Wednesday, 31 December 2014

master boot recorder - MBR - in a hard disk and how its works

MBR Mater boot recorder is most impotent part of our hdd. it is a 0 sector of our hard drive it store all the information in HDD like Partition detail,sector detail,etc
subscribe  my channel 
http://www.youtube.com/c/dilberkhan
and my web address is 
http://www.networkingtutorail.net
facebook page
www.facebook.com/iamdilber

Monday, 4 August 2014

DDR 4 128 GB


Saturday, 5 July 2014

Redistribution( OSPF ,EIGRP ,RIP ) in Hindi

Hello Friends in this videos i am trying to create a connection between Three Routing protocols RIP, OSPF, EIGRP.
It is a very help full videos.It is a conspectus of  Redistribution

Networking Hardware components

Hello friends in this videos we are talking about networking hardware components
It is very helpful videos for a networking students.
there are many components in computer networking  like, LAN card, Modems, Switch ,Hub ,Router

what is IP addressing

Hello Friends in this videos We are talking about IP addressing version 4
It is very helpful videos for a beginner in networking/hacking world without I addressing 
any body not able create a network'
...........Must Watch......... 


Protocols

Hello friends in this videos we are talking about the Protocols. Protocols also important for networking stater this this video you will learn many things about the Protocols.In this i will also define about Some old protocols like IPX/SPX,   Net Bios    ,New link IPX/SPX  
Mainly now the day we are using TCP/IP protocols For this You can see my videos from my 

Cabling (transmission media)

Hello friends in this videos we are talking about the cabling like twister pair cable, about the cross cable coding ,straight cable coding, in this videos we are also talk about speed and quality of all lan cable.
You can see my videos from my 

ip addressing class Part 2

ip addressing class Part 1

what is IP addressing

Protocols part 2(tcp/ip)

what is Protocols

What is Repetor

networking hardware component lan card

What is cabling part 4

What is cabling part 5

What is cabling part 3

What is cabling part 2

What is cabling part1

What is a Router

gateways networking hardware component

Tuesday, 1 July 2014

Network Cables

Network Cables

 Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.


This section will be divided into 2 major categories. Within these sections, each cable type will be discussed.

·         UTP (Unshielded Twisted Pair) and STP (Shielded Twisted Pair)

·         Fiber Optic Cables

 Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks. The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables. STP cabling includes metal shielding over each individual pair of copper wires. This type of shielding protects cable from external EMI (electromagnetic interferences).

Fiber Optic Cables


Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference.
Fiber optic cables have the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling.
The center core of fiber cables is made from glass or plastic fibers. A plastic coating then cushions the fiber center, and Kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket is made of Teflon or PVC.
There are two common types of fiber cables -- single mode and multimode. Multimode cable has a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance, but it is more expensive.

Friday, 6 June 2014

Saturday, 10 May 2014

IPv4 Subnetting

Subnetting- Subnetting is a way of splitting a TCP/IP network into smaller networks. When you subnet your network, you are splitting the network into separate but interconnected network. With this, network traffic will decrease but user can create connection with other subnet.
Advantages of subnetting are:-

·        Reduce network traffic
·        Better network performance
·        Simplified management

There are two types of Subnetting :-

1.     VLSM(Variable Length Subnet Mask)- It allows an organization to use more than one subnet mask within the same network address. It can be used to maximize addressing efficiency.

2.     FLSM(Fixed Length Subnet Mask)- Under FLSM scheme, all subnets on a network must have the same subnet mask. If subnetmask 255.255.255.224 is applied, the first three octets of the address and the first three bits of last octet indicate the subnet address while last five bits of the octet indicates host address.


Monday, 28 April 2014

What is Typologies

TOPOLOGY

Network  topology is the arrangement of various elements as links, nodes etc. It refers to the way in which network of computers is connected.  Choice of topology is dependent upon:-
·         type and number of devices  used
·         rate of data transfer
·         cost

Types:-
Physical Topology- Physical location of devices and cable installation in a network. It defies how devices are connected in a network through cables. It is a physical structure of a network.
Logical Topology-  It shows the  flow of data within  a network. - It also referred as Signal topology. It is used to describe the arrangement of devices in a network and how they communicate with each other.

Network Topologies:
·        Bus-  Bus topology is used in LAN where each computer is connected to a single cable i.e. Backbone cable. As there is a use of only one single cable and that can be single point of failure.
·        Ring- Ring topology is designed in a circular form in which data travels through ring in one direction. When device sends data, it travels through each device until each reaches its destination.
         
·        Star- In this topology, each computer is connected to a central device that can be switch/hub. Central device is the server and nodes/computers are clients. It is easy to design and implement. Central device can be a single point of  failure.


·        Tree- It is based on hierarchy of computer systems. The highest level of tree network consist a single root computer and  this will further connected to lower level computers.
It can be a combination  of  Bus and star  topology.
          

·        Mesh- In this topology, all computers  are  directly connected to each other. There is no need to use  switching  nor broadcasting. This topology is more costly than other topologies as there is a use of more cables. It is not used for connecting computer networks basically used to connect routers.
LAN Transmission Methods:-
·         Unicast
·         Multicast

·         Broadcast

Types of network ?

 Type of Network -The term network can refer to any interconnected group or system.A network is any method of sharing information between two systems. In a network, user can share pictures, data files without any CD or other device.

 Best-known computer network is INTERNET.
                   
Types:-

Peer to Peer Network(Workgroup Network):-
In this, only local users can login on its own system not on other system. A workgroup is a collection of computers on a LAN that share common resources and responsibilities. Workgroup provides easy sharing of files, printer and other resources.


               
Server-Client(domain network/model):-
In this network, server is created. Network users are created on server but they can be login from any other computer. A Domain is a Network Architecture in which each computer on network is either client or a server. Servers are powerful computers or processes to manage disk drives, printers. whereas, clients are PCs on which user can run applications.  

What is networking?

NETWORKING
when we connecting two or more devices with each other is known as networking, whether it is through cables to connect computers to each other. Sharing of resources i.e. printer, CD-ROM etc is possible in it.

Types of Networking:-

LAN(Local area Network) A Local area Network is group of computers and network communication devices within a limited graphic area, such as an office building.For example- a library will have a wired or wireless LAN for users  to interconnect local devices as printers, and servers. Switches, hubs and bridges are the devices  those are used to connect computers with each other.
Routers are used to connect LAN to WAN or MAN.

characteristics:
·        high data transfer rate
·        less expensive technology
·        limited graphic area
·        security
·        reliability


WAN(Wide area Network) A WAN is a data communication network that covers a large geographic area i.e. one city to another city and one country to another country. Routes are used to connect them.
characteristics:
·         multiple interconnected LANs
·         more expensive technology
·         difficult to implement than LAN
·         unlimited graphic area

MAN(Metropolitan Area Network)- A Metropolitan Area Network is a network that connects two or more LAN or CAN(Campus Area Network) together but within a town, city or metropolitan area. Multiple routers, switches and hubs are connected to create a MAN.A MAN can create within 50 km of range.

Friday, 18 April 2014

INTRODUCTION of NETWORKING


What is Network?
 In a network, there are more than one computer connected with each other or through centralized device. They can share files and resources(Data, Printer,CD ROM Internet Etc) with each other.
          
LAN:-LAN stands for Local Area Network.When we connect two or more computers With each other by using switch or hub than it called LAN.The scope of the LAN is within one building , one school or within one lab.


WAN:-
WAN stands for Wide Area Network, in which two local area networks are connected through Routers. it may be through telecommunication infrastructure or dedicated lines.For instance: - ISDN lines, Leased lines etc.In which we can use WAN devices and WAN technology. You can also connect with your remote area through existing Internet work called Internet.


MAN:-It is a part telecommunication when we connecting two or more exchange with each other that called MAN

Wednesday, 9 April 2014

Router backup utility

MD5 Authentication

In this lab i am trying to secure my link through MD5 authentication

Router1(config)#interface serial 0/0/0
Router1(config-if)#ip ospf authentication message-digest
Router1(config-if)#ip ospf message-digest-key 1 md5 admin

Router1(config)#interface serial 0/0/0
Router1(config-if)#ip ospf authentication message-digest
Router1(config-if)#ip ospf message-digest-key 1 md5 admin

OSPF key-chain authentication

In this lab i am trying to secure my link through key-chain authentication
Router1(config)#interface serial 0/1/0
Router1(config-if)#ip ospf authentication
Router1(config-if)#ip ospf authentication-key admin

Router2(config)#interface serial 0/1/0
Router2(config-if)#ip ospf authentication
Router2(config-if)#ip ospf authentication-key admin

Monday, 7 April 2014

Inter valn routing demo

Vlan details
Green is vlan 10
red is vlan 20
blue is vlan 30

Configuration 
switch:-

Switch(config)#interfacre fastethernet 0/23
Switch(config-if)#switchport mode trunk 

Router:-

Router(config)#inter fa 0/0
Router(config-if)#no shutdown

Sub interface:-

Router(config)#interface fastEthernet 0/0.1
Router(config-subif)#encapsulation dot1Q 10
Router(config-subif)#ip add 10.0.0.100 255.0.0.0

Router(config)#interface fastEthernet 0/0.2
Router(config-subif)#encapsulation dot1Q 20
Router(config-subif)#ip add 20.0.0.100 255.0.0.0

Router(config)#interface fastEthernet 0/0.3
Router(config-subif)#encapsulation dot1Q 30
Router(config-subif)#ip add 30.0.0.100 255.0.0.0

Vlan 1(introduction)

Vlan 1(introduction)

vlan 3(transfer vlan by multiple ports on cisco)

vlan 2(vlan creation)

vlan 4(vlan trunk port in switch)

vlan 5(inter vlan routing)

Friday, 28 March 2014

Rip loop prevention methods 5(hold down timer)

Holddown is a loop-prevention mechanism employed by distance vector routing protocol. This feature prevents a router from learning new information about a failed route. When a router receives an information about an unreachable route, a holddown timer is started. The router ignores all routing updates for that route until the timer expires (by default, 180 seconds in RIP). Only updates allowed during that period are updates sent from the router that originally advertised the route. If that router advertise the update, the holddown timer is stopped and the routing information is processed.

Rip loop prevention methods 4(Route poisoning)

Route poisoning
Route poisoning is another method for preventing routing loops employed by distance vector routing protocols. When a router detects that one of its directly connected routes has failed, it sends the advertisment for that route with an infinite metric ("poisoning the route"). A router that receives the update knows that the route has failed and doesn't use it anymore.

Rip loop prevention methods 3(poison reverse)

Poison Reverse
When a router receives a route poisoning, it sends an update back to the
router from which it received the route poisoning,

Rip loop prevention methods 2(Triggered updates)

Triggered updates
Well since we are discussing distance vector routing protocols, all routers will eventually converge, but updates are sent out every 30 seconds with a full routing table when things are operating normally. In the case of a failed interface the neighboring router would immediately send out and update, but it would only send out a poison route with a metric of 16. The router would also temporarily suspend split horizon and send out this poisoned route back in the direction it received an update. this would be called split horizon with poison reverse. As soon as the route is considered dead, the hold down timer starts and the routers will not believe any more information about the poisoned route until the hold expires.

Rip loop prevention methods 1(split horizon)

Split Horizon
Distance vector protocols are susceptible to routing loops. Split horizon is one of the features of distance vector routing protocols that prevents them. This feature prevents a router from advertising a route back onto the interface from which it was learned.

layer 3 switch 2(RIP on switch)

layer 3 switch 1(ip address on switch)

Tuesday, 25 March 2014

ospf basic 2

ospf Router id

Dynamic nat configuration

Types of nat

Nat basic

Extended access list

Standard ACL(host Blocking)

In this example i m trying to block 30.0.0.1 host from my network which is HCL(10.0.0.0)

HCL(config)#ip access-list standard hcl
HCL(config-std-nacl)#deny host 30.0.0.1
HCL(config-std-nacl)#permit any
HCL(config)#interface fastEthernet 0/0
HCL(config-if)#ip access-group hcl out

........................OR................................

HCL(config)#ip access-list standard 10
HCL(config-std-nacl)#deny host 30.0.0.1
HCL(config-std-nacl)#permit any
HCL(config-std-nacl)#exit
HCL(config)#interface fastEthernet 0/0
HCL(config-if)#ip access-group 10 out

........................OR................................

HCL(config)#access-list 10 deny host 30.0.0.1
HCL(config)#access-list 10 permit any
HCL(config)#interface fastEthernet 0/0
HCL(config-if)#ip access-group 10 out

Standard ACL

In this example i m trying  to block 30.0.0.0 network for my network which is HCL(10.0.0.0)

HCL(config)#ip access-list standard HCL
HCL(config-std-nacl)#deny 30.0.0.0 0.255.255.255
HCL(config-std-nacl)#permit any
HCL(config-std-nacl)#exit
HCL(config)#interface fastEthernet 0/0
HCL(config-if)#ip access-group HCL out

........................OR................................
HCL(config)#ip access-list standard 10
HCL(config-std-nacl)#deny 30.0.0.0 0.255.255.255
HCL(config-std-nacl)#permit any
HCL(config-std-nacl)#exit
HCL(config)#interface fastEthernet 0/0
HCL(config-if)#ip access-group 10 out

........................OR................................

HCL(config)#access-list 10 deny 30.0.0.0 0.255.255.255
HCL(config)#access-list 10 permit any
HCL(config)#interface fastEthernet 0/0
HCL(config-if)#ip access-group 10 out

Sunday, 23 March 2014

link for internet download manager

Extended ACL (network to Host blocking)



Extended ACL for network to Host blocking

HCL(config)#ip access-list extended hcl
HCL(config-ext-nacl)#deny icmp 30.0.0.0 0.255.255.255 host 10.0.0.1
HCL(config-ext-nacl)#permit ip any any
HCL(config-ext-nacl)#inter fa 0/0
HCL(config-if)#ip access-group hcl out
........................................OR.................................................

HCL(config)#ip access-list extended 110
HCL(config-ext-nacl)#deny icmp 30.0.0.0 0.255.255.255 host 10.0.0.1
HCL(config-ext-nacl)#permit ip any any
HCL(config-ext-nacl)#inter fa 0/0
HCL(config-if)#ip access-group 110 out
........................................OR.................................................

HCL(config)#access-list 110 deny icmp 30.0.0.0 0.255.255.255 host 10.0.0.1
HCL(config)#access-list 110 permit ip any any
HCL(config)#inter fa 0/0
HCL(config-if)#ip access-group 110 out

Extended ACL (Host to Host blocking)



Extended ACL for Host to Host blocking

HCL(config)#ip access-list extended hcl
HCL(config-ext-nacl)#deny icmp host 30.0.0.1 host 10.0.0.1
HCL(config-ext-nacl)#permit ip any any
HCL(config-ext-nacl)#inter fa 0/0
HCL(config-if)#ip access-group hcl out
........................................OR.................................................

HCL(config)#ip access-list extended 110
HCL(config-ext-nacl)#deny icmp host 30.0.0.1 host 10.0.0.1
HCL(config-ext-nacl)#permit ip any any
HCL(config-ext-nacl)#inter fa 0/0
HCL(config-if)#ip access-group 110 out
........................................OR.................................................

HCL(config)#access-list 110 deny icmp host 30.0.0.1 host 10.0.0.1
HCL(config)#access-list 110 permit ip any any
HCL(config)#inter fa 0/0
HCL(config-if)#ip access-group 110 out


Extended ACL (Host to Network blocking)


Extended ACL for Host to Network blocking

HCL(config)#ip access-list extended hcl
HCL(config-ext-nacl)#deny icmp host 30.0.0.1 10.0.0.0 0.255.255.255
HCL(config-ext-nacl)#permit ip any any
HCL(config-ext-nacl)#inter fa 0/0
HCL(config-if)#ip access-group hcl out
.......................................OR...........................................

HCL(config)#ip access-list extended 110
HCL(config-ext-nacl)#deny icmp host 30.0.0.1 10.0.0.0 0.255.255.255
HCL(config-ext-nacl)#permit ip any any
HCL(config-ext-nacl)#inter fa 0/0
HCL(config-if)#ip access-group 110 out
.......................................OR...........................................

HCL(config)#access-list 110 deny icmp host 30.0.0.1 10.0.0.0 0.255.255.255
HCL(config)#access-list 110 permit ip any any
HCL(config)#inter fa 0/0
HCL(config-if)#ip access-group 110 out