Monday, 30 September 2013




Less Infrastructure, More Intelligent Servers

Cisco Unified Computing System (UCS) and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture. This unique architecture enables end-to-end server visibility, management, and control in both bare metal and virtual environments, and facilitates the move to cloud computing and IT-as-a-Service with Fabric-Based Infrastructure.

CISCO ROUTERS

CISCO ROUTER SERIES


The industry’s most widely deployed universal services aggregation router for enterprise and service provider edge applications, the Cisco 7200 Series offers:
  • Exceptional price/performance: The new NPE-G2 Network Processing Engine aggregates services at up to 2 Mpps
  • A wide range of connectivity options and numerous features including serviceability and manageability
  • Increased VPN performance with the new VPN Services Adapter
  • Increased scalability and flexibility with the new Port Adapter Jacket Card

Benefits:

  • WAN edge: Award-winning quality of service (QoS) feature performance
  • Broadband aggregation: Up to 16,000 PPP sessions per chassis
  • Multiprotocol Label Switching (MPLS): Leading choice for provider-edge deployment
  • IP Security (IPsec) VPN: Scalable to 5000 tunnels per chassis
  • High-end customer premises equipment (CPE)
  • IP-to-IP gateway support: Provides a network-to-network interface point for signaling interworking (H.323, SIP), media interworking, address and port translations (privacy and topology hiding), billing and CDR normalization, and bandwidth management (QoS marking using TOS)
  • Voice, video, and data integration: TDM-enabled VXR chassis and voice port adapters
  • Modular design: 3RU footprint with broad range of flexible, modular interfaces (from DS0 to OC-3)
  • Flexibility: Support for Fast Ethernet, Gigabit Ethernet, Packet over SONET and more

Basic Concept of VLAN

Basic Concept of VLAN
VLAN(Virtual Local Area Network)What is this VLAN ? Why we are using VLAN? How to configure VLAN? all is explained here

VLAN! VLAN!! VLAN !!!

What is this VLAN ?
Why we are using  VLAN?
How to decide VLAN?
These are the question in my mind making storm… But when I took admission in RST forum. Vagish Sir cleared my all doubts about VLAN. So in this blog we will just focus on the “VLAN”
So 1st question comes to your mind that why VLAN???
As consider a company like Accenture or Cisco in which there are 10000 of PC`s  and they are connected on a network and  all are in same subnet. The windows operating system is working on each computer. So as the windows operating system is always broadcasting its every service and any new service. So if we consider that our all PC`s are in a same subnet so the every PC will sends its service broadcast and when it is coming towards a switch it will broadcast it we can`t use router as all PC`s are in a same subnet. Switch will divide only the collision domain and not the broadcast domain so switch will make a multiple copies of that and send to its every port and so if 1 switch has 24 ports then the 10000/24 equal to a approximately 400 switches are there in a network. Lets imagine that for every broadcast the switch will make multiple copies and send its to every port and so it creates very high no of frames flowing through the network and so if now any PC want to use network then the network is already having very large traffic.so such a high no. of frames present in a network causes :-
·            Degradation of switch performnce
·            Degradation of PC`s performance
·            Degradation of useful Bandwidth of a link
 so basically VLAN`s ARE USED TO CONTROL THE BROADCAST DOMAIN.
As so we divide the network in vlan, each vlan is having different subnet so for the communication between VLAN we use layer 3 switch or router.
We are doing VLAN configuration on a switch means what we are doing?
When we define a VLAN on a switch at that time we are actually dividing the switch in to the smaller swich virtually where these virtual  switchs are working in the different network (subnet).
From the following diagram you will get the concept …..


As we made VLAN`s so now each VLAN have its separate subnet so according to our basic principle the traffic between two subnet will route and traffic within a subnet will switch. A router or a layer 3 switch is necessary for communication between two VLAN`s.  





           How to decide that our which PC`s will be in one VLAN and which will be in the separate VLAN ???


These  is decided on the 80-20% rule .
This rule says that 80% traffic in a network should switch and 20% traffic should route.

As in a organization people which are in a same department talks more to each other and communicate more where as the people from different department will talk less to each other and communicate less to each other.
As we know switching is faster than routing. so the traffic within a department has to switch (as more traffic is there) and between the department should route (as less traffic is there).

So lets take a example that there is one company like cisco, in this company we have 4 different departments like engineering, Finance, Human resource and testing so as per our discussion we will keep the people from 1 department in a same VLAN so when they communicate then the traffic between them will switch but when communicate with other department (as they communicate with other department rarely ) so the traffic will route
Advantages of VLAN :-

·            To controls the broadcast domain

·            Use to provide security (it is actually a byproduct)

To provide security means not like the people from different can’t talk the can talk but their call or data will routed through a router so with the help of access list and some other way we can provide them the security. Some people think this is the main requirement of creating a VLAN but actually it is just a byproduct.(providing security to one department from other department doesn`t mean that they should not communicate to each other otherwise in above Cisco company example if a engineering dept. person can`t talk to testing dept. people then what is the use of the network)

All this is a basics of VLAN and after this we will see how the VLAN is configure on a cisco switch and can be extended on more than 1 switch in my next blog.If you have any doubt about VLAN you can ask it to me by comment. I will shortly publish my Blog on VLAN trunk port concept and VLAN Trunking Protocol (VTP). Thanks for reading. 

The following Diagram is added for the comment from himanshu to explain how broadcasting work in Switches on which VLAN is configured.


Sunday, 21 July 2013

HOW TO CREAT BACKDOOR IN WINDOW SEVEN

                                                               CREAT BACKDOOR
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
STEP 1.open c drive  (note:takebakeup of sethc for remove back door)
STEP 2.open windows folder
STEP 3.open system32
STEP 4.search sethc file
STEP 5.right click on sethc
STEP 6.run as administrator
STEP 7.go to properties of sethc
STEP 8.give full control to administrator
STEP 9.now search cmd copy it any drive and rename with sethc
STEP 10.then paste in syatem32 and replace with sethc
STEP 11. log off the syatem and press shift key 5 times.and now it opens command prompt.....you are ready to use it's  command prompt.then you can change anything in that syatem...
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

Thursday, 18 July 2013

Using Wine In Red Hat Linux

                              Using Wine In Red Hat Linux


Wine is a great tool for Linux users who want to install and run Windows applications under Linux. Tonight I decided to test Wine and therefore searched about downloading and installing Wine on my Red Hat Enterprise Linux. So its time for you to get ready for an eventful journey towards Wine.
The installation process is quite easy. Wine package is included in RHEL so all you need is to issue the following command:
  • yum install wine
Now just be patient till it get installed. Once you have it installed get an exe file to test Wine. So I downloaded Firefox8 and give it a try with Wine. Now open your terminal. Don’t try to run it from CLI mode. To run an exe issue the following command:
  • wine yourfilepath.exe( for example I issued wine /root/Desktop/Firefox\ Setup\ 8.0.exe
And what I see is that the installation process has begun. Wow! I am running exe files in Linux.
Running Windows Applications In Linux using Wine

Sunday, 14 July 2013

To Password Protect Folders with Folder Protector?




    Step 1. Select folders for protect
  • Copy Folder Protector (lockdir.exe) to the folder you want to protect or drag and drop the folder you want to protect in the operation window of Folder Protector for adding the folder to protect.
    step 2. Send Password to protect selected folder
  • Make settings in Settings window and then right-click on the folder and navigate to "Folder Protector" option to password protect it.
Protect
Step 3. Make settings to retrieve password.
  • a. Click on the ">>" Button on the right side of the main window.
    b. Type a password hint to help you remember your password.
  • Remember that anyone unprotected this folder will be able to see the password hint.
    c. Set an e-mail address to help you retrieve password. The program will remember this e-mail address if you click on "Save as default e-mail".
Step 4. Click "Protect" button to Protect folders

Part II. Unprotect a Folder

    Three different unprotection modes
  • Virtual Drive: Access your data in a virtual drive without extracting the data, which means the folder will be reprotected automatically as soon as you close the explorer window.
  • Temporary: Show a restore window on your taskbar after unprotection, which allows you restore protection easily.
  • Complete: Completely unprotect your folder. You need to run Folder Protector again and enter a new password to protect the folder if you wish to gain folder protection again.
  • Unprotect
    Temporary unprotection Window.
    Temporaray Unprotect

Saturday, 13 July 2013

RSA Algorithm Example


RSA Algorithm Example

  • Choose p = 3 and q = 11
  • Compute n = p * q = 3 * 11 = 33
  • Compute φ(n) = (p - 1) * (q - 1) = 2 * 10 = 20
  • Choose e such that 1 < e < φ(n) and e and n are coprime. Let e = 7
  • Compute a value for d such that (d * e) % φ(n) = 1. One solution is d = 3 [(3 * 7) % 20 = 1]
  • Public key is (e, n) => (7, 33)
  • Private key is (d, n) => (3, 33)
  • The encryption of m = 2 is c = 27 % 33 = 29
  • The decryption of c = 29 is m = 293 % 33 = 2
 

Copyright (c) 2010 NETWORK PLANET. Design by WpThemesExpert
Blogger Template by New Blogger Templates.