Skip to main content

Explain process of setting up a NIC (Network interface card).

44.Explain process of setting up a NIC (Network interface card).
Ans.
1. Network interface card (NIC) can be set-up by configuring the network card and internal network.

2. Before configuring network card we must check loopback (IP address 127.0.0.1) is working.

3. Even if the compute is not connected to outside network internet network configuration is required for some applications. This address is known as loopback device, and its IP address is 127.0.0.1

4. To check loopback device is configured or not, we use ‘ifconfig’ command it shows a device called ‘lo’ with the address 127.0.0.1, if this device and address is not shown there then loopback is not configured.

5. To configure it we can use command ifconfig lo 127.0.0.1 after that we need to use the ‘route’ command to give system a little more information about this interface for this
‘route add –net 127.0.0.0’ command is used, after this loopback is setup.

6. To configure a network card we will use ifconfig command with eth0, for one Ethernet device.

7. We also need to know IP address; net mask; broadcast address, these numbers vary depending on the type of network being built.

8. For example , we’ll configure an Ethernet interface for an internal network by following command:
Ifconfig eth0 192.168.25 netmask 255.255.255.0 broadcast 192.168.2.255

9. It’ll create a device name eth0 with respective IP address, net mask and broadcast address.

10. To add addition computers to network, we need to repeat this process on other computers with different IP address.

11. In addition to configuring the network cards on each of the computers in network, three files on each computer need to be modified.
/etc/nsswitch.conf- contain configuration information for the name resolver and should contain following line ‘hosts: files dns’
/etc/hosts- contain the name of all the computers on the local network or outside network.
/etc/resolv.conf- contain information about name servers employed to resolve hostname.
/etc/sysconfig/network- Contains two lines as follows:
NETWORKING= yes
HOSTNAME= (host and domain name of your system)


Comments

Popular posts from this blog

Explain the tools used to monitor system security.

12.Explain the tools used to monitor system security. Ans. 1. People who, for purpose of larceny or to amuse themselves, like to break into computers, they are called ‘crackers’. 2. If there is a vulnerability in a system they will find it and use it against you. 3. Preventing use of your machine for nefarious purpose and guarding against intrusion are, in the end, your responsibility alone. 4. Red hat equips you with tools to detect and deal with unauthorised access of many kinds. 5. You need to configure those tools and understand how to sense the warning they provide. 6. Fortunately Linux is development community is quick to find potential exploits and to create ways of slamming the doors before crackers can enter in your system. 7. Red hat is careful enough to making available new, patched version in which potential exploits have been found. 8. You should make sure to download and install the repaired package. 9. This line of defence...

Explain the file systems supported by Linux.

21.Explain the file systems supported by Linux. Ans. 1. Linux can read/write to several file system that originated with other operating system much different from Linux. 2. One reason that Linux supports so many file systems is the design of its virtual file system (VFS) layer, its provides a fairly universal forms of file support, file systems supported by Linux are as follows: 3. ext3: • Ext3 stands for third extended file system. • Starting from Linux Kernel 2.4.15 ext3 was available. • The main benefit of ext3 is that it allows journaling. • Journaling has a dedicated area in the file system, where all the changes are tracked. • When the system crashes, the possibility of file system corruption is less because of journaling. (If no journaling, then fsck command (file system consistency check) is used to check for the corrupted file and to repair that file). • ext3 keeps a record of uncommitted file transactions and applies only those transactions when the sy...

Explain the boot process in Linux.

13.Explain the boot process in Linux. Ans. 1. When we turn on our PC, it runs a program called “Basic input/output System” (BIOS). 2. BIOS is the only way to communicate with the system components until the operating system is up and running and able to take over the system management functions. 3. BIOS is installed on Read only memory (ROM) chip physically attached to system board. 4. The ROM type of chip is usually referred as to as an EEPROM chip, meaning it’s not writeable by user. 5. After the BIOS loads, it performs some diagnostics on the hardware, checks the installed components to be sure they are functioning and checks the system RAM (Random access memory). 6. Next the BIOS tries to find system drives from which it can load the boot program to begin the process of starting the operating system/kernel. 7. We can specify the search order for drives by changing the setting in the system BIOS configuration. 8. Usually the first hard drive...