Академический Документы
Профессиональный Документы
Культура Документы
6. In crimping tool insert the head of RJ45 connector and crimp (press) it hardly.
7. Follow same step with same color order for the other end of cable too.
8. The wire you made by following these steps is a STRAIGHT cable.
So now you can guess why we have to make CROSS CABLE for connecting same kind of
devices. Because if use same color coding on both the side than transmitter of one m/c will
send data to transmitter of another and data packets will lost, so we have to change wiring
code so that transmitter of one connects to reciver of other and vice-versa.
Reference diagram:
F-Type
The F connector is a type of RF connector commonly used for cable and universally for satellite television.
They are also used for the cable TV connection in DOCSIS cable modems, usually with RG-6 tri-shield
cable. The F connector is inexpensive, yet has good performance up to 1 GHz. One reason for its low cost
is that it uses the center wire of the coaxial cable as the pin of the male connector. The male connector
body is typically crimped onto the exposed outer braid. Female connectors have a 3/8-32 thread. Most
male connectors have a matching threaded connecting ring, though push-on versions are also available.
SC connector
ST connector
First step is to read the users guide and familiarize yourself with the new card.
Carefully remove the network card from its static-proof plastic envelope, and
slide it into the slot.
Seat the card in the slot firmly with gentle pressure along the length of
the card, especially right about the slot itself.
Snugly, screw the card to the computer frame, but do not over tighten.
Every computer on network requires an IP address to communicate with other computer. Linux is
developed for networking. To pass RHCE exam you must understand networking.
An IP is a 32-bit number comprised of a host number and a network prefix, both of which are used to
uniquely identify each node within a network.
To make these addresses more readable, they are broken up into 4 bytes, or octets, where any 2 bytes are
separated by a period. This is commonly referred to as dotted decimal notation.
The first part of an Internet address identifies the network on which the host resides, while the second part
identifies the particular host on the given network. This creates the two-level addressing hierarchy.
All hosts on a given network share the same network prefix but must have a unique host number. Similarly,
any two hosts on different networks must have different network prefixes but may have the same host
number.
Here is a simple example of an IP address: 192.168.1.1
An additional value, called a subnet mask, determines the boundary between the network and host
components of an address.
Subnet masks are 32 bits long and are typically represented in dotted-decimal (such as 255.255.255.0) or
the number of networking bits (such as /24). The networking bits in a mask must be contiguous and the
host bits in the subnet mask must be contiguous. 255.0.255.0 is an invalid mask. A subnet mask is used to
mask a portion of the IP address, so that TCP/IP can tell the difference between the network ID and the
host ID. TCP/IP uses the subnet mask to determine whether the destination is on a local or remote
network.
Class
Class
Class
Class
Class
A
B
C
D
E
addresses
addresses
addresses
addresses
addresses
range
range
range
range
range
from
from
from
from
from
1-126
128-191
192-223
224-239
240-254
IP address 159.123.12.2 belongs to class B because 159 [First number] falls in range 128 - 191
IP address 15.12.12.6 belongs to class A because 15 [First number] falls in range 1 - 126
IP address 192.168.1.2 belongs to class C because 192 [First number] falls in range 192 - 223
When you are dealing with IP addresses, two numbers are always reserved for each network number:
The first address in the network represents the network's address, and the last address in the network
represents the broadcast address for this network, called directed broadcast.
When you look at IP itself, two IP addresses are reserved: 0.0.0.0 (the very first address), which represents
all IP addresses, and 255.255.255.255 (the very last address), which is the local broadcast address.
As to assigning addresses to devices, two general types of addresses can be used: public and private.
Public addresses
Public addresses are Class A, B, and C addresses that can be used to access devices in other public
networks, such as the Internet.
Private Addresses
Within the range of addresses for Class A, B, and C addresses are some reserved addresses, commonly
called private addresses. Anyone can use private addresses; however, this creates a problem if you want to
access the Internet. Remember that each device in the network (in this case, this includes the Internet)
must have a unique IP address. If two networks are using the same private addresses, you would run into
reachability issues. To access the Internet, your source IP addresses must have a unique Internet public
address. This can be accomplished through address translation. Here is a list of private addresses.
November 2015
the integer identifying the user for the operating system (UID=User ID, user
identification)
the integer identifying the group of the user (GID=Group ID, group identification)
the comment in which the information on the user or simply its real name can be found
the connection directory, which is directory which opens upon connection to the system
the command is the one that is executed after connection to the system (often, this is
the command interpreter)
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/bin/bash
daemon:x:2:2:daemon:/sbin:/bin/bash
news:x:9:13:News system:/etc/news:/bin/bash
uucp:x:10:14::/var/lib/uucp/taylor_config:/bin/bash
cquoi:x:500:100:Cool......:/home/cquoi:/bin/bash
It is important to know that the passwords located in this file are encrypted. It is therefore useless
to edit and replace the field password by directly typing the password, which would only cause
the account to be blocked.
Once a user connects, the login program compares the password typed in by the user (after
encrypting it) with the password stored in the passwd file. If they do not match, the connection
can not be established.
To prohibit use, it is sufficient to replace the encrypted password by a star: "*".
Access to an account may be opened by leaving the field password open. Any person who
wishes
to
connect
via
the
account
can
then
do
so.
To be able to modify the password of an account with the command passwd, you must either be
the system administrator or the account owner (the system will than require that you enter the old
password before asking you to enter the new password twice).
UID: (unique) identifier of each user account. Numbers beween 0 and 99 are frequently reserved
for the machine's own accounts. Numbers higher than 100 are reserved for user accounts.
GID: group identifier. The default group (called group) has the number 50. This identifier is used
in connection with access rights to the files. This question will not concern you if your system has
more than one user group. (In that case, you must pay attention to the file /etc/group.
From the shell, it is possible to modify the command interpreter. To do so, use the
command chshor passwd -s. Linux will look for program you have specified in the
file /etc/shells. Only commands that are present in this file will be accepted and will replace the
current value of the fieldstart_program. These restrictions do not apply to the superuser
account.
Make sure that the access rights to the file /etc/shells are the same as for the file /etc/passwd
The superuser may not necessarily be called root. To change this, just replace the root account
name
by
the
desired
name.
A privileged account is an account whose identifier (UID, User ID) is zero.
root:x:0:root
bin:x:1:root,bin,daemon
daemon:x:2:
tty:x:5:
disk:x:6:
lp:x:7:
wwwadmin:x:8:
kmem:x:9:
wheel:x:10:
mail:x:12:cyrus
news:x:13:news
When the ls command is used with the option -l, the group number is displayed with the
number of the user to whom the file (or the directory) belongs. This unique number
corresponds to a unique group name (often 8 characters max.).
The same user can appear in several groups. When he connects to the system he
belongs to a group specified in the /etc/passwd (in the GID field). He can change this using
the newgrpcommand. The file access rights are then defined.
To add a user to a group, just edit the file /etc/group and add the name at the end of the
line by separating the names of the members by a comma.
To delete a group, edit the /etc/group file and delete the corresponding line. Please note,
do not forget to change the the numbers (GID) of the deleted group in the /etc/passwd file, if
users belonged to it. It is also important to search the files and directories of this group to
change this (otherwise, the files and directories may become inaccessible).
INITTY=/dev/tty[1-7]
for tty in $INITTY;
do setleds -D +num < $tty
done
Upon connection to the shell, the first thing that appears is the prompt, which can be configured
at
the
user's
discretion.
In case the administrator wishes a prompt which reads: "Hello#", just edit the file /etc/profile.
This file contains a variable called PS1. All lines pertaining to this variable must then be preceded
by a number sign: #. The line PS1='Hello#' must be added.
Just
Tip:
save
leave
an
log
a
blank
on
space
again.
after
Some
changes
the
prompt
to
will
be
noted.
improve
readability.
It is also possible to use variables in the prompt (for example, to display the time or name of the
machine, etc.):
\d
\t
\u
\r
\w
\W
\h
The color may also be changed. To do so, use the variable PS1 as follows:
PS1='\[\033[num_colorm]desired_prompt\033[0m]'
The color number is shown in the list below:
Black
0;30
Red
0;31
Green
0;32
Brown
0;33
Blue
0;34
Violet
0;35
Cyan
0;36
Light Gray
0;37
Gray
1;30
Pink
1;31
Light Green
1;32
Light Brown
1;33
Light Blue
1;34
Light Violet
1;35
Light Cyan
1;36
White
1;37
Here is an example which shows the time followed by the user name in red:
2COMMENTS
By Michael Scalisi, PCWorld
All of that stuff resides in the Users folder on the root of the system drive, where each
account has a subfolder named after it. The two main tools I'll describe in this article are
the 'User Accounts and Family Safety' wizard-based tool, which you can find in the
Control Panel, and the traditional 'Local Users and Groups' tool, which is available in
Computer Management.
Account Types
Before you start creating new users on your Windows 7 computer, you should
understand the difference between the two main account types.
Administrators have full control over the system. They can install software programs
and hardware drivers, and they can create and modify new users and groups.
Additionally, they can reset passwords, set policies, and edit the Registry. The OS
identifies tasks that require administrator permissions with a Windows security icon.
Standard users are permitted to log on to the computer, run programs, customize their
accounts, and save files in their user folders. Users are restricted from making
systemwide changes.
To create a new account, open Control Panel and choose User Accounts and Family
Safety, Add or remove user accounts. Click on Create a new account. Type in the new
account name, select either the Administrators or Standard Users user type, and then
click Create Account. By default, Windows assigns no password; you can make one by
clicking on that user's icon and selectingCreate a password. Alternatively, you can leave
it blank to allow the user to set a password when they first log on.
Editing Accounts
Once you've created an account, you can customize it further by editing. To edit an
account, open Control Panel once again and select User Accounts and Family
Safety,Add or remove user accounts. This takes you to the Manage Accounts window,
where you can select an account to edit by clicking on its icon. In this window, you can
change the account name, create or remove a password, change the picture, set up
parental controls, change the account type, or delete the account. Be cautious when
removing a password, since it will cause that user to lose any encrypted files, personal
certificates, and stored passwords.
Parental Controls
Concerned parents are often wary about letting their children have free rein on the family
computer. Windows 7's parental controls offer parents a way to keep their children's Web
surfing or gaming in check. To arrange parental controls, go to Control Panel and
selectUser Accounts and Family Safety, Set up parental controls for any user. Click on
the user for which you want to set controls.
Since all administrators can disable these controls, if an administrator account doesn't
have a password, Windows 7's parental controls will offer the option to force that person
to set a password at the next log-on.
At 10 p.m., Windows will log Jeffrey off automatically if he is still on the computer.
Turn on parental controls by selecting On, enforce current settings, and then modify
each setting as appropriate.
Time limits: If you want Windows to boot your child off the computer after, say, 10
p.m., this is where you can explicitly permit or deny computer usage by time and by the
day of the week.
Games: Here you can define whether the account is permitted to play games,
which game ratings are acceptable, and whether unrated games are allowed. You may
also allow or block particular games.
Allow and block specific programs: If you want to limit your child's computer use
to certain applications, this is where you choose them.