64 AND 32 BIT DIFFERENCE

64 AND 32 BIT DIFFERENCE

Ø  32-bit hardware and software is often referred to as x86 or x86-32.
Ø  64-bit hardware and software is often referred to as x64 or x86-64.
Ø  32-bit systems utilize data in 32-bit pieces while 64-bit systems utilize data in 64-bit pieces. In general, the more data that can be processed at once, the faster the system can operate.

IMPORTANT TO KNOW

For users who have 32 bit OS installed on their system, you will only be able to access 3.5 GB RAM no matter how much RAM you have Physically installed. In order to access full RAM, you need to clean install 64-bit version of Windows and there is not other way around this. Now before moving forward with the solutions for users who 64- bit version Windows and still not able to access full RAM, first check which type of operating system you have installed

You must use 64 bit of OS when you have RAM more then 2GB
A big difference between 32-bit processors and 64-bit processors is the number of calculations per second they can perform, which affects the speed at which they can complete tasks. 64-bit processors can come in dual-core, quad-core, six-core, and eight-core versions for home computing. Multiple cores allow for an increased number of calculations per second that can be performed, which can increase the processing power and help make a computer run faster. Software programs that require many calculations to function smoothly can operate faster and more efficiently on the multi-core 64-bit processors, for the most part.

HOPE ABOVE STATEMENT GIVES YOU GOOD BREATH

Know DNS Learn Server

Domain Name System

                                                                           DNS
·        Working With Dns And How Dns Works:-
·        Working Of Forward And Reverse Lookups:-
ü Forward Lookup Zone.
ü Reverse Lookup Zone.
·        Forward Stands For Resolving Name To It’s Ip Address.
·        Reverse Stands For Resolving Ip Address To It’s Name.
·        Features Of Forward Lookup & Reverse Lookup:-
·        Those Are:-
·        1.Primary Zone And 2.Secondary Zone Or 3.Stub Zone.
ü Primary Zone:-Will Configured At Domain Based System And It Have All Permissions Like Read Write Etc.
ü Secondary Zone:-Will Configured At Client’s Based Systems Who Connected With That Domain System It Will Work For Primary Dns It Works As A Fall Tolerance Service If Primary Zone Fall Down Secondary Zone Works As A Primary Zone.
ü Stub Zone:- Is A Service Which Have All The Information Of Server And Dns It Helps Clients And Other’s To Get Information Easily From One Place.
·        Different option’s in forward and reverse are:
ü PTR record:-ip address can added.
ü AAA record:-only name can added.
ü New delegation:-it is the new feature to distribute one server dns works to another dns server to make it easily and fast.
                                                          Points to remember:-
v When Configure Secondary Zone:-Primary Required Must And After Create Transfer Zones To View Primary Zone Session At Secondary Zone From Properties Of Primary Zone Dns.

v Stub zone created at client server by changing zone by these steps=forwardlookupzone-domain-properties-general-change.

Know AD With DNS Learn Server

Active directory with DNs

                                                            AD/DNS
 Working Of Active Directory And Domain Name System:-
                                                             Domain




                                                                                                                                                                                                                                           Switch                                                                          
   
                                                                                                                                   

Active Directory:-Is A Centralised Database Centre Where All The Clients And Their Services Are Managed And Its Own.
Domain Name System:-Is A Service Which Resolves Ip To Name And Name To Ip.
What Is The Main Functions Of Dns And Why We Use To Configure ?:-Dns Is Very Important Service Which Is Install At Every Domain Based System’s.
When Clients Get Connected To The Domain (Dns) Plays Very Important Roles Between This Connection It Converts Domain Name To Its Ip Address For Communicate With Eash Other.
What is FQDN?
(FQDN) stands for fully qualified domain name for example:-yahoo.com is Domain name
www.yahoo.com is fully qualified domain name.
dns port number:-53

Know DCHP Learn Server

Dynamic Host Configuration Protocol

                                                 DHCP
Ø DHCP Stands For Dynamic Host Configuration Protocol It Is Tcp/Ip Protocol It Is Used To Provide Ip Address Subnet Mask and Dns Address Etc. To Their Client Pc When We Configure It Every Clients Will Gets Their Ip Address As Per As They Boot Into The Network.
Ø DORA Stands For Discover Offer Request Acknowledgement The Process Of Dhcp Is Called As Dora Process.
Ø Dhcp Server Works At Port Number =67
Ø Dhcp Clients Works At Port Number=68
Ø Dhcp Relay Agent=Is A Service Which Is Used To Configure Dhcp By Other Option’s When We Need To Distribute Different Ip Addresses To Our Client’s When We Use It.In This Case We Need 2 Or More Lan Card’s To Configuring It is only find in roles remote policies and access services
Ø Dhcp Has Different Types Of Timer’s:
ü 50%=Also Known As=T1
ü 87.3%=Also Known As =T2
ü They Were Works For Ip Renewablelization
ü When It Goes At 50% Of Assigned Time It Will Ask For Ip Renew So Dhcp Server Will Renew It.
ü When It Goes At 87.3% Of Assigned Time It Will Ask For Ip Renew So Dhcp Server Will Renew It
Ø When It Reached At 100% Of Assigned Time And Dhcp Server Was Not Available To Renew It. It Will Automatically Get His Automatically Private Ip Addressing(APIPA) Automatically At A Time And Dhcp Auto Request In Every 5 Or Other Second For Ip Whenever Dhcp Server Will Boot Into The Network It Will Auto Assign Ip Address.
Ø Here Are All Option Were Define Of Dhcp:-
ü Exclusion Range:-Is A Part Of Dhcp Server It Is Used To Put Off Some Ip Address From Ip Range From Dhcp Server Configuration For Other Use For Example:-Start Ip=192.168.1.10 End Ip =192.168.1.20 When We Put Off 192.168.10.16 And 192.168.1.18 From Upper Range Is Called Exclusion Range.
ü Address Pool:-It Show Which Range U Have Define To Distribute.
ü Address Leased:-It Shows How Many And Which Client’s Will Get Their Ip

ü Reservations:-By Configure This U Will Reserve An Specific Computer By Their Mac Address For Specific Address.

Know EFS Learn Server

EFS

                  EFS
STANDS FOR encrypting file system (EFS).= is a service which is used to protect user data from deletions.
When we configure it it get auto applied to all user documents place when ever any user make any file any folder in document’s it get auto encrypted only that user can access that folder by neglecting any user and administrator can also access that file.


Steps-:


->Gpmc.msc
-> default domain policy
->edit
– >policies
->windows
->security settings
->public key policy
->encrypting file system
->Right click
->properties
->allow
->allow

->encrypt user’s document’s apply–ok

Know Folder Sharing Learn Server

File services

               
                    To Share a Folder In Windows Server As A Administrator Across The Network
                                                               And accessing with images:
Ø  Right click on file
Ø  Click on share
Ø  Add everyone
Ø  Then click on share.
Ø  Your file has been shared in your network
Ø  You can access that share folder by typing \\192.168.10.1 ip address of who sahred file

Know FSRM Learn Server

File Services Resource Manager

v Stand’s for File Services Resource Manager. It Is Used For
v Files Related Services Like Quota Management,
v Sharing
v File Screening
v Storage Report Management
v Classification Management
Ø Quota Is A Services Which Is Used To Implement Security At Any Drive Or Folder.
Ø There Are Two Types Of Quota Are:-
·        Soft Quota And Hard Quota
·        Soft Quota-When We Configure Soft Quota At Any Place It Will Inform You That You Have Reached The Specified 40gb Threshold You Have To Stop Writing Data Immediately By Order Of Admin But You Can Use It More Then 40gbown Wish.
·        Hard Quota-When We Configure Hard Quota At Any Place It Will Inform You When You Have Reached The Specified Threshold 40 GB Now You Can’t Use It More.
Ø Sharing-Is A Services Which Is Used To Share Our Nay Data Within The Network.
Ø File Screening-Is A Server Based Operating System Feature It Is Used Configure Any Drive Any Folder As Own Wish Like If We Like To Configure A Folder Who Copy Only Some Files Format, Types=Mp3 Or Text. So We Have To Configure File Screening Now That Folder Contain Only Mp3 And Text Files Types Nothing Else.
Ø Storage Report Management-By Configuring This We Can Know What Types Of Data Have Contain A Specified Drive Of Folder. And We Can Also Ignore Any File Format Who Have To Neglect.

To configure go to administrative tools – server manager – roles- file services –file services resource manager.

Know FSRM Learn Server

FSRM

                                    Installing File Server Resource Manager(Fsrm)
To Control And Manage The Type Of Data Stored On File Server And Have The Report.
Like Setting Up Volume Monitor Option Etc. Make Report Viewer By Setting Your Threshold.
Start>Administrative Tools >Server Manager>Roles>Expand It>Then Click On File Server>Add Role Services
>Click On Selected Drive>Then Click On Option>Where You Can Setup The Threshold And Services Report.>Ok>Next>Next>Finish.

You can alsos create quota,file screening,storage report as per as use.                       

Know Group Policy Learn Server

Group Policy

Is a service or feature which is used to implement different service policy at user group Ou and domain.
v Inheritance-when we implement any policies at domain it get auto applied to all the old and new user group and Ou.
ü Ignoring inheritance-when we use block inheritance feature policies get filter.
ü From-gpmc.msc=edit-user-user configuration-policies-all setting.
ü From that group-right click-select-inheritance.

v Enforced-is used to pally any GPO setting if any one inheritance it but by this feature break all the rules and get applies to every objects.