : If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the Network Connections window, right-click Local Area Connection, and then click
Properties.
3. On the Networking tab, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties
4. Click Use the following IP address. Type 192.168.0.1 for the IP address, type 255.255.255.0 for the
subnet mask, type 192.168.0.2 for the default gateway, and type 192.168.0.1 for the preferred DNS
server.
5. Click OK, and then click Close.
120
p£¢ja
p£¢ja
Configure the computer as a domain controller for the Contoso.com domain. This will be the first and
only domain controller in this network.
24. The Active Directory Domain Services Installation Wizard will begin configuring Active
Directory. When the configuration is complete, click Finish, and then click Restart Now.
121
p£¢ja
p£¢ja
Create a user account and configure the account with remote access permission.
122
p£¢ja
p£¢ja
Configuring VPN1
VPN1 is a computer running Windows Server 2008 that provides the following roles:
Active Directory Certificate Services, a certification authority (CA) that issues the computer
certificate required for an SSTP-based VPN connection.
Certification Authority Web Enrollment, a service that enables the issuing of certificates through a
Web browser.
Web Server (IIS), which is installed as a required role service for Certification Authority Web
Enrollment.
Note : Routing and Remote Access does not require IIS because it listens to HTTPS connections
directly over HTTP.SYS. IIS is used in this scenario so that CLIENT1 can obtain a certificate over the
Internet from VPN1.
Network Policy and Access Services, which provides support for VPN connections through Remote
Access Service.
Configure TCP/IP
Configure TCP/IP properties so that VPN1 has a static IP address of 131.107.0.2 for the public
(Internet) connection and 192.168.0.2 for the private (intranet) connection.
123
p£¢ja
p£¢ja
5. Configure the IP address and subnet mask with the following values:
a. On the interface connected to the public (Internet) network, type 131.107.0.2 for the IP address,
and type 255.255.0.0 for the subnet mask.
b. On the interface connected to the private (intranet) network, type 192.168.0.2 for the IP address,
type 255.255.255.0 for the subnet mask, and type 192.168.0.1 for the preferred DNS server.
6. Click OK, and then click Close.
7. To rename the network connections, right-click a network connection, and then click Rename.
8. Configure the network connections with the following names:
a. On the interface connected to the public (Internet) network, type Public.
b. On the interface connected to the private (intranet) network, type Private.
Run the ping command from VPN1 to confirm that network communication between VPN1 and DC1
works.
1. On VPN1, in the Initial Configuration Tasks window, under Provide Computer Information,
click Provide computer name and domain.
Note
If the Initial Configuration Tasks window is not already open, you can open it by clicking
Start, clicking Run, typing oobe in the text box, and then clicking OK.
2. In the System Properties dialog box, on the Computer Name tab, click Change.
3. In Computer name, clear the text and type VPN1.
4. In Member of, click Domain, type contoso, and then click OK.
5. Enter administrator for the user name and P@ssword for the password.
6. When you see a dialog box welcoming you to the contoso.com domain, click OK.
7. When you see a dialog box telling you to restart the computer, click OK. Click Close, and then click
Restart Now.
124
p£¢ja
p£¢ja
To support SSTP-enabled VPN connections, first install Active Directory Certificate Services and Web
Server (IIS) to enable Web enrollment of a computer certificate.
125
p£¢ja
p£¢ja
8. Click Next.
9. Click Standalone, and then click Next.
10. Click Root CA (recommended), and then click Next.
11. Click Create a new private key, and then click Next.
12. Click Next to accept the default cryptographic settings.
13. In the Configure CA Name dialog box, click Next to accept the default CA name.
126
p£¢ja
p£¢ja
The Server Authentication certificate is used by CLIENT1 to authenticate VPN1. Before installing the
certificate, you must configure Internet Explorer to allow certificate publishing.
127
p£¢ja
p£¢ja
6. Under Identifying Information, in the Name field, type vpn1.contoso.com, and in the
Country/Region field, type US.
Note
The name is the certificate subject name and must be the same as the Internet
address used in the SSTP connection settings configured later in this document.
7. Under Type of Certificate Needed, select Server Authentication Certificate.
8. Under Key Options, select the Mark keys as exportable check box, and then click
Submit.
9. Click Yes in the confirmation dialog box.
128
p£¢ja
p£¢ja
The Server Authentication certificate is now pending. It must be issued before it can be installed.
9. In the middle pane, right-click the pending request, point to All Tasks, and then click
Issue.
10. In Internet Explorer, in the Certificate Pending page, click Home. If this page is not
visible, browse to http://localhost/certsrv.
11. Under Select a task, click View the status of a pending certificate request.
12. Under View the Status of a Pending Certificate Request, select the just-issued
certificate.
13. Click Yes to allow the ActiveX control.
14. Under Certificate Issued, click Install this certificate.
15. Click Yes in the confirmation dialog box.
Move the installed certificate from the default store location.
129
p£¢ja
p£¢ja
130
p£¢ja
p£¢ja
18. In the console tree pane, double-click Certificates (Local Computer), and then double-click
Personal.
19. Click Certificates, and then right-click Certificates, point to All Tasks, and then click Import.
20. In the Welcome page, click Next.
21. In the File to Import page, click Browse.
22. Under Favorite Links, click Desktop, and from the drop-down list, select Personal
Information Exchange for the file type.
131
p£¢ja
p£¢ja
Important
If the procedures in this document are not followed in the order presented, the presence of an all
purpose certificate (contoso-VPN1-CA) could create issues. Delete the contoso-VPN1-CA
certificate in the Local Computer store to ensure the SSTP listener binds to the server
authentication certificate (vpn1.contoso.com).
132
p£¢ja
p£¢ja
Configure VPN1 to be a VPN server providing remote access for Internet-based VPN clients.
13. In the dialog box that describes the need to configure the DHCP Relay Agent, click OK.
14. Close the Routing and Remote Access snap-in.
Configuring CLIENT1
CLIENT1 is a computer running Windows Vista with SP1 that functions as a remote access VPN client
for the Contoso.com domain.
CLIENT1 configuration consists of the following steps:
Install the operating system.
Configure TCP/IP.
The following sections explain these steps in detail.
Configure TCP/IP
Configure TCP/IP properties so that CLIENT1 has a static IP address of 131.107.0.3 for the public
(Internet) connection.
Configure TCP/IP properties
1. On CLIENT1, click Start, and then click Control Panel.
2. Click Network and Internet, click Network and Sharing Center, and then click Manage
network connections.
3. Right-click Local Area Connection, and then click Properties. If a dialog box is displayed that
requests permissions to perform this operation, click Continue.
4. In the Local Area Connection Properties dialog box, click Internet Protocol Version 4
(TCP/IPv4), and then click Properties.
5. Click Use the following IP address. In IP address, type 131.107.0.3 for the IP address, and
type 255.255.0.0 for the subnet mask.
6. Click OK, and then click Close.
134
p£¢ja
p£¢ja
Configure the hosts file to have a record for VPN1. This simulates a real-world scenario in which
the corporate VPN server would have a publicly resolvable host name.
Run the ping command from CLIENT1 to confirm that network communication between CLIENT1 and
VPN1 works.
1. On VPN1, click Start, point to Administrative Tools, and then click Windows Firewall
with Advanced Security.
2. In the console tree, click Inbound Rules.
3. In the details pane, scroll down and double-click File and Printer Sharing (Echo Request -
ICMPv4-In) for the Public profile. Verify that this rule is enabled.
135
p£¢ja
p£¢ja
Figure 14. File and Printer Sharing (Echo Request - ICMPv4-In) Properties dialog box.
4. Under General, select the Enabled check box, and then click OK.
5. On CLIENT1, in the command window, type ping vpn1.contoso.com, and then press ENTER.
6. Verify that you can successfully ping VPN1.
For the purpose of this test lab, this connection signifies that the remote user can connect to the
office VPN server over the public Internet.
7. Close the command window.
136
p£¢ja
p£¢ja
Linux
History of Linux
1. UNIX is one of the most popular operating systems worldwide because of its large support base
and distribution.
2. It was originally developed at AT&T as a multitasking operating system for minicomputers and
mainframes in the 1970’s, but has since grown to become one of the most widely used operating
systems.
3. Linux is a free version of UNIX developed by LINUS TORVALDS at the university of Helsinki
in Finland.
About Linux
Why Linux?
137
p£¢ja
p£¢ja
1. Hardware Devices : The lower most layer is the hardware components (i.e. physical
components like your motherboard, hard disk drive, floppy drive, memory, etc…)
2. Kernel : When your system is booted, the Linux kernel will be loaded into the memory of your
system and after that the kernel will control the entire operating system.
3. Shell : Shell is an interpreter through which a user can interact with kernel. Shell is program or
command. An application program may be a image editor, word processor, music player, Games, and
etc…..
138
p£¢ja
p£¢ja
1. The /dev Directory : The directory contains file system entries which represent device that are
attached to the system.
2. The /etc Directory : The directory is reserved for configuration file that are local to your
machine.
3. The /lib Directory : The directory should contain only those libraries that are needed to
execute the binaries in /bin and /sbin.
4. The /dev Directory : The directory refers to temporarily mounted file systems, such as CD-
ROMs and floppy disks.
5. The /opt Directory : The directory provides an area for usually large, static application software
package to be stored.
6. The /home Directory : The directory have the home directory for the user’s.
7. The /boot Directory : The directory have the kernel and booting files.
8. The /tmp Directory : The directory only temporarily files stores.
9. The /lost + found Directory : The directory used by function to placed the files.
10 Examples : linking files.
11. The /proc Directory : The directory contains special “ file” that either extract information from
or send information to the kernel.
12. The /sbin Directory : The directory is for executables used only by the root user.
13. The /bin Directory : The directory is for executables used only by the users.
14. The /usr Directory : The directory is for files that can be shared across a whole site.
15. The /var Directory : The directory “ … variable data files. This include spool directory and file,
administrative and logging data, and transient and temporary files”.
16. The /root Directory : This is home directory for the administrator.
139
p£¢ja
p£¢ja
Install sys
Linux server software CD in CD/DVD room or ISO File select for VMS.
140
p£¢ja
p£¢ja
141
p£¢ja
p£¢ja
Click Next:
142
p£¢ja
p£¢ja
143
p£¢ja
p£¢ja
144
p£¢ja
p£¢ja
145
p£¢ja
p£¢ja
146
p£¢ja
p£¢ja
Select the Mode of Partition (Create custom layout) and click Next:
147
p£¢ja
p£¢ja
Click next
148
p£¢ja
p£¢ja
Now the installation will begin. It will take a while depends upon your hardware configuration:
At
the end of installation, hit Reboot and you will get the login screen as shown.
after complete server then login as “root
password “root password”
149
p£¢ja
p£¢ja
Linux Desktop
150
p£¢ja
p£¢ja
151
p£¢ja
p£¢ja
152
p£¢ja
p£¢ja
Type static IP netmask,default getway and are the mandetory fields that you need to fill up correctly to
setup a working static network.
4. Save and exit to the terminal.
5. #service network restart
153
p£¢ja
p£¢ja
পাঠঃ ১২। LVM concept and Installation various packages by using local repository.
Package install
1. mkdir /media/rhel6
2. cp -rf /media/RHEL_6.1................/* /media/rhel6
3. cd /media/RHEL_6.1...................../Packages
4. rpm -ivh deltapromo...........................(press tab key)
5. rpm -ivh python-deltapromo................. (press tab key)
6. rpm -ivh createrepo................... (press tab key)
7. touch /etc/yum.repos.d/local.repo (for create new file)
8. vim /etc/yum.repos.d/local.repo (edit this file and change the below)
[local]
name = rhel6
baseurl = file:///media/rhel6
enable = 1
gpgcheck = 0
9. createrepo /media/rhel6/Packages
10. yum clear all
11. yum repolist (to check yum server repolist)
Server Configure: DNS, DHCP, HTTP & FTP DNS Configuration (comd and conf colore)
1. setup
2. service network restart
3. vim /etc/hosts
154
p£¢ja
p£¢ja
DHCP Configuration
Package install
1. yum install –y dhcp* (when you create local repository)
or (without repository comd)
cd /media/RHEL_6.1............./Packages
rpm –ivh dhcp*
rpm -ql dhcp
156
p£¢ja
p£¢ja
3. vi /etc/dhcp/dhcpd.conf
(and change the follwing below)
1. vi /etc/rsyslog.conf
60 local7.* /var/log/boot.log
60 local6.* /var/log/dhcp.log
2. vi /etc/httpd/conf/httpd.conf
(edit this file and change the follwing below)
157
p£¢ja
p£¢ja
1. vi /etc/hosts (go to last line and add this line into hosts file)
192.168.56.1 www.cloud.com
<html>
<title>
THIS IS ICT REFRSHER TRG WEB PAGE
</title>
<head>
Welcome to ICT REFRSHER TRG WEB PAGE
</head>
<body>
</body>
</html>
7. firefox
8. browse 192.168.56.1 or https://www.cloud.com.
Note : open your internet browser and check HTTP server
158
p£¢ja
p£¢ja
159
p£¢ja
p£¢ja
160
p£¢ja
p£¢ja
Adding user
adduser or useradd username
eg: adduser -m tarzan
ex:adduser -s /bin/sh -d /home/users -c "Shahriar Kabir" linuxcolor
Deleting User
userdel -r username r=all file/folder including home
Adding group
groupadd groupname
161
p£¢ja
p£¢ja
Advence Network
162
p£¢ja
p£¢ja
163
p£¢ja
p£¢ja
Facilities
1. DCMS SYSTEM.
2. E LEARNING SYSYEM.
3. PATIENT MANAGEMENT SYSTEM.
4. REPORTS AND RETURNS.
5. DHAKA ARMY PABX DIRECTORY.
6. ARDOC LIBRARY.
ETC
164
p£¢ja
p£¢ja
165
p£¢ja
p£¢ja
166
p£¢ja
p£¢ja
Visit on STC&S
167
p£¢ja
p£¢ja
HÉ¡Lpp fu¾V z HL¢V ®eVJu¡LÑ CØV¡h¢mØV Lla ¢h¢iæ fÜ¢a Ahmðe Lla qu h¡ ¢h¢iæ fËL¡l ®k¡Nk¡N j¡dÉj hÉhq¡l
Lla qu z L¢ÇfEV¡l eVJu¡LÑ Le¢gN¡ll SeÉ ®k pLm ¢Xi¡Cp h¡ VÊ¡¾p¢jne ¢j¢Xu¡l fËu¡Se a¡l jdÉ HÉ¡Lpp fu¾V HL¢V
AeÉaj ¢Xi¡CS z haÑj¡e C¾V¡leV Hl SeÉ LÉ¡hm ®eVJu¡LÑl ¢hLÒf ¢qph LÉ¡hm R¡s¡ Ab¡Ñv Ju¡lmp fÜ¢a Ahmðe Ll
®k¡Nk¡N fËc¡e Ll¡ qµR z HL¢V HÉ¡Lpp fu¾V Le¢gN¡l Lla ®k pLm abÉl fËu¡Se qu a¡q¡ ¢ejÀ fËcš qm¡ x
p¡d¡lZa Ju¡lmp ¢Xi¡Cp h¡ HÉ¡Lpp fu¾V (H¢f) Hl ¢eSü ¢LR¤ Le¢gN¡l Ll¡ b¡L z Bjl¡ ¢Xi¡Cpl p¡b ®k
®je¤uÉ¡m b¡L a¡l jdÉ abÉ…m¡ ®cu¡ b¡L z HC Le¢gN¡l Bjl¡ CµR¡ Llm ¢eScl ja¡ f¢lhaÑe Ll ¢ea f¡lh¡ z
a¡l SeÉ k¡ Lla qh z
H¢f¢VL L¢ÇfEV¡l¢Vl p¡b pwk¡N fËc¡e Lla qh z Ab¡Ñv H¢f'l mÉ¡e ®f¡VÑ qa HL¢V ®ØVV LÉ¡hm ¢cu L¢ÇfEV¡ll
p¡b pwk¡N fËc¡e Lla qh z
C¾V¡leV H„fÔ¡l¡l Q¡m¤ Ll HÉ¡XÊp h¡l ¢Xi¡Cp¢Vl BC¢f V¡Cf Ll ¢L-h¡XÑl H¾V¡l L£ Q®f ¢Xi¡Cp Hl jdÉ
fËhn Ll¡ k¡h Hhw HM¡e ¢Xi¡Cp Hl ¢hÙ¹¡¢la abÉ f¡Ju¡ k¡h z öl¦aC Home Tab H ®kph p¢Vw BR a¡ ®cM¡hz
Bjl¡ ¢Xi¡Cp¢Vl BC¢f f¢lhaÑe Lla Q¡Cm Express Setup H ®ka qh Hhw HM¡e ®bL Host Name J
fËu¡Se£u ®p¢Vw f¢lhaÑe Ll ®eu¡ k¡h z
168
p£¢ja
p£¢ja
¢ejÀl ¢Qœ f¢lhaÑe Ll¡l fl AhÙÛ¡ ®cM¡e¡ qm¡ z ah ¢Xi¡Cpl BC¢f f¢lhaÑel p¡b p¡b ¢eSl L¢ÇfEV¡ll
BC¢fJ f¢lhaÑe Ll ¢ea qh z
HL¢V f¢lf§eÑ ¢Xi¡Cp Le¢gN¡e Ll¡l fl d¡l¡h¡¢qL ¢Qœ ¢ejÀ fËcš qm¡ x
169
p£¢ja
p£¢ja
170
p£¢ja
p£¢ja
171
p£¢ja
p£¢ja
172
p£¢ja
p£¢ja
173
p£¢ja
p£¢ja
174
p£¢ja
p£¢ja
f¡W-4z VOIP- Basic fun and emp of IP Phone and ATA, Installation of Elastix Server.
Voice over IP: Voice over IP (VoIP) is a methodology and group of technologies for the delivery
of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the
Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony,
broadband telephony, and broadband phone service.
rotocols
Voice over IP has been implemented in various ways using both proprietary protocolsand protocols
based on open standards. Examples of the VoIP protocols are:
1. H.323
2. Media Gateway Control Protocol (MGCP)
3. Session Initiation Protocol (SIP)
4. H.248 (also known as Media Gateway Control (Megaco))
5. Real-time Transport Protocol (RTP)
6. Real-time Transport Control Protocol (RTCP)
7. Secure Real-time Transport Protocol (SRTP)
8. Session Description Protocol (SDP)
9. Inter-Asterisk eXchange (IAX)
10. JingleXMPP VoIP extensions
11. Skype protocol
12. Teamspeak
The H.323 protocol was one of the first VoIP protocols that found widespread implementation for
long-distance traffic, as well aslocal area network services. However, since the development of newer,
less complex protocols such as MGCP and SIP, H.323 deployments are increasingly limited to carrying
existing long-haul network traffic. In particular, the Session Initiation Protocol (SIP) has gained
widespread VoIP market penetration.
Why VOIP
1. Cost reduction
2. Toll by-pass
3. WAN cost reduction
4. Operational improvement
5. Common network infrastructure
6. Simplification of routing administration
7. Business tool integration
8. Voice mail, email and fax mail integration
9. Web + call
10. Mobility using IP
175
p£¢ja
p£¢ja
Concept OF VOIP
176
p£¢ja
p£¢ja
177
p£¢ja
p£¢ja
178
p£¢ja
p£¢ja
179
p£¢ja
p£¢ja
1.1 Hardware
First you shall prepare the following items: A PC with an empty HDD and DIGIUM with FXO Card.
1.2 Software
Make sure you have these software: Elastix 2.0.3
Elastix 2.0.3, about 682MB in size, can be downloaded from:
http://downloads.sourceforge.net/project/elastix/Elastix%20PBX%20Appliance%20Software/2.0.3/Elas
tix-2.0.3-i386-bin-15Nov2010.iso
Then burn the downloaded driver into a CD.
The Elastix system is an integrated system which includes the operating system CentOS and other
software like Asterisk, Dahdi, FreePBX. All necessary software can be installed well at one time, not
requiring independent peration for any one of them. Then Asterisk and relative services will be
automatically started up upon installation.
For detailed information about Elastix, please go to the official website of Elastix:
http://www.elastix.org.
Set BIOS to boot from CD-ROM. Put the CD of Elastix system burned already into CD-ROM and start
the PC.
180
p£¢ja
p£¢ja
1. The system will go into the CD guide after the PC being started. Then the following interface will be
shown on the screen. See Figure 1. Press Enter directly to go into the default installation mode.( Figure
1)
2. Next, choose the language for installation. Here select ‘English’ (Figure 2).
181
p£¢ja
p£¢ja
3. Next, choose a keyboard type according to your requirement. Usually we choose ‘us’ (Figure 3).
4. Next is the partitioning operation. You have four options to select. For a brand new HDD, select the
default setting ‘Use free space on selected drivers and create default layout’. For an HDD with some
data already, if you want to discard it, use the option ‘Remove all partitions on selected drivers and
create default layout’; if you want to keep the old data, select the option ‘Create custom layout’ to do
partitioning. What we use here is a new HDD. Select the default setting and click on ‘OK’ (Figure 4).
182
p£¢ja
p£¢ja
5. Next, the following prompt ‘Review and modify partitioning layout?’ pops up. Select ‘No’ here
(Figure 5).
6. Next, the following prompt ‘Would you like to configure the eth0 network interface in your system?’
pops up. Select ‘Yes’ here (Figure 6).
183
p£¢ja
p£¢ja
7. Next, choose to configure IPv4 or IPv6. Here we select ‘Activate on boot’ and ‘Enable IPv4 support’,
and then click ‘OK’ (Figure 7).
8. Next, choose to manually or dynamically configure IP address. Here we select ‘Manual address
configuration’, enter the IP address and the subnet mask below, and then click ‘OK’ (Figure 8).
IP : 192.168.55.1
Prefix : 255.255.255.0
184
p£¢ja
p£¢ja
9. Next, enter the gateway address, the primary DNS address and the secondary DNS address, and then
click ‘OK’ (Figure 9).
10. Next, determine how to get the hostname, assigned automatically via DHCP or entered manually.
Here we select ‘manually’ and enter a hostname such as ‘voip’ on the dotted line (Figure 10).
185
p£¢ja
p£¢ja
11. Next, select a time zone according to the real situation. Here we select ‘Asia/Dhaka’ (Figure 11).
186
p£¢ja
p£¢ja
13. Next, the partitioning and formatting of the HDD begins. After that, the system installation starts.
Upon all files being installed successfully, the PC will be restarted automatically (Figure 13).
Note: You must take out the Elastix CD before the PC restart; or the system will go into the installation
guide interface again.
14. After the PC restart, the system goes into the startup interface (Figure 14).
187
p£¢ja
p£¢ja
15. During the startup process, the following prompt will pop up to ask for a new MySQL root
password. Here we can set any password as we want (Figure 15).
16. Also in the startup process, the following prompt will pop up to ask for a web login password. Here
we can set any password as we want, such as ‘admin’ (Figure 16).
188
p£¢ja
p£¢ja
Step4: When all the above steps are finished, the Elastix operating system has been installed
successfully.
Step 5 : Go to another PC open the internet browser and type the following URL
https://192.168.55.1
189
p£¢ja
p£¢ja
190
p£¢ja
p£¢ja
191
p£¢ja
p£¢ja
Type user name admin and admin password as you given into the setup time.
Click Submit
192
p£¢ja
p£¢ja
193
p£¢ja
p£¢ja
194
p£¢ja
p£¢ja
Click apply configuration changes here .New extension has been created.
195
p£¢ja
p£¢ja
196
p£¢ja
p£¢ja
Click on Apply
Click on OK
197
p£¢ja
p£¢ja
Go tosystem Backup/Restore
198
p£¢ja
p£¢ja
199
p£¢ja
p£¢ja
Restore
Select the backup file (which file you want to restore) and click on Restore
200
p£¢ja
p£¢ja
Trunks
201
p£¢ja
p£¢ja
202
p£¢ja
p£¢ja
203
p£¢ja
p£¢ja
Inbound Routes
204
p£¢ja
p£¢ja
IVR
Click on system recording (from the left menu) for record your voice from IP phone or any other
extensions
205
p£¢ja
p£¢ja
206
p£¢ja
p£¢ja
207
p£¢ja
p£¢ja
208
p£¢ja
p£¢ja
209
p£¢ja
p£¢ja
Overview
What is security?
Why do we need security?
Who is vulnerable?
Common security attacks and countermeasures
– Firewalls & Intrusion Detection Systems
– Denial of Service Attacks
– TCP Attacks
– Packet Sniffing
– Social Problems
What is “Security”
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a
visitor acts suspicious.
Protect vital information while still allowing access to those who need it
– Trade secrets, medical records, etc.
Provide authentication and access control for resources
– Ex: AFS
Guarantee availability of resources
– Ex: 5 9’s (99.999% reliability)
210
p£¢ja
p£¢ja
Who is vulnerable?
Firewalls
Basic problem – many network applications and protocols have security problems that
are fixed over time
– Difficult for users to keep up with changes and keep host secure
– Solution
• Administrators limit access to end hosts by using a firewall
• Firewall is kept up-to-date by administrators
211
p£¢ja
p£¢ja
212
p£¢ja
p£¢ja
Intrusion Detection
Minor Detour…
Dictionary Attack
213
p£¢ja
p£¢ja
Denial of Service
SMURF
– Source IP address of a broadcast ping is forged
– Large number of machines respond back to victim, overloading it
214
p£¢ja
p£¢ja
Internet
Perpetrator Victim
215
p£¢ja
p£¢ja
TCP Attacks
Problem: End hosts may lie about other fields which do not affect delivery
– Source address – host may trick destination into believing that the packet is from
a trusted source
• Especially applications which use IP addresses as a simple authentication
method
• Solution – use better authentication methods
TCP connections have associated state
– Starting sequence numbers, port numbers
Problem – what if an attacker learns these values?
– Port numbers are sometimes well known to begin with (ex. HTTP uses port 80)
– Sequence numbers are sometimes chosen in very predictable ways
If an attacker learns the associated TCP state for the connection, then the connection
can be hijacked!
Attacker can insert malicious data into the TCP stream, and the recipient will believe it
came from the original source
– Ex. Instead of downloading and running new program, you download a virus and
execute it
216
p£¢ja
p£¢ja
Mr. Big Ears lies on the path between Alice and Bob on the network
He can intercept all of their packets
217
p£¢ja
p£¢ja
What if Mr. Big Ears is unable to sniff the packets between Alice and Bob?
– Can just DoS Alice instead of dropping her packets
– Can just send guesses of what the ISN is until it is accepted
How do you know when the ISN is accepted?
– Mitnick: payload is “add self to .rhosts”
– Or, “xterm -display MrBigEars:0”
218
p£¢ja
p£¢ja
219
p£¢ja
p£¢ja
Fun Example 1:
– “Hi, I’m your AT&T rep, I’m stuck on a pole. I need you to punch a bunch of
buttons for me”
Fun Example 2:
Fun Example 3:
– Who saw Office Space?
– In the movie, the three disgruntled employees installed a money-stealing worm
onto the companies systems
– They did this from inside the company, where they had full access to the
companies systems
• What security techniques can we use to prevent this type of access?
– Humans will continue to be tricked into giving out information they shouldn’t
– Educating them may help a little here, but, depending on how bad you want the
information, there are a lot of bad things you can do to get it
So, the best that can be done is to implement a wide variety of solutions and more
closely monitor who has access to what network resources and information
– But, this solution is still not perfect
Conclusions
220
p£¢ja
p£¢ja
http://www.robertgraham.com/pubs/network-intrusion-detection.html
http://online.securityfocus.com/infocus/1527
http://www.snort.org/
http://www.cert.org/
http://www.nmap.org/
http://grc.com/dos/grcdos.htm
http://lcamtuf.coredump.cx/newtcp/
Outline
Introductions
What is it?
Overview
Security/Tunneling
Advantages and Disadvantages
Demonstration
Introductions
Gregg
BSG – Student Developer
Unified Western Grocers – Retail Technology Specialist
Liz
BSG – Business Analyst
ResNet – Network Technician
COB CRC: Tier 2/3 Support Technician
Whitney
BSG – Student Tester/Analyst
Types of VPN
221
p£¢ja
p£¢ja
VPN: Security
Encryption
IPSec
Authentication
User/System and Data
AAA Servers
(Authentication, Authorization, and Accounting)
Firewalls
VPN: Tunneling
Requires 3 protocols
Carrier
Default network protocol
Passenger
Original data
Encapsulation
GRE, IPSec, L2F, PPTP, L2TP
VPN: Encapsulation
222
p£¢ja
p£¢ja
VPN: Advantages
Cost Effective
Greater scalability
Easy to add/remove users
Mobility
Security
VPN: Disadvantages
VPN Demonstration
223
p£¢ja
p£¢ja
224
p£¢ja
p£¢ja
225
p£¢ja
p£¢ja
226
p£¢ja
p£¢ja
227
p£¢ja
p£¢ja
228
p£¢ja
p£¢ja
229
p£¢ja
p£¢ja
230
p£¢ja
p£¢ja
231
p£¢ja
p£¢ja
232
p£¢ja
p£¢ja
233
p£¢ja
p£¢ja
কি উটার হাডিড েক িডেট করেছ না : কি উটার বহারকারীেদর এ ধরেনর সম ায় ায়ই পড়েত হয়৷ িবিভ কারেণ কি উটাের
পাওয়ার দওয়ার পর হাডিড েক কি উটার িডেট করেত পাের না৷
সম ার স া কারণস হ:
১। ভােলাভােব ল ক ন হাডিডে র সােথ কিসংেয়র পাওয়ার সা াই থেক আসা পাওয়ার কড কমেতা সং আেছ িক-না৷
২। হাডিড র সােথ মাদার বােড র আইিডই বাস ক াবল ারা স কভােব সং আেছ িক-না৷
৩। হাড িডে র জা ার স ং ক আেছ িকনা ? এে ে হাডিডে র জা ার ইভােব সট করা যায় এক মা ার স ং অ
ভ স ং৷
৪। হাড িড মাদারেবােডর সােথ াইমাির না সেক াির িহেসেব সং িনি ত হান৷
৩ ও ৪ নং কনিফগােরশরেনর জ যিদ একই স ংেস একািধক IDE Device (CD ROM, HDD) থােক তেব তা পাওয়া নাও
যেত পাের-
যমন দখা গল য এক HDD ও এক CD Rom উভেয়ই Secondary master িহেসেব
কনিফগার করা৷ এে ে Device-এর কােনা এক নাও পাওয়া যেত পাের৷
৫। BIOS-এ IDE অেটা িডেট অপশন িডেজবল থাকেল তা ৪ IDE িডভাইেসর জ এনাবল করেত হেব ন বা া য়ািল
HDD ক িডেট কিরেয় িদেত হেব৷
‘অপাের ং িসে ম নট ফাউ , NTLDR িমিসং‘ : সাধারণ উইে াজ এ িপ, উইে াজ ২০০০ িকংবা এন উইে াজ স েহ এ সম া
হেয় থােক৷ এ সম া একবার হেয় গেল ন ন কের উইে াজ লাড দয়া ছাড়া উপায় নই৷ বরং হওয়ার আেগই এক Boot
Floppy তির কের তােত িসে ম াইভ হেত (েয াইেভ উইে াজ লাড থােক) Folder option-এ িগেয় Show all file
option Enable এবং Hide protected file চক ব হেত Check উ েয় boot.ini; ntdetect.com;
ntldr ফাইল িতন কিপ কের boot floppy ত রেখ িদন৷ পরবত েত সম া হেল boot floopy িদেয় মিশন ট কের
িসে ম াইেভ ফাইল িতন আবার কিপ কের রা ন৷ সাধারণত HDD ত Bad Sector থাকেল িকংবা সংেযাগ ব া পিরবতন
করেল িকংবা ভাইরাস জিনত কারেণ এ সম া হেত পাের৷
সফ মােড কি উটার চা হে : উইে াজ অপাের ং িসে ম াভািবকভােব চা হেত না পারেল অেনক সময় সফ মােড চা হয়৷
সফ মাড হেলা উইে ােজর িবেশষ এক অব া যখন এ এেকবাের েয়াজনীয় ফাইল এবং াইভারস হ িনেয় লাড হয়। বলা যেত পাের
‘িবপদকালীন‘ অব া যখন তম রসদ িদেয় ােণ বেচ থাকাটাই ণ৷ সফ মােড উইে াজ চা হেল াথিমক ভােব ির াট কের
দখা যেত পাের নরায় াভািবকভােব তা চা হয় িকনা৷ বার বার কের থ হেল ঝেত হেব সম া তর৷ উইে ােজর কােনা
ণ ফাইেলর িত বা হাডওয়ােরর সম ার কারেণ তা হেত পাের৷ কােনা ন ন হাডওয় ার স ংস পিরবতেনর ফেল যিদ উইে াজ
বার বার সফ মােড চেল যায় তেব ববত স ংস িরভাস কের ফলাই য়। সফ মাডেক এজ ডায়াগিনি ক মাডও বলা হয়৷
উইে াজ ২০০০/এ িপ/২০০৩ চা হওয়ার সময় F8 চাপেল য ম আেস সখান থেক সফ মাড চা করা যেত পের৷ তেব আেগই বলা
হেয়েছ; এ ডায়াগিনি ক মাড৷ এই মােড বাড়িত কােনা িক ই যমন- সাউ , ি ার, হাই কালার িডসে ইত ািদ িক ই কাজ করেব না৷
234
p£¢ja
p£¢ja
ািফ কাড ু কালার দখাে না : ািফ কােডর কালার স ং অপশন আপিন ড টেপ রাইট মাউস ি ক কের াপা জ-এর
স ং ােব Color setting ও Screen area হেত িনধারণ করেত পােরন৷ িক যিদ এখােন True Color অপশন না
আেস তাহেল ঝেত হেব য আপনার ািফ কােডর াইভার কমেতা লাড হয়িন অথবা আপনার কি উটার নরমাল েড চলেছ না৷
যিদ ািফ কাড কমেতা ইন ল না হয় তেব Setting Tab-এর Advance Button-এ ি ক ক ন৷ এবার Adapter
Tab হেত Change বাটেন ি ক কের নরায় ািফ এর াইভার িচিনেয় িদন- এে ে ািফ কােডর াইভােরর িসিড
েয়াজন হেত পাের৷
কি উটাের পাওয়ার দয়া মা তা িক Indicating Beep িদেয় থােক যা ারা বাঝা যায় কি উটােরর অব া। িনেচ এ েলা
উে খ করা হেলা। Beep সং া-১ : কিসংেয় অভ রীন সম PCI, ISA ( পিরেফরাল), কী- বাড, মাউস, যাম ও েসসর মাদার
বােডর সিহত স কভােব সং আেছ।
কি উটার চা হেত কােনা সম া হেল তা হেলা HDD, Floppy, CD ROM Drive এবং মিনটেরর সংেযাগ সম া হেত
পাের৷ স েলা খয়াল ক ন৷
১। RAM এ
২। অপাের ং িসে েম
৩. ভাইরাসজিনত সম া এে ে ভাইরাস চক কের ন ন কের OS লাড ক ন৷ তােতও সমাধান না হেল রম চ ক ন৷ তেব মােঝ
মােঝ কােনা সফটওয় ার সােপাট না করেল তার মা েম কি উটার অেটােম ক ািল ির ট হয়৷ সে ে সফটওয় ার আন ল কের িদন৷
িক িদন পরপর িপিস া হেয় যায়ঃ হ যা, িপিস া হবার পছেন সবেচেয় বড় কারণ স কভােব বহার না করা৷ িপিস‘র গিত এর
হাডওয় ার কনিফগােরশেনর ওপর যমন িনভর কের, তমিন এর সফটওয় ার কনিফগােরশনও মনেটে ও ভািবত কের এর গিতেক৷
িপিস‘র পারফরেম অপাের ং িসে েমর ওপেরও িনভরশীল৷ সাধারণত দখা যায়, ন ন উইে াজ ই টল করার পের িপিস‘র গিত সেবা
থােক৷ এরপর ধীের ধীের গিত অেপ া ত া হেয় যায়৷ এর কারণ েয়াজেনর বিশ সফটওয় ার ই টল করা৷ েয়াজন না হেল বিশ
সফটওয় ার ই টল কের মেমািরর ওপর চাপ বাড়ােনা িনষ েয়াজন৷ অেনক সফটওয় ার আেছ য েলা সরাসির সামনাসামিন না চলেলও
নপে িবিভ সািভস চা কের রােখ৷ এ সে িবিভ ডাটা বইজ সাভার, এি ভাইরাস া াম ইত ািদর কথা বলা যেত পাের৷ এ েলা
িপিস‘র গিতেক অেনকাংেশ ধীর কের দয়৷
াশ হাডিড থেক ডাটা ন ার : সাধারণ হাডিড াশ করেল ডাটা উ ার স ব হয় না৷ তার উপর হাডিডে না েঝ কােনা
অপােরশন চালােল তা আরও িতর কারণ হেত পাের৷ এজ কােনা েফশনােলর সাহা নয়াই ভােলা৷ তারপরও যিদ িক উ ার করা যায়
তােত ম িক? তেব খয়াল রাখেবন াস হওয়া হাডিড েলও ফরেমট/পা শন এর চ া করেবন না৷ যিদ ডাটা উ ার করেত চান৷ ‘ভােব
হাডিড াস করেত পাের এক িসিল ার াস, অ সািকট াশ৷ যিদ িসিল ার াস কের তেব ঝেত হেব এর মা ার ট রকড এ
কােনা সম া আেছ তা ক করেত হেব৷ মা ার ট রকড িনেয় িফচােরর পরবত অংেশ আেলাচনা রেয়েছ৷ িক সািকট াস করেল
সমমােনর অ ন হাডিড থেক একই িসিরয়াল সািকট ঁেজ বর কের তা িরে েসর মা েম হাডিডে র সািকট াস িরেপয়ার স ব৷ িক
সফটওয় ার যমন Easy recovery pro একােজ সাহা করেত পাের৷
235
p£¢ja
p£¢ja
সাউ িনেয় সম া : থেম িডভাইস ােনজার থেক িনি তভােব সাউ কােডর জ কােনা াইভার লাড করা আেছ িক-না ?
যিদ স ক াইভার লাড করা থােক তেব সাউ আসার কথা৷ এ ে Control panel-এর Sound & Multimedia
option হেত audio- ত িগেয় দ ন Volume mute করা িক-না৷ থাকেল তা উ েয় িদন৷ এেতও যিদ সাউ না আেস তেব
াইভার ভাসন স ক নয়৷ িকংবা সাউ কাড ন ৷ এে ে স ক াইভার লাড ক ন িকংবা সাউ কাড পিরবতন ক ন৷ িক আপিন যিদ
িনি ত হন য, াইভার ভাসন এবং সাউ কাড কই আেছ সে ে মাদােবােড িভ েট সাউ কাড সংেযাগ কের দখেত পােরন৷
এরপর দ ন সাউ কােডর স ক পােট ি কার লাগােনা আেছ িক-না৷ আজকাল বিশরভাগ মাদারেবােডই সাউ িব ইন থােক৷ অেনেক
ভােলা
পারফরেমে র জ িপিসআই েট উ ত সাউ কাড লািগেয় নন৷ এেত ল রাখেত হেব মাদারেবাড কান বহােরর অপশন িনবাচন করা
হেয়েছ৷ উইে াজ ২০০৩ সাভাের বাই িডফ সাউ অফ থােক৷ েতই তা চা কের নয়া যেত পাের৷ এজ কে াল ােনল থেক সাউ
অপশন িসেল ক ন৷
হাডওয় ার কনি সম া : এই সম া হেল উইে ােজর েতই হয়৷ সাধারণত একািধক হাডওয় ার একই আইআরিকউ (IRQ) বা
িরেসাস বহার করেল এ ধরেনর সম া হেত পাের৷ তেব একই আইিকউ বহার করেলই এমন সম া অিনবায নয়৷ সাধারণ কােনা
িডভাইেসর সম ার কারেণ স অ িডভাইসেক িক টা ভািবত করায় এই সম া দখা দয়৷ িকংবা কােনা হাডওয় ােরর াইভার
সফটওয় ার েরা ির আনইন ল না কের সই হাডওয় ার অপসারণ কের সই েট ন ন হাডওয় ার াপন৷ িকংবা িভ েট ািপত
হাডওয় ােরর াইভার ইন েলর সময় তােদরেক একই ট লােকট কের দয়ার জ অথবা ি ার সংেযাগ একেপােট আর ি ােরর
াইভার অ পােট ই টল করেল হাডওয় ার কনি হেত পাের৷ এজ হাডওয় ার সংেযাগ ব া খয়াল কের সই অ যায়ী াইভার
লাড করা উিচত৷ অব বতমােন Plug & Play হাডওয় ার েলােত এই সম া িবরল৷
236
p£¢ja
p£¢ja
f¡W-2z Identification of common network problems, Network security and trouble shooting.
eVJu¡LÑ hÉhq¡ll ®rœ e¡e¡¢hd pjpÉ¡ ®cM¡ ¢ca f¡l z pLm pjpÉ¡ HLC fËL«¢al e¡J qa f¡l z ah hÉhq¡¢lL ®rœ ®kpLm
pjpÉ¡pj¤q p¡d¡lZa ®cM¡ k¡u ®ppLm pjpÉ¡ J a¡l pj¡d¡e pÇfLÑ ¢LR¤ Bm¡Qe¡ ¢ejÀ fËcš qm¡ x
mÉ¡e L¡XÑ BR ¢L¿º LÉ¡hm Ce Llm HmC¢X Sme¡ z Hrœ fËbjC ®cMa qh mÉ¡eL¡XÑ¢Vl XÊ¡Ci¡l pgVJu¡l ®pVBf BR
¢Le¡ z k¢c a¡J ¢WL ®cM¡ k¡u ®prœ p¤CQ ®f¡VÑ Abh¡ mÉ¡e ®f¡VÑ m¤S L¡eLne b¡La f¡l, HLV¥ i¡mi¡h Q¡f ¢cu m¡¢Nu
®cM¡ ®ka f¡l z k¢c a¡aJ ¢WL e¡ qu a¡qm h¤Ta qh LÉ¡hm Hl p¡b L¡eƒl ¢WLja¡ m¡N¡e¡ e¡C z k¢c a¡aJ ¢WL e¡ qu
a¡qm h¤Ta qh LÉ¡hm¢Vl j¡TM¡e ®L¡b¡J ®hËL BR z ®prœ LÉ¡hm¢V Abh¡ mÉ¡eL¡XÑ¢V f¢lhaÑe Ll¡ fËu¡Se qh L¡lZ LÉ¡hm
J mÉ¡e L¡XÑ ®kL¡¢Va h¡ EiuC pjpÉ¡ b¡La f¡l z
Cookies j¤R ®gm¤e z C¾V¡leV ïje/l¡E¢Sw Hl pju AeL Juhp¡CVC Bfe¡l AS¡¿¹ Bfe¡l q¡XÑ¢Xú Hje
¢LR¤ ®R¡V ®R¡V g¡Cm ®lM k¡u k¡ Bfe¡l Password ïjel pju J a¡¢lM pwlrZ Ll z Hl j¡dÉj Bfe¡l C¾V¡leV hË¡E¢Sw
dle pÇfLÑ h¡T¡ k¡u Hhw Bfe¡l L¢ÇfEV¡ll N¢aL L¢ju ®cu z ®prœ H…m¡L j¤R ®gm¡C Ešj z H…m¡ j¤R ®gm¡l SeÉ
Windows ®g¡ô¡ll jdÉ Cookies Hhw Internet Temporary file e¡jL k c¤¢V ®g¡ô¡l luR a¡l jdÉ ®bL pLm
g¡Cm j¤R ®gm¤e Abh¡ Internet Explorer Q¡m¤ Ll Hl Tooks H ¢LÓL Ll Internet Options H ¢LÓL Lla qh z HM¡e
®bL General VÉ¡h qa Delete Afne ¢LÓL LlmC Bfe¡l g¡Cm…m¡ j¤Rhe ¢Le¡ a¡ ¢e¢ÕQa Llh z Cookie f¢lØL¡ll
SeÉ ¢LR¤ Software J f¡Ju¡ k¡u z ®kje- Cookie Crusher z
Auto Complete Afne Disable Ll ¢ce z ¢h¢iæ glj User name/pasword ®mM¡l SeÉ Auto
Complete Afne¢V ®hn EfL¡l£ z ¢L¿º¤ Hl gm Bfe¡l L¢ÇfEV¡ll AeÉ¡eÉ hÉhq¡lL¡l£ Bfe¡l user name Hhw
Password pÇfLÑ Ae¤j¡e Lla f¡l z HC option ¢V active b¡Lm ¢LR¤ Juhp¡CV Hhw p¡QÑ C¢”e ¢h¢iæ ®XV¡ H¢¾VÊ
¢gô Bf¢e ®kph ®XV¡ H¢¾VÊ LlRe a¡ pwl¢ra ®bL k¡uz gm Bfe¡l flC ®k HC hË¡ES¡ll j¡dÉj Iph Juhp¡CV h¡ p¡QÑ
C¢”e fËhn Ll, ®p Bfe¡l ®cJu¡ abÉpj§q ®cMa f¡lz ¢eÕQC Bfe¡l ®N¡fe£u abÉ¡h¢ml SeÉ HV¡ ýj¢Lül¦f z HC Auto
complete option ¢V hå Ll ®cJu¡l SeÉ tools>Internet option>Content VÉ¡h ¢LÓL Ll¦e z Hlfl f¡pÑ¡e¡m
Cegljne ®pLne AV¡ Lj¢fÔV ®h¡a¡j ¢LÓL Ll¦e z AV¡ Lj¢fÔV p¢Vwp e¡j HLV¡ ECä¡ Jfe qh z HM¡e gljp Hhw
usernames & Paswords on form option c¤¢V Disable Ll ¢ce z
History j¤R ¢ce z C¾V¡leV H„fÔ¡l¡l History ®g¡ô¡l Bfe¡l hË¡ESL«a pLm Juhp¡CVl abÉ pwl¢ra b¡L z
Hl gm History ®a ¢LÓL Ll Bf¢e f§hÑ ïjZL«a Juhp¡CVl a¡¢mL¡ J ¢WL¡e¡ ®fa f¡le z H Afne¢V HL¢cL ®bL
Bfe¡l SeÉ p¤¢hd¡SeL qmJ Hl j¡dÉjC Bfe¡l A¢gpl hp, pqLj£Ñ, hå¥h¡åh AbÑ¡v AeÉ k¡l¡ Bfe¡l L¢ÇfEV¡l¢V hÉhq¡l Ll
a¡l¡ ph¡C Bfe¡l ïjZ pÇfLÑ abÉ ®fa f¡l z Ha Bfe¡l fË¡Ci¢p ¢LR¤V¡ qmJ eø qu a¡C e¡ ? HC Aa£a C¢aq¡p j¤R
®gm¡l SeÉ ToolsInteernet. OptionGeneral tab H Click Ll¦e z HM¡e History pLne ®bL Clear
History h¡Ve ¢LÓL Ll¦e z Hh¡l Days to keep pages in History Hl X¡e f¡n 01 Ll ¢ce z Bh¡l Bf¢e k¢c pjÙ¹
History ®g¡ô¡l f¢lØL¡l e¡ Ll ®Lhm HL¢V ®fSl e¡j j¤Ra Q¡e a¡J pñh z HSeÉ History ®h¡a¡j ¢LÓL Ll¦e z
History e¡j HLV¡ Windows h¡j f¡n Jfe qh z HMe ®k g¡Cm¢V/®fS¢V Bf¢e j¤R ®gma Q¡e z a¡l Jfl Right
Click Ll¦e z pop up windows bL delete Ll ¢ce z
Filtering Content z ¢LR¤ ¢LR¤ Juhp¡CV BR k¡ ¢nöcl SeÉ Efk¡N£ eu z I pLm Juhp¡CV ïje ®bL ¢nöclL
¢hla l¡M¡l SeÉ p¡d¡lZa Bm¡c¡ pgJuÉ¡l hÉhq¡l Ll¡ qu z ¢L¿º¤ C¾V¡leV H„fÔ¡l¡l Hl ¢eSü ¢LR¤ Built in Filtering
Tools BR k¡l j¡dÉjJ C¾V¡leV ïje HLV¡ ¢e¢cÑø j¡œ¡l ¢eu¿»e Ll¡ k¡u z HSeÉ Tolls>Internet>Option>Content
tab H ¢LÓL Lla qhz HM¡e Content Advisor ®pLne Enable h¡a¡j ¢LÓL Ll¦e z Content Advisor window
Jfe qh z HM¡e Language, Nudity, Sex, Violence e¡j Q¡l¢V LÉ¡V¡N¢l f¡he z HLL¢V LÉ¡V¡N¢l ¢pmƒ Ll ¢eQ
Slider Hl j¡dÉj ®mim ¢edÑ¡le Ll ¢ce z ¢eQ Description h„ fËaÉL ®mim L£ L£ allow Ll a¡l heÑe¡ ®cJu¡ BRz
Hh¡l JL Ll ®hl qu Bp¤e z
Spam ®WL¡a HLV¡ ®L±nm z ®L¡e¡ Juhp¡CV ®L¡e¡ ®l¢SøÊne glj f¤le Ll¡l pju Abh¡ AeÉ ®L¡e¡ L¡le ®L¡e¡
f¡h¢mL fÉ¡mp H AeL pjuC Bfe¡l Email Address ®cJu¡l fËu¡Se qa f¡l z öd¤j¡œ H pLm ®rœ hÉhq¡ll SeÉ
Bf¢e HLV¡ ¢hno Email address hÉhq¡l Ll¦e z Bfe¡l hÉ¢š²Na fËu¡Se AeÉ BlL¢V Email Address hÉhq¡l
Ll¦e z ¢h¢iæ Juhp¡CV Bfe¡l pÇfLÑ abÉ ®cJu¡l fËu¡Se BlL¢V ¢houl ¢cL mr l¡M¤e z H pju öd¤j¡œ Bh¢nÉL ®rœ
abÉ ¢ce Hhw ®L¡e¡ n¢fw p¡CV Abh¡ ®X¢mi¡¢l HXÊp fËu¡Se e¡ qm false information ¢ce z Bn¡ Ll¡ k¡u Jfll
fcrf c¤¢V NËqe Ll¡l gm Bfe¡l hÉ¢š²Na C-®jCm HXÊp¢V ØfÉ¡j h¡ Ah¡¢’a C-®jCml k¿»e¡ ®bL AeLV¡ ®lq¡C f¡h z
AhnÉ HSeÉ spam killer h¡ H dlel AeÉ ®L¡e pgVJuÉ¡l hÉhq¡l Lla f¡le z
237
p£¢ja
p£¢ja
C¾V¡leV L¡eLne ®nu¡¢lw z je Ll¦e Bfe¡l¡ c¤C hå¥ Bfe¡cl L¢ÇfEV¡l ®eVJu¡¢LÑw LlRe z HMe Bfe¡l HL hå¥l
C¾V¡leV L¡eLne luR qa f¡l a¡ Dial-up h¡ Broad Band z Bf¢e Q¡µRe a¡l C¾V¡leV L¡eLne ®nu¡l Lla Bl
HC L¡S¢V ®ki¡h Llhe z (i) Start ®je¤a ¢LÓL Ll¦e z (ii) Settings ®bL Network Connections ¢pmƒ Ll¦e z
(iii) HM¡e ®bL Dial-up, Local area network, PPPoE (Properties), h¡ VPN connectionkV¡ Q¡µRe a¡
¢pmƒ Ll¦e Hhw h¡j f¡nl Network Tasks bL Change Settings of this connection ¢pmƒ Ll¦e z (iv)
Hh¡l Advanced Tab bL Allow other network users to connect through this computer's Internet
connection h„ ¢pmƒ Ll¦ez (v) HMe Bf¢e k¢c Q¡e AeÉ¡eÉ CES¡ll¡ HC C¾V¡leV L¡eLne Enable h¡ Disable
Lla f¡lh, HM¡e ®bL Allow other network users to control or disable the shaved internet
connection ¢pmƒ Ll¦e z (vi) Internet connection shaving Hl home networking connection H
Bfe¡l HÉ¡X¡ÃV¡l AbÑ¡v ®k L¢ÇfEV¡ll C¾V¡leV L¡eLne AeÉ¡eÉ L¢ÇfEV¡l ®nu¡l Llh a¡l HÉ¡X¡ÃV¡l¢V ¢pmƒ Ll ¢ce z
C¾V¡leV ¢ØfX h¡s¡e¡ z HC ¢Vfp¢V k¡l¡ hËXhÉ¡ä hÉhq¡l Lle a¡cl SeÉ z ah qua¡ H¢V X¡u¡m-Bf J L¡S
Llhz (i) fËbjC mr Ll¦e ®k, Bf¢e Administration ¢qph mN Ce LlRe ¢L-e¡ z Llm - (ii) Start H ¢LÓL Ll¦ez (iii)
Run ¢pmƒ Ll gpedit.msc V¡Cf Ll JL ®h¡a¡j ¢LÓL Ll¦ez (iv) Hh¡l ECä¡l h¡j ¢cLl Local Computer
Policy'l ¢eQ Administrative Templates H X¡hm ¢LÓL Ll¦ez (v) Hlfl Network H X¡hm ¢LÓL Ll¦ez (vi)
Aaxfl QoS Packet Scheduler ®L q¡Cm¡CV Ll¦e z (vii) X¡e ¢cLl ECä¡ ®bL limit Reservable
bandwidth ®bL Afne¢V X¡hm ¢LÓL Ll¦e z (viii) Settings bL Enable ¢pmƒ Ll¦e z (ix) Bandwidth limit
(%) Hl f¡nl h„ O V¡Cf Ll Ok h¡a¡j Q¡f¤e z ¢LR¤ ¢LR¤ L¢ÇfEV¡ll p¡b p¡bC fËi¡h mr Llhe z Bl ¢LR¤ ¢LR¤a s
L¡l fËu¡Se qhz p¡d¡lZa AeÉ¡eÉ ®fË¡NË¡j Bfe¡l hËXhÉ¡ä h¡ C¾V¡leV L¡eLnel 20% ¢ØfX ¢eScl SeÉ ¢lS¡iÑ Ll l¡M z
Bl Efll ¢Vfpl j¡dÉj Bjl¡ AeÉ¡eÉ ®fË¡NË¡jl ¢lS¡iÑ Ll l¡M¡ ¢ØfXL h¡c ¢cu a¡ Bj¡cl hË¡E¢Sw J X¡Eem¡¢Xw H
hÉhq¡l Llh¡ z gm ü¡i¡¢hLi¡hC Bj¡cl hËXhÉ¡ä ¢ØfX ®hs k¡h z
Pagefile h¡c ®cu¡ z p¡d¡lZa Windows XP ®k XÊ¡Ci Ceøm Llhe ®p XÊ¡Ci Pagefile.sys e¡j HL¢V g¡Cm
®~al£ qu z H¢VC ¢h¢iæ HÉ¡¢fÔLne ®m¡X qa p¡q¡kÉ Ll z AeLV¡ Virtual Memory ¢qph H¢V hÉhq²a qu z Bfe¡l¡ k¢c
Q¡e fË¢ah¡l Windows XP ®m¡X qh¡l pju H¢V ea¥e Ll ®~a¢l qh, a¡ qm ¢eQl ¢euj¢V ¢nM l¡M¤e z (i) Control Panel
H k¡ez (ii) ®pM¡e ®bL Administrative tools ¢pmƒ Ll¦e z k¡l¡ M¤S f¡he e¡ a¡l¡ Performance and
Maintenance H ¢LÓL Ll¦e z (iii) Hh¡l Local Security policy ®a X¡hm ¢LÓL Ll¦e z (iv) HL¢V ea¥e ECä¡ Bphz
®pM¡el h¡j f¡n Local Policy l Security Options H ¢LÓL Ll¦e z (v) X¡e f¡nl ECä¡l HLcj ¢eQ Bp¤e z (vi)
Shutdown: Clear virtual memory pagefile Afne¢V X¡hm ¢LÓL Ll¦e z (vii) ea¥e Bp¡ ECä¡ ®bL Enable
¢pmƒ Ll¦e z (viii) Ok Ll¦e z
Lj¢fÔV Shutdownz A®eLC hme ®k, Windows XP p¡V X¡Ee Ll¡l flJ f¤l¡f¤¢l hå qu e¡ z ECä¡a h¡aÑ¡
Bp ®k, "It's now safe to turn off your Computer." Bfe¡l¡ L¢ÇfEV¡l f¤l¡f¤¢l hå Ll¡l SeÉ k¡ Llhe a¡ qm¡-
(i) Control Panel k¡ez (ii) Power Options H ¢LÓL Ll¦e Abh¡ Performance and maintenance qu
Power Options H ¢LÓL Ll¦e z (iii) ea¥e Bp¡ ECä¡l Efll APM Afne H ¢LÓL Ll¦e z (iv) Hh¡l Advance
Power Management Hl h„¢V AbÑ¡v Enable Advanced Power Management Support ¢VL ¢ce z (v)
Ok Ll¦e z hÉp Hlfl ®bL AV¡j¢VL Bfe¡l L¢ÇfEV¡l hå qu k¡h Shut Down Lj¡ä ®ch¡l fl z
pÔ¡ Shutdown z B¢j fË¡u pjuC ®k pjpÉ¡l pÇj¤M£e qa¡j a¡ qm¡, Shut Down Lj¡ä ®ch¡l fl fË¡u 1 h¡ 2 ¢j¢eV
fl L¢ÇfEV¡l hå qa¡ z â¦a hå Ll¡l SeÉ ®k pj¡d¡e…m¡ ®fm¡j ®p…m¡ qm¡ - (i) Shut Down Ll¡l BN ph…m¡
Running program hå Ll¦ez (ii) Control Panel H Administrative tools Hl Services H k¡e (Abh¡
Start>Run>Services V¡Cf L®l H¾V¡l Ll¦e) z (iii) X¡ef¡nl ECä¡ ®bL Nvidia Driver Helper Service
Afne¢V X¡hm ¢LÓL Ll¦e z (iv) ea¥e ECä¡ ®bL Stop ¢LÓL Ll Ok Ll¦e z (v) Hh¡l Shut Down Ll¦e z Shut
Down Hl pju Page file h¡c ¢ce (Page file h¡c ¢ce Awn ®cM¤e )z
238
p£¢ja