Posts

What is RAID and Types of RAID with benefits

Image
What is RAID ( Redundant Array of Independent Disks)   and Types of RAID with benefits Raid is a data storage technology, which uses striping, mirroring, or parity to store data. Raid technology combines multiple physical disks into a single logical unit.                                                                            Disk Management Screenshot A spanned volume is a type of disk configuration that combines space from multiple physical drives into a single logical volume. Unlike RAID, it does not provide redundancy. Data is written sequentially across the drives, starting with one and moving to the next when full. It's useful for maximizing storage capacity but lacks fault tolerance—if one drive fails, all data is lost. ++++++++++++++++++++++++++++++...

Mapping a network drive using Group Policy Preferences and Item-Level Targeting

Image
  Mapping a network drive using Group Policy Preferences and Item-Level Targeting  It is a way to automatically connect a network drive for users or computers based on certain conditions or criteria. Here are the steps to map a network drive using this method: First of all, create one folder in your PDC or DC like: Sales-Group-Data share this folder, and give full control permission to sales group apply and copy the share folder link before close it. Create a New Group Policy Object (GPO): In the Group Policy Management Console (GPMC), create a new GPO or edit an existing one. Navigate to the Preferences section: In the GPO, go to the Preferences section, expand the Windows Settings, and then click on "Drive Maps." Create a new Drive Map: Right-click on "Drive Maps" and select "New > Mapped Drive." Configure the Drive Map Settings: In the "Action" dropdown, select the desired action (e.g., "Create," "Update," or "Delet...

Domain User Can't login issue, How to solve it?

Domain User Can't login issue, How to solve it? The error message you are encountering typically indicates a permissions issue related to Remote Desktop Services. Here are a few potential reasons for this message and steps you can take to resolve it: User Permissions: The domain user you are trying to log in with may not have the necessary permissions to access the machine via Remote Desktop. Ensure that the user is part of the "Remote Desktop Users" group on that computer or has the necessary permissions configured. To check permissions: Log in to the machine with an account that has admin privileges. Right-click on "This PC" or "Computer" and select "Properties." Click on "Remote settings" on the left. In the "Remote Desktop" section, click on "Select Users" and add the user to the list. Remote Desktop Configuration: Ensure that Remote Desktop is enabled on the target machine. Go to "System Properties...

What is Windows Deployment Services (WDS)? How to set up and use WDS?

What is Windows Deployment Services (WDS)? How to setup and use WDS?  Windows Deployment Services (WDS) is a network-based installation tool from Microsoft for deploying Windows operating systems. It's primarily used to automate the installation of Windows across large numbers of computers, reducing the time and effort required to install the operating system manually. Here are the full steps to set up and use WDS: Prerequisites Active Directory: The server running WDS needs to be a member of an Active Directory domain. DHCP: Ensure a DHCP server is available for client computers to receive IP addresses. DNS : Domain Name System service is required for WDS. NTFS Partition : The WDS server must have an NTFS file system on the image store partition. Setting Up Windows Deployment Services 1. Install WDS Role Open Server Manager. Click on "Add roles and features". Select "Role-based or feature-based installation". Choose your server from the server pool. In the Se...

Network Load Balancing

Image
Network Load Balancing:                    Youtube Link:   In short, NLB stands for Network Load Balancer. It is a type of load balancer that operates at the transport layer (Layer 4 - TCP/IP) in the OSI ( Open Systems Interconnection) model and is used to distribute network traffic across multiple servers to optimize resource use (Web server) , maximize throughput, reduce latency, and ensure high availability and reliability of applications or services. Network Load Balancers are particularly effective for managing large volumes of traffic and are capable of handling millions of requests per second. Network Load Balancers (NLB) offer several benefits that are crucial for optimizing the performance and reliability of networked applications and services. Here are some key advantages: High Availability and Reliability : NLBs distribute incoming traffic across multiple servers, ensuring that if one server fails, others can handle the ...

AD User Profile

Image
AD User Profiles:    AD User Profiles An AD (Active Directory) User Profile is a collection of user-specific settings and data that are stored centrally on a network server. This allows users to maintain their personalized settings, such as desktop layout, color schemes, and application preferences, across multiple computers.  Types of User Profiles:  1. Local Profile:    User profile stored locally on the device. Changes made to the profile are only applied to that specific device. Simplest type of profile, but lacks synchronization capabilities.   2. Roaming Profile:   User profile that is synchronized between devices. Allows users to maintain their personalized settings across different computers. Requires network connectivity for synchronization.  3. Mandatory Profile:  System-defined profile that cannot be modified by the user. Enforces a consistent user experience across all devices. Useful for standardized environments w...

How to understand OSI model in Nepali.

Image
  https://www.youtube.com/watch?v=ImxCi2ec9qM OSI Model: 1) Application layer :  key word is : interaction between human using application like: browser, any application like chat software, zoom, teams etc 2) Presentation layer :  key word - translates the date in correct format  : Like: video file:mp4, avi | audio       file: mp3, wav | image file : jpeg, png, gif etc | document file : doc,.xls, txt etc 3) Session layer :  create and maintain the session - time | key word: = timeframe the bank website will close automatically in 5 mins. | facebook will close within 30 mins automatically. | For security we need sessions. 4) Transport layer:   source to destination delivery of data | key word : delivery of data | TCP and UDP          TCP : Transmission control protocol : Get Confirmation (reliable)| 3 way handshake | Phone call/ browsing the internet page. (TCP)      ...