IT Questions and Answers :)

Wednesday, August 21, 2019

What type of cloud service is cloud backup storage?

What type of cloud service is cloud backup storage?

  • SaaS
  • DaaS
  • PaaS
  • IaaS 
 What type of cloud service is cloud backup storage?

EXPLANATION

IaaS (Infrastructure as a Service)
This service is one of the most common services in the world. It includes providing the customer with rental computer resources in the form of a virtual infrastructure. Servers can include storage systems, virtual switches, and routers. This IT infrastructure is a complete copy of the physical environment.
Cloud-to-cloud backup, or C2C backup, is the practice of copying data stored on one cloud backup service, commonly referred to as software as a service (SaaS), to another cloud. Third-party cloud backup has gained popularity with businesses and home users because it takes the management and maintenance of hardware out of the equation for the customer. Initial capital expenditures (Capex) for additional hardware are not required, and overall initial costs are lower. Backups can be run automatically and without manual intervention

PaaS (Platform as a Service)
This service is also one of the main services. Consists of the fact that the customer receives a full-fledged virtual platform with various tools and services. The customer can customize such a platform according to his needs by making a software testing platform other than this, or by making a system for automating the control system, for example. This type of service is especially popular with software developers.
SaaS (Software as a Service)
It uses almost all people who have access to the Internet because the cloud service is currently considered the most common in the world. Such a service will result in the purchase of any software product on the internet at the customer’s disposal. An example is a Gmail mail service or a cloud version of 1C for example.
CaaS (Communication as a Service)
This service is to provide customers with various communication tools in the cloud. This can be telephone, services for the transfer of fast messages, or the organization of the video. In this case, all required software is available in the cloud provider.
CaaS (Service Container)
This service allows customers to work with containers using the cloud provider API or a custom web panel.
DRaaS (Disaster Recovery as a Service)
This service allows you to create disaster-resistant solutions using the cloud provider. The platform of the cloud service provider is also an platform alternative platform in which data on the customer’s main site is constantly replicated. When the client services fail, they start again in a few minutes. Such solutions are particularly suitable for companies with a large number of critical applications.
BaaS (Backup as Service)
This type of service ensures that customer data is backed up to the cloud of the provider. The cloud service provider not only provides a place to store backups to the customer, but also provides tools to provide fast and reliable backups. For the proper implementation of this service, the planning phase is important, with the parameters and depth of the archive and the capacity of the data transmission channels to be calculated.
BaaS (Back End as Service)
This cloud service provides the customer with a complete software development environment in the provider cloud. This model includes ready-made infrastructure functions and solutions that greatly simplify the work of software developers.
DBaaS (Database as a Service)
This cloud service is able to connect to databases in the cloud. The customer pays rent, depending on the number of users and the size of the base. It is worth noting that such a database will never fall because there is no free disk space.
MaaS (Monitoring as Service)
Such cloud services help organize the monitoring of IT infrastructure using the tools in the provider’s cloud. This is particularly important for companies whose infrastructure is geographically dispersed. This service enables you to centrally monitor all systems that have a single entry point.
DaaS (Desktop as a Service)
This service is to provide users with remote desktops. With this service, you can pay quickly and with minimum cost to organize a new office with a central workplace management. Also, one of the advantages of this service is the ability to work from any device that is particularly valuable to employees for business trips and enduring trips.
STaaS (Storage as a Service)
This service is to provide disk space in the cloud provider. At the same time for users this area will be a normal network folder or local disk. The power of this solution lies in advanced data security, as reliable storage systems operate in the cloud of the provider.
NaaS (Network as a Service)
This service allows you to organize a full-fledged, complex network infrastructure in the cloud provider. This service includes the use of routing tools, security organization, and various network protocols.
All of these cloud services are important for customers to remove certain tasks related to the organization of specific solutions from their shoulders and allow them to focus on their work. And, of course, given the intense use of these services, providers ensure the high speed and reliability of the services provided by using the most advanced technologies in their applications. The use of solutions at this level in a client’s local infrastructure is often unprofitable. Thus, cloud services help ordinary companies use tools at the enterprise level.




Share:

What is the command in Unix or Linux to terminate processes without having to log out or reboot (i.e., restart) the computer?

What is the command in Unix or Linux to terminate processes without having to log out or reboot (i.e., restart) the computer?

  • stop
  • quit or q
  • kill
  • taskkill 

 
What is the command in Unix or Linux to terminate processes without having to log out or reboot (i.e., restart) the computer?

EXPLANATION

In Unix and Unix-like operating systems, kill is a command used to send a signal to a process. By default, the message sent is the termination signal, which requests that the process exit. But kill is something of a misnomer; the signal sent may have nothing to do with process killing.

SOURCE

https://en.wikipedia.org/wiki/Kill_(command)

Share:

Tuesday, August 20, 2019

What does GUID refer to?

What does GUID refer to?

  • Globally Unique Identifier
  • Geographical User Information Database
  • Global User Identifier
  • Graphical User Interface Display 
What does GUID refer to?

EXPLANATION

Globally Unique Identifier, a unique 128-bit number that is produced by the Windows OS or by some Windows applications to identify a particular component, application, file, database entry, and/or user. For instance, a Web site may generate a GUID and assign it to a user's browser to record and track the session. A GUID is also used in a Windows registry to identify COM DLLs. Knowing where to look in the registry and having the correct GUID yields a lot information about a COM object (i.e., information in the type library, its physical location, etc.). Windows also identifies user accounts by a username (computer/domain and username) and assigns it a GUID. Some database administrators even will use GUIDs as primary key values in databases.

GUIDs can be created in a number of ways, but usually they are a combination of a few unique settings based on specific point in time (e.g., an IP address, network MAC address, clock date/time, etc.).

 

Share:

What is the Microsoft release version of Windows 7?

What is the Microsoft release version of Windows 7?

  • 7.0
  • 6.2
  • 6.0
  • 6.1 

What is the Microsoft release version of Windows 7?

EXPLANATION

Reference Table for Windows Version Numbers
Operating System Version Details Version Number
Windows 10 Windows 10 (1903) 10.0.18362
Windows 10 (1809) 10.0.17763
Windows 10 (1803) 10.0.17134
Windows 10 (1709) 10.0.16299
Windows 10 (1703) 10.0.15063
Windows 10 (1607) 10.0.14393
Windows 10 (1511) 10.0.10586
Windows 10 10.0.10240
Windows 8 Windows 8.1 (Update 1) 6.3.9600
Windows 8.1 6.3.9200
Windows 8 6.2.9200
Windows 7 Windows 7 SP1 6.1.7601
Windows 7 6.1.7600
Windows Vista Windows Vista SP2 6.0.6002
Windows Vista SP1 6.0.6001
Windows Vista 6.0.6000
Windows XP Windows XP2 5.1.26003

 

Share:

Which protocol is used to prevent switching and routing loops in networks?

Which protocol is used to prevent switching and routing loops in networks?

  • Spanning Tree Protocol (STP)
  • Point-to-Point Tunneling Protocol (PPTP)
  • Dynamic Trunking Protocol (DTP)
  • Point-to-Point Protocol (PPP) 
Which protocol is used to prevent switching and routing loops in networks?

EXPLANATION

What is Spanning Tree?

The Spanning Tree protocol is a networking standard, as defined by the IEEE in the 802.1d standard.  The purpose of Spanning Tree is to prevent loops in the LAN and to select the fastest network links, if there are redundant links in the network.  In the event that a link in the network goes down, Spanning Tree will failover to the alternate link, if one exists.


If this sounds like what a routing protocol does then you are on the right track. Routing protocols help devices route between WAN networks (prevent loops, use alternate paths, etc) at Layer 3.  Spanning Tree could be termed a Layer 2 routing protocol for a LAN because it performs the same functions but for an Ethernet network, regardless of IP addresses.  So, Spanning Tree is not an IP routing protocol but has some similar functions for the data-link layer (Layer 2).

How Spanning Tree works

Spanning Tree works by first using an algorithm to find redundant links in the LAN and selecting the best paths. Its initial goal is to put all links in either Forwarding or Blocking. In the end, the links without a redundant link and the best links with a redundant link would be in forwarding state. The redundant links that weren’t as good as the selected links would be in blocking state.
Spanning Tree cannot use multiple links to the same destination. There is no load-sharing feature with Spanning Tree. Any redundant link that is not as preferred is blocked (essentially shut down) until the primary link goes down.
Because Spanning Tree is a complex protocol, this article won’t cover every possible feature. We will, however, give you a solid overview of the protocol and its process.
The three criteria Spanning Tree uses to decide if an interface should be in forwarding state are:
  • All interfaces on the root bridge are put in forwarding state.
  • For other bridges that are not the root bridge, the port that is closest to the root bridge is put in forwarding state.
  • The bridge with the lowest administrative distance to the root bridge is called the designated bridge. The Ethernet interface on the designated bridge is called the designated port. That port is put into forwarding state.
But how is the root bridge elected? The root bridge is elected based on bridge ID (usually the MAC address) and a priority. By default, all priorities are the same so, by default, the switch with the lowest MAC address will become the root bridge.
How is the lowest administrative cost to the root bridge calculated? This is based on the speed of the links across the LAN, to get to that root bridge. STP uses default port costs to calculate this. These port costs can be overridden by an administrator. Here are the default STP port costs:
  • 10Mb link – Cost is 100
  • 100Mb link – Cost is 19
  • 1Gb link – Cost is 4
  • 10Gb link – Cost is 2
The costs shown are revised costs from the original STP default port costs. The IEEE did not anticipate the massive increase in speed now offered by Ethernet. Because of this 1Gb and 10Gb links could not be accommodated by the old default costs and the costs had to be revised.

How does STP prevent loops?

Because the “best ports” are put into forwarding state and the other ports are put into blocking state, there are no loops in the network. When a new switch is introduced to the network, the algorithm and port states are recalculated to prevent a new loop.

What happens when a link goes down?

Switches communicate with a BPDU (bridge protocol data unit) every 2 seconds. If the remote switch doesn’t respond, it is assumed that that switch (and its links) are down and the Spanning Tree algorithm is recalculated.

What are the STP port states?

Whenever a new port is enabled, Spanning Tree goes through the following port states to get that port to be either forwarding or blocking. They are:
  • Blocking – does not forward any frames but still receives BPDU’s from other switches
  • Listening – same as blocking but it is beginning its transition to forwarding frames. Unlike Blocking, in Listening mode, the port will send BPDU’s. 
  • Learning – the second state in the transition to frame forwarding. In this state, the switch receives MAC address information from devices on this switch port.
  • Forwarding – transmits and receives frames. This is the normal state for a port.
  • Or, Disabled – the disabled state means that the switch port is administratively disabled.

 

Share:

Popular Posts