Pages

amazon2

Thursday, 19 May 2011

Cisco Wireless Certification update

hello friends Cisco has announces CCIE Wireless track update. They changed  CCIE Wireless v1.0 to 2.0 means CCIE Wireles 2.0 is lunched.  So Candidates who have  their written or lab exams scheduled November 18, 2011 or later should prepare using the CCIE Wireless Written Exam Topics v2.0, and the Lab Exam Topics v2.0. For more info visit this link.


https://learningnetwork.cisco.com/community/certifications/ccie_wireless/syllabus


so according to Cisco says....

Cisco Certifications Career Poster

Cisco lunched a certification poster that provide you some guideline that where you are and where want to go, what is path to go there? Put it on your wall or desktop or keep it handy , just download it and there is  no need to visit again and again Cisco website to check your path. here is a link:-

https://learningnetwork.cisco.com/docs/DOC-11573  

Friday, 13 May 2011

CCNA Practice Questions FREE

i found a forum where network engineer doing CCNA find ccna practice sample question . this is free also

http://www.networking-forum.com/sample_questions_ccna.php

so go and take a test and you find where you are in your way towards first Cisco milestone CCNA.

Tuesday, 10 May 2011

HOW TO RECOVER CISCO ROUTER PASSWORD

This procedure is used for recovering an enable password or enable secret passwords. These passwords are used to protect access to privileged EXEC and configuration modes. The enable passwordpassword can be recovered but the enable secret password is encrypted and can only be replaced with a new password using the step by step procedure described here.


Step 1:- Attach a terminal or PC with terminal emulation to the console port of the router. Use the following terminal                   settings: 
              9600 baud rate
              No parity
              8 data bits
              1 stop bit

Step 2:- Restart /reload the Router.

Step 3:- Press Break on the terminal keyboard within 60 seconds of the power-up to abort / interrupt the boot process and  put the router into ROMMON 1 mode. Some common break keys are-

                      Break key on keyboard,    for Tera-term is Alt+B, for Hyper-Terminal Ctrl-Break or Ctrl-F6-Break
                      for Terminal Break/Ctrl-Break

Step 4:- Type confreg 0x2142 at the rommon 1> prompt to boot from Flash without loading the configuration.

Step 5:- Now type reset command at the rommon 2> prompt.The router reboots but ignores its saved configuration or Start-up config in NVRAM.


Step 6:- Type no after each setup question or press Ctrl-C to skip the initial setup procedure.

Monday, 9 May 2011

Difference Between Circuit Switched and Packet Switched Networks

Circuit Switching



In this networking method, a connection called a circuit is set up between two devices, which is used for the whole communication. Information about the nature of the circuit is maintained by the network. The circuit may either be a fixed one that is always present, or it may be a circuit that is created on an as-needed basis. Even if many potential paths through intermediate devices may exist between the two devices communicating, only one will be used for any given dialog.


Circuit Switching
In a circuit-switched network, before
communication can occur between two devices, a circuit is established between them. This is shown as a thick blue line for the conduit of data from Device A to Device B, and a matching purple line from B back to A. Once set up, all communication between these devices takes place over this circuit, even though there are other possible ways that data could conceivably be passed over the network of devices between them


The classic example of

Networking Models and Architecture


Networking Models

One other important benefit of layering is that it makes it possible for technologies defined by different groups to interoperate. For this to be possible, it is necessary for everyone to agree on how layers will be defined and used. The most common tool for this purpose is a networking model. The model describes what the different layers are in the network, what each is responsible for doing, and how they interact. A universally-accepted model ensures that everyone is on the same page when creating hardware and software.
The most common general model in use today is the Open Systems Interconnection (OSI) Reference Model, which concepts of seven stacked layers. These range from the Physical Layer (layer one) at the bottom, which is responsible for low-level signaling, to the Application Layer (layer seven) at the top, where application software is implemented. Understanding the OSI model is essential to understanding networking as a whole. I explain models and layers in more detail, as well as providing a complete description of the OSI Reference Model, in its own dedicated section.

Networking Architectures
Closely related to the concept of a model is that of an architecture. An architecture is essentially a set of rules that describes the function of some portion of the hardware and software that constitute a stack of layers. Such a rule-set usually takes the form of a specification or standard that describes how equipment and programs using the technology must behave. A networking architecture is designed to implement the functions associated with a particular contiguous set of layers of the OSI Reference Model, either formally or informally.
In this Guide we are, of course, interested in the TCP/IP protocol suite, which runs the Internet, and a complex set of technologies that spans many layers of the OSI model. It is by examining the various components of TCP/IP and how they implement different OSI model layers that we will really learn how TCP/IP works. For starters, the name of the suite, TCP/IP, comes from the Transmission Control Protocol (TCP), which operates at layer four of the OSI model, and the Internet Protocol (IP) that runs at OSI model layer three. IP provides services to layer four and uses services of layer two below it. TCP uses IP's functions and provides functions to the layers above it. The complete examination of TCP/IP starts by looking at its architecture and a second, special model that was developed specifically to make sense of TCP/IP.

What is Networking

Introduction to Networking


In this day and age, networks are everywhere. The Internet has also revolutionized not only the computer world, but the lives of millions in a variety of ways even in the “real world”. We tend to take for granted that computers should be connected together. In fact, these days, whenever I have two computers in the same room, I have a difficult time not connecting them together!


What is a Network


A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies.


Advantages of Networking


Most of the benefits of networking can be divided into two generic categories: connectivity and sharing. Networks allow computers, and hence their users, to be connected together. They also allow for the easy sharing of information and resources, and cooperation between the devices in other ways.



Here are some of the specific advantages generally associated with networking
  • Connectivity and Communication: Networks connect computers and the users of those computers. Individuals within a building or work group can be connected into local area networks (LANs). LAN in distant locations can be interconnected into larger wide area networks (WANs). Once connected, it is possible for network users to communicate with each other using technologies such as E-mail . This makes the transmission of business (or non-business) information easier, more efficient and less expensive than it would be without the network.
  • Data Sharing: One of the most important uses of networking is to allow the sharing of data. Before networking was common, an accounting employee who wanted to prepare a report for her manager would have to produce it on his PC, put it on a floppy disk, and then walk it over to the manager, who would transfer the data to her PC's hard disk. (This sort of “shoe-based network” was sometimes sarcastically called a “sneakernet”.)

    True networking allows thousands of employees to share data much more easily and quickly than this. More so, it makes possible applications that rely on the ability of many people to access and share the same data, such as databases, group software development, and much more. 
    Intranets and extranets can be used to distribute corporate information between sites and to business partners.
  • Hardware Sharing: Networks facilitate the sharing of hardware devices. For example, instead of giving each of 10 employees in a department an expensive color printer (or resorting to the “sneakernet” again), one printer can be placed on the network for everyone to share.
  • Internet Access: The Internet is itself an enormous network, so whenever you access the Internet, you are using a network. The significance of the Internet on modern society is hard to exaggerate, especially for those of us in technical fields.
  • Internet Access Sharing: Small computer networks allow multiple users to share a single Internet connection. Special hardware devices allow the bandwidth of the connection to be easily allocated to various individuals as they need it, and permit an organization to purchase one high-speed connection instead of many slower ones.
  • Data Security and Management: In a business environment, a network allows the administrators to much better manage the company's critical data. Instead of having this data spread over dozens or even hundreds of small computers in a haphazard fashion as their users create it, data can be centralized on shared servers. This makes it easy for everyone to find the data, makes it possible for the administrators to ensure that the data is regularly backed up, and also allows for the implementation of security measures to control who can read or change various pieces of critical information.
  • Performance Enhancement and Balancing: Under some circumstances, a network can be used to enhance the overall performance of some applications by distributing the computation tasks to various computers on the network.
  • Entertainment: Networks facilitate many types of games and entertainment. The Internet itself offers many sources of entertainment, of course. In addition, many multi-player games exist that operate over a local area network. Many home networks are set up for this reason, and gaming across wide area networks (including the Internet) has also become quite popular.

Disadvantages of Networking



Here are a few of the items that balance against the advantages of networking.
  • Network Hardware, Software and Setup Costs: Computers don't just magically network themselves, of course. Setting up a network requires an investment in hardware and software, as well as funds for planning, designing and implementing the network. For a home with a small network of two or three PCs, this is relatively inexpensive, possibly amounting to less than a hundred dollars with today's low prices for network hardware, and operating systems already designed for networks. For a large company, cost can easily run into tens of thousands of dollars—or more.
  • Hardware and Software Management and Administration Costs: In all but the smallest of implementations, ongoing maintenance and management of the network requires the care and attention of an IT professional. In a smaller organization that already has a system administrator, a network may fall within this person's job responsibilities, but it will take time away from other tasks. In more substantial organizations, a network administrator may need to be hired, and in large companies an entire department may be necessary.
  • Undesirable Sharing: With the good comes the bad; while networking allows the easy sharing of useful information, it also allows the sharing of undesirable data. One significant “sharing problem” in this regard has to do with viruses, which are easily spread over networks and the Internet. Mitigating these effects costs more time, money and administrative effort.
  • Illegal or Undesirable Behavior: Similar to the point above, networking facilitates useful connectivity and communication, but also brings difficulties with it. Typical problems include abuse of company resources, distractions that reduce productivity, downloading of illegal or illicit materials, and even software piracy. In larger organizations, these issues must be managed through explicit policies and monitoring, which again, further increases management costs.
  • Data Security Concerns: If a network is implemented properly, it is possible to greatly improve the security of important data. In contrast, a poorly-secured network puts critical data at risk, exposing it to the potential problems associated with hackers, unauthorized access and even sabotage

Sunday, 8 May 2011

Importance Of Getting Cisco Certification

Cisco certification is a complete technical pyramid certificate system which is set up by Cisco company for promoting Cisco technology, cultivating the network management construction and designing troubleshooting personnel. Candidates can use the obtained Cisco certificates as valid proof of salary change or company qualification.
When you want to get a job in the security field it can be rather difficult. That is when you should know that one of the easiest ways that you can get jobs in this field is by getting your Cisco certification. When you get this, you will notice that the jobs that are available to you are easier to find. However, without this certification you could see that it is nearly impossible to get a job because so many of the companies that are hiring for these positions look for this type of certification, so they do not have to train anyone once they have hired them.

Cisco Mobile for Nokia


Saturday, 7 May 2011

CCNP TShoot exam info

The TSHOOT 642-832 exam has been used to replace the old ISCW & ONT exams.



Some information I have gathered so far:
The exam is very different with the old exam. You have 3 hours for this exam.
Exam’s Structure:
+ About 10 Multichoice questions
+ 2 Drag and Drop Questions
+ 16 lab-sim Questions with the same network topology (16 troubleshooting tickets or you can call it one “big” question). Each lab-sim is called a ticket and you can solve them in any order you like.
Topics of the lab-sims:
1- IPv6
2- OSPF
3- OSPFv3

DIFFERENCE BETWEEN BRIDGING/SWITCHING AND ROUTING....

 There is a fundamental question: “how is bridging different from routing?”. It’s impossible to give a concise answer .
ROUTING-: Routing or routeing is the process of selecting paths in a network along which to send network traffic.
BRIDGING-: Bridging is a forwarding technique used in packet-switched computer networks. Unlike routing, bridging makes no assumptions about where in a network a particular address is located. Instead, it depends on flooding and examination of source addresses in received packet headers to locate unknown devices. Once a device has been located, its location is recorded in a table where the MAC address is stored so as to preclude the need for further broadcasting. The utility of bridging is limited by its dependence on flooding, and is thus only used in local area networks.


                             NOW THE DIFFERENCES BETWEEN THESE TWO--



Design scope. IP was designed to support global packet switching network infrastructure. Ethernet bridging was designed to emulate a single shared cable. Various design decisions made in IP or Ethernet bridging were always skewed by these perspectives: scalability versus transparency.

Forwarding. IP routers forward

BASIC FUNDAMENTAL LAB OF MPLS


Basic lab to understand the fundamental concept of MPLS.
IOS: c3660-jk9o3s-mz.124-17.bin
Topology:
Basic_MPLS_GNS3_Topology.jpg
First configure EIGRP AS 100 on R1, R2 and R3
R1:
R1#configure terminal
R1(config)#interface f0/1
R1(config-if)#ip address 192.168.12.1 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#router eigrp 100
R1(config-router)#network 192.168.12.0 0.0.0.255
R2:
R2#configure terminal
R2(config)#interface f0/0

UNEQUAL COST LOAD BALANCING WITH STATIC ROUTES


Unequal load-sharing with static routes is almost impossible as there is no configuration command to assign non-default traffic share count to a static route. For example, if you configure two default routes, one pointing to a low-speed interface and another one pointing to a high-speed interface, there is no mechanism to force majority of the traffic onto the high-speed link (IOS ignores interface bandwidth when calculating load sharing ratios).
You can, howerer, use a workaround: if you configure multiple routes for the same prefix pointing to the same interface, that interface will attract proportionally more outbound traffic.
For example, let's assume you have two point-to-point serial subinterfaces, one three times as fast as the other:
interface Serial0/0/0.100 point-to-point
 bandwidth 1000
 ip address 172.16.1.1 255.255.255.252
!
interface Serial0/0/0.200 point-to-point
 ip address 172.16.1.5 255.255.255.252
 bandwidth 3000
To shift more traffic onto Serial0/0/0.200,

Cisco IOS Hints and Tricks--WHY IS THE FIRST PING LOST?


When pinging a directly-attached host (end-station) from a router, it's quite common to lose the first reply, as shown in the following example (the same symptom might occur when pinging a remote host that has been inactive).
a2#ping 10.0.0.10

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.0.10, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/4 ms
Actually,

The Essentials of CCNA Webinar


Have questions about the CCNA Certification? Then have a look at the Webinar recording Cisco has posted on their learning network site and it will likely be answered.  This is a one stop shop for getting every detail you could want regarding the CCNA certification. 
The recording is 2 hours long, the first 40 minutes is the presentation and the rest is Q & A.  If you don't hear anything the first minute or so it's because they were having audio issues, but if you fast forward a bit you'll hear it.
Here's the link: https://learningnetwork.cisco.com/docs/DOC-11417(Basic Cisco ID needed)

CBTNuggets Cisco TSHOOT...It's Done!

hi friends much awaiting CBT Nugget video as sir Jeremy  said in his blog now completed and i think it will be available for networking professional in a week.for more info go to jeremy's blog.. link
                                 http://tekcert.com/blog/2011/05/04/cbtnuggets-cisco-tshootits-done

     or CBT Nuggets webpage link-
                         http://www.cbtnuggets.com/series/636

New Prices for Microsoft Certification Exams

Microsoft a couple days ago announces  a cost increase of their certification exams effective July 1, 2011. The announcement doesn't specifically list pricing, however they have provided a pricing tool which I tested out for a few countries: 
USA is increasing from 125 to 150 USD
UK is increasing from 88 to 99 GBP
France is increasing from 140 to 150 EUR
India is increasing from 50 to 80 USD
So, if you are planning on taking a Microsoft certification exam and you want to save a few bucks, you might want to get 'er done before July. The official announcement along with several frequently asked questions can be found here.

Router Boot process

Router uses a systematic way to boot. It goes through the following process during bootup.--

POST-(Power On Self Test)-- Testing the H/W Components of Router
Load  Bootstrap Loader from ROM to RAM and Execute it.Then Bootstrap loader locate the IOS image and copy it into RAM.
Locating the Configuration file if any in NVRAM .
Loading the Configuration file in RAM. if their is no file than the Router will prompt the user to enter Setup mode.

Router Component

A Router is a computer. it has many of same hardware & software components.like-

  RAM-store running configuration,IOS during bootup, ARP & ip routing Table.It is Volatile memory.
  NVRAM- Nonvolatile, store startup config

  ROM- Permanent storage,that used for Bootstrap program, Scaled down version of IOS
  Flash Memory- permanent storage, stores Cisco IOS

  CPU- Executes IOS Instructions
  Operating System- Cisco IOS
  Interfaces- to connect devices
  

amazon4