Network Kings

LIMITED TIME OFFER

$999 $499 only For All Access Pass Today! USE PROMO CODE : LIMITED

d :
h :
m

Connecting PC’s in packet Tracer

Hi,
This Tutorial is to connect two different PC in Packet tracer, If you are not familiar with OSI model basics, go to our CCNA OSI Model video on youtube ” OSI network kings ” ,

SO for example

Pc1 ———————————connected to —————————-PC2

pc1 – 192.168.1.1

pc2 – 192.168.1.2

Points to Remember,

1. You can only assign Class A, Class B, Class C ?ip address.

2. Range between 1 – 229

3. You cannot assign all host value 0 , and 1 too, It means you cannot assign Network ID and broadcast ip address.

Lets start

ccie training in india

ccie training in india

CCIE Certification Examination is acknowledged as the most confounded and most-looked for confirmation that diversions numerous individuals. They know beyond all doubt that this accreditation might carry great cash to their business as well as present to them the to victory.? Once you get the CCIE Training and passed, then you are now acknowledged as a master. It is quite known worldwide and when you get this sort of confirmation, you get incredible notoriety in any field of Information Technology.

This confirmation does not oblige anybody to have a formal preparing from any Cisco-identified organization. For the individuals who are intrigued, they should just have high comprehension level regarding the matter of closure to-end systems administration, and the various intricacies that are identified with it. Active preparing might be truly accommodating for the individuals who are intrigued to claim this sort of accreditation.

Reach of Salaries

Read more

Top 10 IT certifications of 2014

Top 10 it certifications of 2014

1. PMI Project Management Professional (PMP)

With a normal twelve-month compensation of $101,695, the PMP confirmation from the Project Management Institute (PMI) association beat the agenda of most noteworthy paying certificates for the present year.

Read more

Basics of networking

SOME BASIC THINGS BEFORE STARTING CCNA !

Lets Exercise

ping :– packet internet gopher it uses icmp ( internet control message protocol)? protocol For verification the other device is reachable to me or not?? ipconfig :– to check the ip address of a computer ipconfig /all :– to check the ip address + mac address getmac :-? to check the mac address of a computer ?netstat :– to check the session’s nslookup :– to check the all servers of a website arp -a? :– to check arp table arp ?d :– to delete arp table ( run as administrator) ? TO check public ip ? Visit :www.whatismyipaddress.com? to check your public ip ??????????? ? To assign address to your PC ? 1.windows button +? R??? 2. type? ?ncpa.cpl? to go to your network connections 3 choose your lan adapter and go to properties and click on IPV4 HUB

  • ALWAYS do Broadcast
  • Layer 1 device
  • Shared bandwidth
  • Less no of ports
  • Doesn?t learn mac address?

SWITCH

  • which connects two or more computers together
  • Many no of ports
  • Learn mac address
  • Two types of switch :-
  • Manageble switch and unmanageable switch
  • Layer 2 devices, datalink layer ( mac address )

ROUTER:

  • It is an internetworking device used to connect two or more different networks
  • It works on layer 3 i.e. network layer
  • It Performs Routing

?

  • Network Basics: The Definition of a Static IP Address
  • Why are ARP queries sent in a broadcast frame? Why is the response sent with a specific destination MAC address?
  • Understanding Public IP Addresses
  • Layer 2 ARP spoofing attack
  • Troubleshooting

What is networking?

What is Networking?

What is a network anyway?

A network is just a collection of devices and end systems connected to each other and able to communicate with each other. These could be computers, servers, smartphones, routers, etc. A network could be as large as the internet or as small as your two computers at home

Sharing files and a printer.

Some of the components that make up a network:

Personal Computers (PC): These are the endpoint of your network, sending and receiving data.

Interconnections: These are components that make sure data can travel from one device to another, you need to think about:

Network Cards: they translate data from your computer in a readable format for the network.

Media: network cables, perhaps wireless.

Connectors: the plug you plug in your network card.

Switches: These boxes are network devices that provide a network connection for your end devices like PCs.

Routers: Routers interconnect networks and choose the best path to each network Destination.

TYPES of APPLICATIONS

Batch applications

File transfers like FTP, TFTP, perhaps an HTTP download. Could be a backup at night.

No direct human interaction.

High bandwidth is important but not critical.

Interactive applications

Human-to-Human interaction

Someone is waiting for a response, so response time (delay) is important

Real-time applications

Also Human-to-Human interaction

VoIP (Voice over IP) or live video conferencing.

End-to-end delay is critical

What is Loopback ?

Loopback?(loop-back) refers to the routing of electronic signals, digital data streams, or flows of items back to their originating devices or facilities without intentional processing or modification. This is primarily a means of testing the transmission or transportation infrastructure.

Example applications:

  • A communication channel with only one?endpoint. Any message transmitted by such a?channel?is immediately and only received by that same channel.
  • Performing?transmission?tests of?access?lines from the serving?switching center, which usually does not require the assistance of personnel at the served terminal.
  • Testing between stations (not necessarily adjacent) where in two lines are used, with the test being done at one station and the two lines interconnected at the distant station. Commonly called?loop around?when the interconnecting circuit is accessed by dialing.
  • A?patch cable, applied manually or automatically, remotely or locally, that facilitates a loop-back test.

Checksum and CRC

Checksum and CRC

Another secure-computing need is to ensure that the data has not been corrupted during transmission or encryption. There are a couple of popular ways to do this:

Checksum– Probably one of the oldest methods of ensuring that data is correct, checksums also provide a form of authentication because an invalid checksum suggests that the data has been compromised in some fashion. A checksum is determined in one of two ways. Let’s say the checksum of a packet is 1 byte long. A byte is made up of 8 bits, and each bit can be in one of two states, leading to a total of 256 (28?) possible combinations. Since the first combination equals zero, a byte can have a maximum value of 255.

  • If the sum of the other bytes in the packet is 255 or less, then the checksum contains that exact value.
  • If the sum of the other bytes is more than 255, then the checksum is the remainder of the total value after it has been divided by 256.

Let’s look at a checksum example:

  • Bytes total 1,151
  • 1,151 / 256 = 4.496 (round to 4)
  • 4 x 256 = 1,024
  • 1,151 – 1,024 = 127 checksum

Cyclic Redundancy Check (CRC) – CRCs are similar in concept to checksums, but they use polynomial division to determine the value of the CRC, which is usually 16 or 32 bits in length. The good thing about CRC is that it is very accurate. If a single bit is incorrect, the CRC value will not match up. Both checksum and CRC are good for preventing random errors in transmission but provide little protection from an intentional attack on your data. Symmetric- and public-key encryption techniques are much more secure.

All of these various processes combine to provide you with the tools you need to ensure that the information you send or receive over the Internet is secure. In fact, sending information over a computer network is often much more secure than sending it any other way. Phones, especially cordless phones, are susceptible to eavesdropping, particularly by unscrupulous people with radio scanners. Traditional mail and other physical mediums often pass through numerous hands on the way to their destination, increasing the possibility of corruption. Understanding encryption, and simply making sure that any sensitive information you send over the Internet is secure (remember the “HTTPS” and padlock symbol), can provide you with greater peace of mind.

What is packet tracer ?

What is packet tracer ?

For Students

Welcome to the world of computer networking. Packet Tracer can be a fun, take-home, flexible piece of software to help with your CCNA studies, allowing you to experiment with network behavior, build models, and ask “what if” questions. We hope that Packet Tracer will be useful to you whatever your goals are in networking, be they further education, certification, employment, or personal fulfillment. We want to emphasize how important it is for you to also gain in-person, hands-on experience with real equipment as part of preparing to join the community of networking professionals.

For Instructors

Packet Tracer is a simulation, visualization, collaboration, and assessment tool for teaching networking. Packet Tracer allows students to construct their own model or virtual networks, obtain access to important graphical representations of those networks, animate those networks by adding their own data packets, ask questions about those networks, and finally annotate and save their creations. The term “packet tracing” describes an animated movie mode where the learner can step through simulated networking events, one at a time, to investigate the microgenesis of complex networking phenomena normally occurring at rates in the thousands and millions of events per second.

unistall software from cmd

unistall software from cmd

1. Open a command prompt.

2. Input?WMIC?and press Return. You will see a prompt that looks like this:
wmic:rootcli>

3. At the new prompt, execute the following command:
product get name

This will generate a list of installed applications.

4. At the prompt, execute the following command:
product where name="" call uninstall

where?application name?is the name of the program you wish to uninstall (use the exact name provided by the previously generated list).

For example, if I were wanting to uninstall Adobe Reader 9, my command would look like this:
product where name="Adobe Reader 9" call uninstall

vtp modes

VLAN Trunking Protocol (VTP) Server Mode

VLAN Trunking Protocol (VTP) server mode is the default VTP mode for all Catalyst switches. At least one server is required in a VTP domain to propagate VLAN information within the domain. We can create, add, or delete VLANs on a VTP domain VTP Server and change VLAN information in a VTP Server. The changes made in a switch in server mode are advertised to the entire VTP domain.

VLAN Trunking Protocol (VTP) Client Mode

VLAN Trunking Protocol (VTP) client mode switches listen to VTP advertisements from other switches and modify their VLAN configurations accordingly. A network switch in VTP client mode requires a server switch to inform it about the VLAN changes. We CANNOT create, add, or delete VLANs in a VTP client.

VLAN Trunking Protocol (VTP) Transparent Mode

VLAN Trunking Protocol (VTP) transparent mode switches do not participate in the VTP domain, but VTP transparent mode switches can receive and forward VTP advertisements through the configured trunk links.