-->
Showing posts with label network management. Show all posts
Showing posts with label network management. Show all posts

Friday, March 16, 2012

Route Dedication


Box forwarding entails 2 features:
Changing perform

The road dedication perform may be the procedure for the way the router decides that road to make use of whenever forwarding the box. To look for the greatest route, the actual router queries it's redirecting desk for any system tackle which fits the actual packet's location IP tackle.

Among 3 route determinations outcomes out of this research:

Straight Linked System -- When the location IP tackle from the box goes to some gadget on the system that's straight attached to among the router's interfaces, which box is actually submitted straight to which gadget. Which means that the actual location IP tackle from the box is really a web host tackle on a single system because this particular router's user interface.

Remote control System -- When the location IP tackle from the box goes to some remote control system, then your box is actually submitted to a different router. Remote control systems may just end up being arrived at through forwarding packets to a different router.

Absolutely no Path Decided -- When the location IP tackle from the box doesn't fit in with whether linked or even remote control system, and when the actual router doesn't have the default path, then your box is actually thrown away. The actual router transmits a good ICMP unreachable information towards the supply IP tackle from the box.

Within the very first 2 outcomes, the actual router re-encapsulates the actual IP box to the Coating two information hyperlink body structure from the leave user interface. The kind of Coating two encapsulation is dependent upon the kind of user interface. For instance, when the leave user interface is actually FastEthernet, the actual box is actually exemplified within an Ethernet body. When the leave user interface is really a serial user interface set up with regard to PPP, the actual IP box is actually exemplified inside a PPP body.

The next area shows this method.

Wednesday, March 14, 2012

What's Convergence?







Convergence is actually whenever just about all routers' redirecting furniture are in a situation associated with regularity. The actual system offers converged whenever just about all routers possess total as well as precise details about the actual system. Convergence period may be the period it requires routers to talk about info, determine greatest pathways, as well as revise their own redirecting furniture. The system isn't totally operable before system offers converged; consequently, the majority of systems need brief convergence occasions.

Convergence is actually each collaborative as well as impartial. The actual routers reveal info with one another however should individually determine the actual effects from the topology alter by themselves paths. Simply because they create a good contract using the brand new topology individually, they're believed to converge about this general opinion.

Convergence qualities range from the pace associated with distribution associated with redirecting info and also the computation associated with optimum pathways. Redirecting methods could be ranked in line with the pace in order to convergence; the actual quicker the actual convergence, the greater the actual redirecting process. Usually, TEAR as well as IGRP tend to be sluggish in order to converge, while EIGRP as well as OSPF tend to be quicker in order to converge.

Monday, March 12, 2012

Ccleaner






welcome to my blog Nework  computer how to couriger the ereurs on your PC? then I preferto use the program very simple and effecase, I think all the connaisser. is Ccleaner : Herein this video I explain how to use it so good ...
and you can download here

Monday, March 5, 2012

Adding a Connected Network to the Routing Table




Simply because suggested in the earlier component, because a router's user interface is without a doubt designed that have an IP home address and even subnet cover, which will user interface develops into a number at which will interact. Just like, after the FastEthernet 0/0 user interface at R1in that body is without a doubt designed considering the IP home address 192. 168. 1. 1 additionally, the subnet cover 255. 255. 255. 0, that FastEthernet 0/0 user interface develops into an affiliate belonging to the 192. 168. 1. 0/24 interact. Presents that can be linked to the exact same LAN, enjoy PC1, also are designed that have an IP home address which will is one of the 192. 168. 1. 0/24 interact.

Because a HOME PC is without a doubt designed along with a a lot IP home address and even subnet cover, that HOME PC applications that subnet cover to figure out everything that interact the application at present is supposed to be to help you. This is often achieved via the computer system ANDing that a lot IP home address and even subnet cover. An important router applications the exact same reasoning once a powerful user interface is without a doubt designed.

An important HOME PC is generally designed along with a particular a lot IP home address so it primarily is known for a particular interact user interface, in most cases a powerful Ethernet NIC. Routers contain many different interfaces; so, each individual user interface will have to be an affiliate to a distinctive interact. With the body, R1 is known as a person in a few distinctive networking sites: 192. 168. 1. 0/24 and even 192. 168. three. 0/24. Router R2 is in addition an affiliate in a few networking sites: 192. 168. three. 0/24 and even 192. 168. 3. 0/24.

Once the router's user interface is without a doubt designed additionally, the user interface is without a doubt induced considering the very little shutdown command line, that user interface have got to get a insurance company indicator as a result of some other apparatus (router, go, main, . . .. )#) until the user interface declare is viewed "up. inch As the user interface is without a doubt "up, inch that interact of this user interface is without a doubt put onto that redirecting bench to provide a straightaway interconnected interact.

Well before any specific static and compelling redirecting is without a doubt designed for the router, that router primarily is aware of specific to it straightaway interconnected networking sites. Many are just one networking sites that can be showcased with the redirecting bench up to the point static and compelling redirecting is without a doubt designed. Straightaway interconnected networking sites can be in major worth designed for redirecting preferences. Static and even compelling territory won't be able to be found with the redirecting bench without getting a router's possess straightaway interconnected networking sites. That router won't be able to distribute packets over a powerful user interface in cases where which will user interface is simply not let that have an IP home address and even subnet cover, nearly as an important HOME PC won't be able to distribute IP packets over the nation's Ethernet user interface in cases where which will user interface is simply not designed that have an IP home address and even subnet cover.

Sunday, March 4, 2012

ho to open the port about retour Dlink





hello, welcome in my blog Network Course im giv you that video , this is method do you us bout opening the port about retours type Dlink gap enjoyable:

Friday, March 2, 2012

virtuel-router-manager-v-0.9-beta











welcome  to you in my  blog Network course  this spring gift program makes any computer router or  router virtuel.
version : 0.9

Friday, February 24, 2012

network Representetion





When conveying complex information such as the network connectivity and operation of a large internetwork, it is helpful to use visual representations and graphics. Like any other language, the language of networking uses a common set of symbols to represent the different end devices, network devices and media. The ability to recognize the logical representations of the physical networking components is critical to being able to visualize the organization and operation of a network. Throughout this course and labs, you will learn both how these devices operate and how to perform basic configuration tasks on these devices.


Network Interface Card - A NIC:   or simply LAN adapter, increases the bricks-and-mortar link with any networking within the DESKTOP or simply many other hold equipment. Any newspaper and tv devices any DESKTOP into the marketing web equipment connects right into any NIC.



Physical Port - :The connection or even electric outlet on the social networking gadget in which the press is actually attached to a number or even additional social networking gadget.
interface:Specific plug-ins with an internetworking gadget which connect with person systems. Simply because routers are utilized in order to interconnect systems, the actual plug-ins on the router tend to be known system interfaces.


Wednesday, February 22, 2012

configure a conventional ACL








Before commencing to help you configure a conventional ACL, you might look at very important ACL creative concepts blanketed on Component 1.

Keep in mind that whenever website traffic makes that router, it will be versus ACL statement using the arrangement the fact that the entryways develop with the router. That router is constantly on the operation that ACL statement up to the point these have an important suit. That's why, you need to have quite possibly the most used often ACL connection in first place on that catalog. In cases where very little match ups you find after the router stretches to the top belonging to the catalog, that website traffic is without a doubt turned down considering ACLs receive an intended not allow for a lot of website traffic not even gathering some researched critical elements. An important single-entry ACL through a single not allow connection comes with the impression in denying every website traffic. You'll want an grant proclamation during an ACL and every website traffic is without a doubt blacklisted.

Just like, each of the ACLs (a single and even 102) with the body enjoy the equivalent impression. Interact 192. 168. 10. 0 might be granted access access to interact 192. 168. 50 even while 192. 168. 11. 0 couldn't end up left.

Friday, February 10, 2012

the role of DNS (Domain Name System)











In this presentation, you will discover what is the role of DNS (Domain Name System) in the network infrastructure. At the end of this presentation, you will be able to do the following: explain the role and benefits of DNS in the network infrastructure:

Sunday, January 29, 2012

List of manufacturers of hardware wireless



Greetings all Orbiter site and wish to obtain and below you ,in this post give you a list consisting of the most famous companies selling hardwareof wireless:

      Avaya
      Alvarion
      Aruba Networks
      Atheros
      Cisco
      Ceragon Networks
      D-Link
      HP
      Linksys
      Meraki
      Motorola
      Proxim
      Tall Umbrella
      Tropos
      Xirrus
      ZyXEL

Wednesday, January 25, 2012

Acer unveils cloud storage service Acer Cloud within the activities of the CES


Greetings all tracker website recently has unveiled Acer service AcerCloud cloud storage as part of the conference of CES 2012.

The new service will provide the means to store multiple files and for all Acer computers for the future.

The company has disclosed PicStream service that allows to store and share images between devices Acer, as well as the same thing with the custom service AcerCloud Docs to store documents.

One service that Acer unveiled by Always Connect service, which you can awake the computer or transfer files from your laptop or your Tablet PC.

Clear.fi well as service, which allows the transmission of the cloud to any device.

Tuesday, January 24, 2012

the 802.11 ac gigabit wireless networks at full speed ahead. site course network


a report from IMS Research, the first products based on the standard wireless network 802.11ac, expected later this year, will receive a warm welcome. IMS estimates that during 2012 this year alone, more than 3 million products 802.11ac will be marketed, including routers and laptops compatible with the upcoming wireless standard. "It's a very positive start," said Filomena Berardi, senior analyst at IMS markets.

Retailers should offer the first products compatible with standard Wireless 802.11ac by the end of the year. "At the Consumer Electronics Show (CES) held in Las Vegas last week, we have seen Chipset 802.11ac and routers, and it will not take long to find in the market for laptops equipped with 802.11ac standard. They will be even faster in the majority, "said the analyst. According to IMS, the technology will spread rapidly and lead the firm in 2016, more than 400 million devices displaying the standard will be delivered. "The gigabit wireless at full speed ahead," said IMS.


Higher transfers to Gigabit in theory of course

The standard 802.11ac offer higher transfer rates (up to 1.3 Gigabit / s in theory) than those permitted by the 802.11n standard, including through the use of a wider spectrum and technology to more advanced antenna. But access to these performances will cost. "Businesses will acquire new routers and new customers WiFi access points, as the existing circuits can not be upgraded to handle the standard 802.11ac," according to Aruba Networks. That does not stop to think that technology will still be very successful.
However, all products will not benefit from the new standard when it becomes available. "The first 802.11ac smartphones will not arrive before 2014, mainly due to the potential increase in costs that might induce and also for design issues," said IMS. However, smartphones and other routers customers will still be able to access WiFi networks 802.11n, since most access points will be able to handle both standards at the same time, the band that uses 802.11n frequency of 2.4 GHz and 5 GHz 802.11ac that.

Despite unfavorable economic conditions, companies spend more money in WiFi networks. The overall industry revenue increased by over 20% during the third quarter, compared to the same period last year. According to market research conducted by the firm Dell'Oro Group, this increase is largely due to a 40% increase in sales for the company.

From the site: source


Versions of HTTP


 A warm greeting to all visitors to site course network HTTP is at HTTP/1.1 version. Prior to this release, there were two others: HTTP/0.9 and HTTP/1.0. HTTP/1.0 is certainly the most common version on the Internet. When we give the versions of HTTP, it gives "HTTP /" followed by the protocol version.
When connecting to a server we should say a priori what version of HTTP is to talk to him. By default, if nothing is said, using HTTP/0.9. This is what happened in the example above. When asked to use a version of HTTP that the server does not implement, it returns the first version of HTTP it will use for the rest of the transmission. It is ultimately the customer to ensure that he will understand what the server will respond.
We see that the server's response is more complicated than before, and it contains mainly additional data. These additional data for both the client and the server are specified by so-called guidelines. For example, "Content-Type" is a directive that specifies the format of the resource returned (here, plain text).

Monday, January 23, 2012

TCP (Transmission Control Protocol, Protocol Transmission Control)









A warm greeting to all visitors to site course network TCP IP is probably the most common level. TCP provides a secure delivery of packets. TCP protocol provides reliable, connection-oriented, over IP (or encapsulated inside IP). TCP guarantees order and delivery of packets, it checks the integrity of the packet header and the data they contain. TCP is responsible for retransmission of packets lost or corrupted by the network during transmission. This reliability makes TCP / IP protocol well suited for data transmission based on the session, the client-server applications and critical services such as e-mail.
The reliability of TCP has its price. The TCP headers require the use of extra bits for correct sequencing of information and a checksum to ensure the reliability required not only the TCP header, but the data in the package. To ensure the successful delivery of data, this protocol also requires that the recipient acknowledges receipt of data.
These acknowledgments (ACK) generates an additional network activity that reduces the rate of data transmission in favor of reliability. To limit the impact of this constraint on performance, most hosts do not send an acknowledgment for a segment or two when the time for an ACK expires.
On a TCP connection between two machines on the network, messages (or TCP) are paid and issued in sequence.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Categories

Blog Archive