Hakkımda

Web hosting is a service enabling a person or company to make online their web pages and informations on the hosting provider's servers. Hosting provider's are companies that provide space on a webserver for use by their customers as well as providing Internet connectivity, generally in a data center.-----Web hosting types-----Free web hosting service: it is free but it may has got some advertisements, and it is often smaller than to paid hosting. Shared web hosting service: Your Web site is running on the same server as many other sites. Typically, all sites uses same RAM and the CPU. A shared website may be hosted with a reseller. Colocation service: the user buy his/her own server and setup it. And than give server to datacenter to connect internet and climate opetations.

29 Temmuz 2008 Salı

Final Exam

A web hosting service is a type of Internet hosting service that allows individuals and organizations to provide their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center, called colocation.

The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with little processing. Many Internet service providers (ISPs) offer this service free to their subscribers. People can also obtain Web page hosting from other, alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or cheap. Business web site hosting often has a higher expense.
Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also required.
The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company. To find a web hosting company, searchable directories can be used. One must be extremely careful when searching for a new company because many of the people promoting service providers are actually affiliates and the reviews are biased.


Multiple racks of servers, and how a datacenter commonly looks.
Hosting uptime refers to the percentage of time the host is accessible via the internet. Many providers state that they aim for a 99.9% uptime, but there may be server restarts and planned (or unplanned) maintenance in any hosting environment.
A common claim from the popular hosting providers is '99% or 99.9% server uptime' but this often refers only to a server being powered on and doesn't account for network downtime. Real downtime can potentially be larger than the percentage guaranteed by the provider. Many providers tie uptime and accessibility into their own service level agreement (SLA). SLAs sometimes include refunds or reduced costs if performance goals are not met.



A typical server "cage," commonly seen in colocation centres.
Internet hosting services can run Web servers; see Internet hosting services.
Hosting services limited to the Web:
Free web hosting service: is free, (sometimes) advertisement-supported web hosting, and is often limited when compared to paid hosting.
Shared web hosting service: one's Web site is placed on the same server as many other sites, ranging from a few to hundreds or thousands. Typically, all domains may share a common pool of server resources, such as RAM and the CPU. A shared website may be hosted with a reseller.
Reseller web hosting: allows clients to become web hosts themselves. Resellers could function, for individual domains, under any combination of these listed types of hosting, depending on who they are affiliated with as a provider. Resellers' accounts may vary tremendously in size: they may have their own virtual dedicated server to a colocated server.
Virtual Dedicated Server: dividing a server into virtual servers, where each user feels like they're on their own dedicated server, but they're actually sharing a server with many other users. The users may have root access to their own virtual space. This is also known as a virtual private server or VPS.
Dedicated hosting service: the user gets his or her own Web server and gains full control over it (root access for Linux/administrator access for Windows); however, the user typically does not own the server. Another type of Dedicated hosting is Self-Managed or Unmanaged. This is usually the least expensive for Dedicated plans. The user has full administrative access to the box, which means the client is responsible for the security and maintenance of his own dedicated box.
Managed hosting service: the user gets his or her own Web server but is not allowed full control over it (root access for Linux/administrator access for Windows); however, they are allowed to manage their data via FTP or other remote management tools. The user is disallowed full control so that the provider can guarantee quality of service by not allowing the user to modify the server or potentially create configuration problems. The user typically does not own the server. The server is leased to the client.
Colocation web hosting service: similar to the dedicated web hosting service, but the user owns the colo server; the hosting company provides physical space that the server takes up and takes care of the server. This is the most powerful and expensive type of the web hosting service. In most cases, the colocation provider may provide little to no support directly for their client's machine, providing only the electrical, Internet access, and storage facilities for the server. In most cases for colo, the client would have his own administrator visit the data center on site to do any hardware upgrades or changes.
Clustered hosting: having multiple servers hosting the same content for better resource utilization. Clustered Servers are a perfect solution for high-availability dedicated hosting, or creating a scalable web hosting solution.
Grid hosting : this form of distributed hosting is when a server cluster acts like a grid and is composed of multiple nodes.
Home server: usually a single machine placed in a private residence can be used to host one or more web sites from a usually consumer-grade broadband connection. These can be purpose-built machines or more commonly old PC's.
Some ISPs actively attempt to block these servers by disallowing incoming requests to TCP port 80 of the user's connection and by refusing to provide static IP addresses. A common way to attain a static IP is by creating an account with a dynamic DNS service. A dynamic DNS service will automatically change the IP address that a URL points to when it changes.
Some specific types of hosting provided by web host service providers:
File hosting service: hosts not web pages but files
Image hosting service
Video hosting service
Blog hosting service
One-click hosting
Shopping cart software

Web hosting is often provided as part of a general Internet access plan; there are many free and paid providers offering these services.
A customer needs to evaluate the requirements of the application to choose what kind of hosting to use. Such considerations include database server software, scripting software, and operating system. Most hosting providers provide Linux-based web hosting which offers a wide range of different software. A typical configuration for a Linux server is the LAMP platform: Linux, Apache, MySQL, and PHP/Perl/Python. The webhosting client may want to have other services, such as email for their business domain, databases or multi-media services for streaming media. A customer may also choose Windows for its hosting platform. The customer still can choose from PHP, Perl, and Python but may also use ASP .Net or Classic ASP.
Web hosting packages often include a Web Content Management System, so the end-user doesn't have to worry about the more technical aspects. These Web Content Management systems are great for the average user, but for those who want more control over their website design, this feature can sometimes be a nuisance rather than a feature.
One may also search the Internet to find active webhosting message boards that may provide feedback on what type of webhosting company may suit his/her needs.

Second Exam

I want to share with you my first ccna exam and i find it easy.I have already see same questions so i dont suprized.i want to say that i am not responsible this questions i found it mine is only researching and that is a good idea for your network skill;)

Take Assessment - Final Exam - CCNA 1 Networking Basics (Version 3.1)
1
Which subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.255.255.240
255.255.192.0
255.255.0.0
255.192.0.0
240.0.0.0
255.0.0.0



2
How many collision domains are shown in the diagram?
three
four
five
six
seven
eight




3
Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18



4
Based on the graphic above, which of the following occurs as each host system comes on line in the topology?
The switch sends its MAC address to each host.
The switch adds MAC address to the bridge table as each host sends a frame.
Each host exchanges MAC addresses with each other.
The switch listens for data traffic to block since the switch lacks an IP address.




5
Which of the following statements are correct about CSMA/CD? (Choose three.)
It is a media access method used in LANs.
It is a media access method used in FDDI WANs.
When a device needs to transmit, it checks to see if the media is available.
A device sends data without checking media availability because all devices have equal access.
Multiple devices can successfully transmit simultaneously.
Only one device can successfully transmit at a time.



6
Refer to the exhibit. The physical documentation shows a portion of the internetwork of the ABC Company. Which segments will be free of collisions?
segments 1 and 2
segments 1, 2, and 3
segments 1, 2, 3, 4, and 5
segments 2 and 3
segments 3, 4, and 5
segments 4, and 5




7
Refer to the exhibit. Which type of UTP cable should be used to connect Host A to Switch1?
rollover
console
crossover
straight-through



8
What are important characteristics to consider when purchasing a network interface card? (Choose two.)
security used on the network
media used on the network
system bus used on the computer
software installed on the network
diagnostic tools installed on the network




9
Refer to the exhibit. What kind of Ethernet cable is represented?
rollover cable
straight-through cable
crossover cable
console cable



10
A network administrator has added a new switch to the network. The new switch connects to an existing switch that is already installed. Which UTP cable correctly connects the new switch to the existing switch?
crossover
rollover
straight-through
console




11
Which physical network topology is easy to monitor and troubleshoot, easy to add new devices to as the network expands, but subject to complete failure when a central hub or switch ceases to work?
bus
star
ring
mesh



12
After an unsuccessful ping to the local router, the technician decides to investigate the router. The technician observes that the lights and fan on the router are not operational. In which layer of the OSI model is the problem most likely occurring?
transport
network
data link
physical




13
Refer to the exhibit. Host A pings Host B. What can be concluded about the source and destination addresses contained in the communication sent by Router R5 when it forwards the ping out the Ethernet interface to Host B? (Choose two.)
source IP address: 192.168.10.129
source MAC address: BBBB.3333.5677
source MAC address: 5555.AAAA.6666
destination IP address: 192.168.10.33
destination IP address: 192.168.10.134
destination MAC address: 9999.DADC.1234



14
Which technologies are considered to be LAN technologies? (Choose two.)
DSL
Token Ring
Frame Relay
ISDN
Ethernet




15
A network administrator has installed a 24 port switch and connected 10 computers with 10/100 NICs. If the NICs are operating at 100 Mbps, how much bandwidth is available for each computer to receive data?
0.24 Mbps
4.17 Mbps
10 Mbps
24 Mbps
100 Mbps
200 Mbps
Refer to the exhibit. The connections in the exhibit are labeled A through E. Which of these indicate LAN links? (Choose two.)
link A
link B
link C
link D
link E




17
A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
172.16.0.0
172.16.192.0
172.16.192.128
172.16.192.160
172.16.192.168
172.16.192.176





18
Which devices will create multiple collision domains in an Ethernet network? (Choose two.)
NIC
hub
switch
router
repeater



19
Which protocols are TCP/IP application layer protocols? (Choose two.)
TFTP
IP
TCP
UDP
DNS



20
The ping command can be used to test connectivity between hosts. Which OSI model layers are verified by this test?
Layers 1 and 2 only
Layers 1 and 3 only
Layers 1, 2 and 3
Layer 1 through Layer 7
Layer 4 through Layer 7



21
Why would a company install a switch instead of a hub when building or expanding a corporate network?
A switch manages frames faster than a hub does.
A switch operates at 100 Mbps. A hub operates at a maximum of 10 Mbps.
A switch modifies the Ethernet frame to remove any errors. A hub forwards the frame exactly as it arrived.
A switch provides more bandwidth by sending frames only out the port to which the destination device is attached. A hub sends the frame out all ports except the source port.



22
Refer to the exhibit. How many broadcast domains are shown?
three
four
five
six
eight
ten



23
How does a switch learn the addresses of hosts connected to its ports?
All source MAC addresses must be manually configured in CAM.
The switch reads the source MAC address on incoming frames and records it in CAM.
The switch reads the destination MAC address on incoming frames and records it in CAM.
If a switch port is full duplex, the switch reads both the source and destination MAC addresses on incoming frames and records them in CAM.



24
Why do vendors utilize the OSI model when designing networking products?
It places requirements on all vendors that develop proprietary networking technologies for advance networking systems.
It ensures greater compatibility and interoperability with equipment from different vendors.
The International Organization for Standards develops all new products to be incorporated into the product.
It is mandated by the International Organization for Standardization that network products be compliant with the OSI model.



25
What is the correct number of usable subnetworks and hosts for the IP network address 192.168.35.0 subnetted with a /28 mask?
6 networks / 64 hosts
14 networks / 32 hosts
14 networks / 14 hosts
30 networks / 64 hosts



26
Refer to the exhibit. A newly hired technician has a task of terminating CAT 5 UTP cables. The network administrator visually examined the cables the technician terminated. Some of the cables have connectors as shown in the exhibit. What should the network administrator explain to the technician about the cables?
Both cables are acceptable.
The cable in Graphic A will produce more crosstalk.
The cable in Graphic A should be used in the more critical network segments.
The cable in Graphic A is preferred because it will be easier to crimp the connector.



27
In the exhibit, the connections between the devices are labeled A, B, C, D, and E. For each connection, what is the correct UTP cable to use?
A=straight, B=rollover, C=straight, D=crossover, E=crossover
A=rollover, B=crossover, C=crossover, D=straight, E=straight
A=rollover, B=straight, C=straight, D=crossover, E=straight
A=rollover, B=straight, C=straight, D=crossover, E=crossover
A=straight, B=crossover, C=rollover, D=straight, E=straight



28
Refer to the exhibit. A network administrator has implemented subnetting using the network 192.168.25.0 and a /28 mask. Workstation 1 is not able to ping with Workstation 2. What is a possible cause for this lack of communication?
Workstation 1 and Workstation 2 are on the same subnet.
The serial connections are using addresses from the LAN subnets.
All hosts in the network must be in the same subnet to communicate.
Workstation 1 is not on the same network that the RTA router LAN interface is on.



29
Which characteristics are common to both UDP and TCP? (Choose two.)
provides windowing
provides reliability
uses port numbers
acknowledges receipt of data
classified as a connectionless protocol
classified as a transport layer protocol



30
Which type of address is 192.168.170.112/28?
host address
subnetwork address
broadcast address
multicast address
31
Refer to the exhibit. The network administrator wants to create a subnet for the point-to-point connection between the two routers. Which subnetwork mask would provide enough addresses for the point-to-point link with the least number of wasted addresses?
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
255.255.255.252



32
Refer to the exhibit. What is the order of the TCP/IP Protocol Data Units as data is moved as indicated through the OSI model?
bits, segments, frames, packets, data
bits, frames, packets, segments, data
bits, frames, segments, packets, data
bits, packets, frames, segments, data



33
When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network?
1 and 2; 4 and 5
1 and 2; 3 and 6
3 and 6; 7 and 8
4 and 5; 7 and 8



34
Refer to the exhibit. What must be configured on Host B to allow it to communicate with the file server? (Choose three.)
the MAC address of the file server
the MAC address of the PADI router interface connected to Switch A
the IP address of Switch A
a unique host IP address
the subnet mask for the LAN
the default gateway address



35
Refer to the exhibit. Workstation 1 pings the Fa0/1 interface of Router 1. Which MAC address will workstation 1 obtain during the ARP request for this communication?
00-06-5B-88-DF-C3
00-B0-D0-7F-F7-46
00-0F-24-85-75-C0
00-0B-E5-64-BD-44
00-08-A3-B6-CE-02
00-08-A3-B6-CE-03



36
Consider the networks shown in the exhibit. Host A is sending packets to host B. Which layer of the OSI model is being used when the router is making the calculated decision to determine which interface to send the packet out?
physical
data link
network
transport
session
presentation



37
A computer technician is asked to make a network cable. One end of the cable is pinned as a 568A and the other as a 568B. For what purposes can this cable be used? (Choose two.)
to connect a router to a switch
to connect a switch to a switch
to connect a host to a switch
to connect a hub to a switch
to connect a router to a hub
to connect a host to a hub



38
A router determines the path to deliver a packet. What layer of the OSI model does this fact represent?
session
transport
network
data link
physical



39
A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections?
application
session
transport
network
data link



40
Two peer hosts are exchanging data using TFTP. During the current session, a datagram fails to arrive at the destination. Which statement is true regarding the retransmission of the datagram?
Datagram retransmission requires user authentication.
Datagram retransmission is controlled by the application.
Datagram retransmission relies on the acknowledgements at transport layer.
Datagram retransmission occurs when the retransmission timer expires in the source host.



41
What is the decimal representation of the binary number 11111000?
224
240
248
252
254



42
A technician is testing connectivity between the devices using the ping command. Pings between Host B and Host A were successful. The technician could not ping the R3 address 172.16.3.2 from Host A. The technician issued ipconfig from Host A and saw the information displayed in the exhibit. What is the most likely problem?
The IP address of Host A is incorrect.
The subnet mask of Host A is incorrect.
The default gateway of Host A is incorrect.
Host A is properly configured. Some other problem exists in the internetwork.



43
Refer to the exhibit. Which diagram represents the network topology that an administrator would prefer, and why would the administrator prefer it?
Diagram A. It provides the hosts with full-duplex connections.
Diagram A. It will better provide available bandwidth to the hosts.
Diagram B. It extends the collision domain.
Diagram B. It prevents the frames from looping.
Either network will perform equally well.



44
An Ethernet host receives a frame, calculates the FCS, and compares the calculated FCS to the FCS received in the frame. The host finds that the two FCS values do not match. What action will be taken by the host?
The host discards the frame.
The host processes the data frame normally.
The host initiates a request for retransmission of the frame.
The host sends the frame content to an upper layer protocol for error recovery.



45
Which cable diagram displays the end to end pinout for a crossover cable used with Cisco devices?
Cable A
Cable B
Cable C
Cable D
46
A large company has a network that is constantly changing. The routing tables in the routers need to be adjusted to reflect the changes in the routing paths. What type of routing would the network administrator implement?
static routes
dynamic routing protocols
only default routes
none. No routing is necessary.



47
Refer to the exhibit. The hub and the switch are operating using factory default settings. Which hosts will receive the frame if host A transmits a broadcast frame?
Only workstation B and the router will receive the data.
Workstations B, C, D, E, and the router will receive the data.
Only workstations connected to the hub will receive the data.
Workstations B, C, D, E, and the router will receive the data and it will be forwarded into the Internet.



48
Which network device creates the highest amount of latency?
hub
router
switch
bridge



49
Refer to the exhibit. A network associate needs to establish an Ethernet connection between Host A and Host B. However, the distance between the two hosts is further than the cabling standards allow. Which two devices that operate at the physical layer of the OSI can be used to allow Host A and Host B to communicate? (Choose two.)
switch
hub
bridge
router
repeater

Hi, Inexperienced :)

today i want to explain network and in network communite what we use .in this composition will include servers, routers, cables, hubs, swicthes... ect.

NETWORK is the bigest net. i mean it is a kind of LAN but it already connet all of pc which in internet.why we can't behave to it as LAN ?Because the distance of between the computers are can be very long so if we try to behave it like LAN our signal will break down because of lack of repeaters.So the network devices usefull in this time the network devices ,such as ;hubs,swiches,routhers,have to use in network structure.now we must learn how and which aim we use the devices...

if you want to learn ,i will write here. you should run away an eye over my following writing but i want to make clear that, i can only give a bit information, so if you want learn to much there isn't here.
thans your interesting for me ...