Network Kings

Multi-Access Year Deal

Get 55+ courses now at the best price ever! Use Code:    MULTIYEAR

d :
h :
m

connecting two lans in different locations

Hi welcome to network kings, this tutorial is to connecting two lans in different locations, so suppose you have two locations or you can say two switches and connected to one ISP ( CISCO router )

First Connect both the switches with Cisco Router.

1. Chandigarh Branch ?Gateway ip address 192.168.1.100

2. Gurgaon Branch Gateway ip address 192.168.5.100

3. Chandigarh Lan Subnet 192.168.1.0/24

4. Gurgaon Lan Subnet 192.168.20/24

Now in 1st image i am configuring ip address to PC’s

In 2nd image the most important one is to configure router interafaces
int fa1/0 i am giving 192.168.1.100 chandigarh gateway
on fa0/0 i am giving 192.168.5.100 gurgaon gateway

in 3rd image you can see we can able to ping from chandigarh pc to Gurgaon PC.

Thanks & Share .

cisco command line basics

Hi, Today lets check, The cisco command line basics

1.The “?”

You can use the command in many ways. First, use it when you don’t know what command to type. For example, type at the command line for a list of all possible commands. You can also use it when you don’t know what a command’s next parameter should be.

2. show running-configuration

The show running-config command shows the router, switch, or firewall’s current configuration. The running-configuration is the config that is in the router’s memory. You change this config when you make changes to the router. Keep in mind that config is not saved until you do a copy running-configuration startup-configuration. This command can be abbreviated?sh?run.

3.?show interface

The?show interface?command displays the status of the router’s interfaces. Among other things, this output provides the following:

  • Interface status (up/down)
  • Protocol status on the interface
  • Utilization
  • Errors
  • MTU

4.?no shutdown

The?no shutdown? command enables an interface (brings it up). This command must be used in interface configuration mode. It is useful for new interfaces and for troubleshooting. When you’re having trouble with an interface, you may want to try a?shut?and?no shut.

5. show ip route

The?show ip route?command is used to show the router’s routing table. This is the list of all networks that the router can reach, their metric (the router’s preference for them), and how to get there.

6. show version

The?show version?command gives you the router’s configuration register (essentially, the router’s firmware settings for booting up), the last time the router was booted, the version of the IOS, the name of the IOS file, the model of the router, and the router’s amount of RAM and Flash. This command can be abbreviated?sh?ver.

7. debug

The?debug?command has many options and does not work by itself. It provides detailed debugging output on a certain application, protocol, or service. For example,?debug ip route?will tell you every time a router is added to or removed from the router.

Connecting PC’s in packet Tracer

Hi,
This Tutorial is to connect two different PC in Packet tracer, If you are not familiar with OSI model basics, go to our CCNA OSI Model video on youtube ” OSI network kings ” ,

SO for example

Pc1 ———————————connected to —————————-PC2

pc1 – 192.168.1.1

pc2 – 192.168.1.2

Points to Remember,

1. You can only assign Class A, Class B, Class C ?ip address.

2. Range between 1 – 229

3. You cannot assign all host value 0 , and 1 too, It means you cannot assign Network ID and broadcast ip address.

Lets start

ccie training in india

ccie training in india

CCIE Certification Examination is acknowledged as the most confounded and most-looked for confirmation that diversions numerous individuals. They know beyond all doubt that this accreditation might carry great cash to their business as well as present to them the to victory.? Once you get the CCIE Training and passed, then you are now acknowledged as a master. It is quite known worldwide and when you get this sort of confirmation, you get incredible notoriety in any field of Information Technology.

This confirmation does not oblige anybody to have a formal preparing from any Cisco-identified organization. For the individuals who are intrigued, they should just have high comprehension level regarding the matter of closure to-end systems administration, and the various intricacies that are identified with it. Active preparing might be truly accommodating for the individuals who are intrigued to claim this sort of accreditation.

Reach of Salaries

Read more

Top 10 IT certifications of 2014

Top 10 it certifications of 2014

1. PMI Project Management Professional (PMP)

With a normal twelve-month compensation of $101,695, the PMP confirmation from the Project Management Institute (PMI) association beat the agenda of most noteworthy paying certificates for the present year.

Read more

Basics of networking

SOME BASIC THINGS BEFORE STARTING CCNA !

Lets Exercise

ping :– packet internet gopher it uses icmp ( internet control message protocol)? protocol For verification the other device is reachable to me or not?? ipconfig :– to check the ip address of a computer ipconfig /all :– to check the ip address + mac address getmac :-? to check the mac address of a computer ?netstat :– to check the session’s nslookup :– to check the all servers of a website arp -a? :– to check arp table arp ?d :– to delete arp table ( run as administrator) ? TO check public ip ? Visit :www.whatismyipaddress.com? to check your public ip ??????????? ? To assign address to your PC ? 1.windows button +? R??? 2. type? ?ncpa.cpl? to go to your network connections 3 choose your lan adapter and go to properties and click on IPV4 HUB

  • ALWAYS do Broadcast
  • Layer 1 device
  • Shared bandwidth
  • Less no of ports
  • Doesn?t learn mac address?

SWITCH

  • which connects two or more computers together
  • Many no of ports
  • Learn mac address
  • Two types of switch :-
  • Manageble switch and unmanageable switch
  • Layer 2 devices, datalink layer ( mac address )

ROUTER:

  • It is an internetworking device used to connect two or more different networks
  • It works on layer 3 i.e. network layer
  • It Performs Routing

?

  • Network Basics: The Definition of a Static IP Address
  • Why are ARP queries sent in a broadcast frame? Why is the response sent with a specific destination MAC address?
  • Understanding Public IP Addresses
  • Layer 2 ARP spoofing attack
  • Troubleshooting

What is networking?

What is Networking?

What is a network anyway?

A network is just a collection of devices and end systems connected to each other and able to communicate with each other. These could be computers, servers, smartphones, routers, etc. A network could be as large as the internet or as small as your two computers at home

Sharing files and a printer.

Some of the components that make up a network:

Personal Computers (PC): These are the endpoint of your network, sending and receiving data.

Interconnections: These are components that make sure data can travel from one device to another, you need to think about:

Network Cards: they translate data from your computer in a readable format for the network.

Media: network cables, perhaps wireless.

Connectors: the plug you plug in your network card.

Switches: These boxes are network devices that provide a network connection for your end devices like PCs.

Routers: Routers interconnect networks and choose the best path to each network Destination.

TYPES of APPLICATIONS

Batch applications

File transfers like FTP, TFTP, perhaps an HTTP download. Could be a backup at night.

No direct human interaction.

High bandwidth is important but not critical.

Interactive applications

Human-to-Human interaction

Someone is waiting for a response, so response time (delay) is important

Real-time applications

Also Human-to-Human interaction

VoIP (Voice over IP) or live video conferencing.

End-to-end delay is critical

What is Loopback ?

Loopback?(loop-back) refers to the routing of electronic signals, digital data streams, or flows of items back to their originating devices or facilities without intentional processing or modification. This is primarily a means of testing the transmission or transportation infrastructure.

Example applications:

  • A communication channel with only one?endpoint. Any message transmitted by such a?channel?is immediately and only received by that same channel.
  • Performing?transmission?tests of?access?lines from the serving?switching center, which usually does not require the assistance of personnel at the served terminal.
  • Testing between stations (not necessarily adjacent) where in two lines are used, with the test being done at one station and the two lines interconnected at the distant station. Commonly called?loop around?when the interconnecting circuit is accessed by dialing.
  • A?patch cable, applied manually or automatically, remotely or locally, that facilitates a loop-back test.

Checksum and CRC

Checksum and CRC

Another secure-computing need is to ensure that the data has not been corrupted during transmission or encryption. There are a couple of popular ways to do this:

Checksum– Probably one of the oldest methods of ensuring that data is correct, checksums also provide a form of authentication because an invalid checksum suggests that the data has been compromised in some fashion. A checksum is determined in one of two ways. Let’s say the checksum of a packet is 1 byte long. A byte is made up of 8 bits, and each bit can be in one of two states, leading to a total of 256 (28?) possible combinations. Since the first combination equals zero, a byte can have a maximum value of 255.

  • If the sum of the other bytes in the packet is 255 or less, then the checksum contains that exact value.
  • If the sum of the other bytes is more than 255, then the checksum is the remainder of the total value after it has been divided by 256.

Let’s look at a checksum example:

  • Bytes total 1,151
  • 1,151 / 256 = 4.496 (round to 4)
  • 4 x 256 = 1,024
  • 1,151 – 1,024 = 127 checksum

Cyclic Redundancy Check (CRC) – CRCs are similar in concept to checksums, but they use polynomial division to determine the value of the CRC, which is usually 16 or 32 bits in length. The good thing about CRC is that it is very accurate. If a single bit is incorrect, the CRC value will not match up. Both checksum and CRC are good for preventing random errors in transmission but provide little protection from an intentional attack on your data. Symmetric- and public-key encryption techniques are much more secure.

All of these various processes combine to provide you with the tools you need to ensure that the information you send or receive over the Internet is secure. In fact, sending information over a computer network is often much more secure than sending it any other way. Phones, especially cordless phones, are susceptible to eavesdropping, particularly by unscrupulous people with radio scanners. Traditional mail and other physical mediums often pass through numerous hands on the way to their destination, increasing the possibility of corruption. Understanding encryption, and simply making sure that any sensitive information you send over the Internet is secure (remember the “HTTPS” and padlock symbol), can provide you with greater peace of mind.

What is packet tracer ?

What is packet tracer ?

For Students

Welcome to the world of computer networking. Packet Tracer can be a fun, take-home, flexible piece of software to help with your CCNA studies, allowing you to experiment with network behavior, build models, and ask “what if” questions. We hope that Packet Tracer will be useful to you whatever your goals are in networking, be they further education, certification, employment, or personal fulfillment. We want to emphasize how important it is for you to also gain in-person, hands-on experience with real equipment as part of preparing to join the community of networking professionals.

For Instructors

Packet Tracer is a simulation, visualization, collaboration, and assessment tool for teaching networking. Packet Tracer allows students to construct their own model or virtual networks, obtain access to important graphical representations of those networks, animate those networks by adding their own data packets, ask questions about those networks, and finally annotate and save their creations. The term “packet tracing” describes an animated movie mode where the learner can step through simulated networking events, one at a time, to investigate the microgenesis of complex networking phenomena normally occurring at rates in the thousands and millions of events per second.