|
Monday, 24 June 2013
Thursday, 13 June 2013
6/13/2013 01:35:00 am
Sarkari Job
1 comment
Watch Star Wars movie in command prompt
1. Go to start > Run and type in cmd and press enter
2. Now type in telnet as shown below and press enter.
3. After that enter o as shown below and press enter.
4. Next enter towel.blinkenlights.nl as shown below and press enter.
5. Now star wars movie will start playing on your command prompt
6. Enjoy !!
6/13/2013 01:20:00 am
Sarkari Job
No comments
Dancing Keyboard Led Light
1. Open Notepad and copy below codes into it.
Set wshShell =wscript.CreateObject("WScript.Shell")2. Then save this file as dance.vbs (name can be anything but .vbs is must)
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3. Open your save file and see your keyboard led blinking like disco lights.
Tuesday, 11 June 2013
6/11/2013 08:45:00 pm
Sarkari Job
No comments
Mobile To Mobile Balance Transfer
Transfer Balance from Aircel, Airtel, Idea , BSNL ,Vodafone, Docomo
Aircel Balance Transfer Trick-2012
aircel users can transfer balance upto rs 100 transfer code
*122*666#
it wll be working always
enjoy guys :)
*122*666#
it wll be working always
enjoy guys :)
Airtel Balance Transfer Trick-2012
Step1: SMS GIFT amount friend number [eg: GIFT 50 9908080323] Step2: You will recieve a message saying you have that your amount has been transferred to 9908XXXXXX
Minimum Balance Rs.1/-
Terms and Conditions apply for transferring balance. This trick works only in some states please try this trick with low balance first and go for bigger amount.
Tata Docomo Balance Transfer Trick-2012
Step1: SMS “BT Mobile Number Amount” and send it to 54321
[eg: BT 72078XXXXX 50]
Step2: To reverse the Amount a Member needs to type “ RBT Transaction ID” and send it to54321
Charges Rs.1 and for reversal will be Toll Free.
Terms and Conditions:
The sender’s account balance for “Balance Transfer” has to be Transfer Amount + Rs.1 at the time of transfer. If balance is not sufficient the transfer will be declined. However, the SMS will be charged.
In case of Reversals the amount reversed will be dependent on the balance available with the recipient.
The system will recognize “BT” or “bt” or “Bt”
Idea Free Balance Transfer Trick-2012
Follow the below Steps:
Step1: Dial *567*friend mobile number*amount#
[eg:*567*9092 XXXXXX*50#]
Bsnl Free Balance Transfer Trick-2012Follow the steps below:
Step1: SMS ” GIFT friend Bsnl number amount ” to 53733 or 53738
[eg: GIFT 949XXXXXXX 50 ]
Vodafone Free Balance Transfer Trick-2012
Step1: Dial *131*Amount*friend vodafone mobile no#
[eg: *131*50*9052XXXXXX#]
6/11/2013 12:01:00 am
Sarkari Job
No comments
Create A Hidden User Account
This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. #[Start] [Run] [Regedit]#Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden#Setting for Value Data: [0 = Account is Hidden / 1 = Enabled]#Exit Registry and Reboot...
While the account is hidden on the Welcome screen, note that the account profile will be visible in C:\Documents and Settings or wherever user profiles are stored as well as in Local Users and Groups
Monday, 10 June 2013
6/10/2013 11:55:00 pm
Sarkari Job
No comments
Error Reporting in XP
If error reporting in XP is bugging you then turn it off.
When a system error occurs in XP, a little dialog box appears asking if you want to report the error to Microsoft. Click the message box to make it disappear. You don't have to report the error if you don't want to and on today's "Call for Help" Leo shows you how to turn off the feature if you find it distracting.
To disable error reporting, follow these directions:
1. Right-click My Computer and choose Properties.
2. Click the Advanced tab on your System Properties dialog box.
3. Click the Error Reporting button on the Advanced tab.
4. Place a checkmark next to "Disable error reporting."
5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
6. Click OK.
2. Click the Advanced tab on your System Properties dialog box.
3. Click the Error Reporting button on the Advanced tab.
4. Place a checkmark next to "Disable error reporting."
5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
6. Click OK.
6/10/2013 11:53:00 pm
Sarkari Job
No comments
Programs who Hide Microsoft in Windows XP
1. Private Character Editor :
Used for editing fonts,etc.
** start>>Run
** Now, type eudcedit
2. Dr. Watson :
This an inbuilt windows repairing software !
** start>>Run
** Now, type drwtsn32
3. Media Player 5.1 :
Even if you upgrade your Media Player, you can still access your old player in case the new one fails !!!
** start>>Run
** Now, type mplay32
4. iExpress :
Used to create SetupsYou can create your own installers !
** start>>Run
** Now, type iexpress
6/10/2013 11:50:00 pm
Sarkari Job
No comments
Nokia Cell Phone Secret Codes
Codes :
1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746025625# Sim clock allowed status
6) #pw+1234567890+1# Shows if ur sim as any restrictions
Codes :
1) *#06# For checking IMEI(international Mobile Equipment Identity)
2) *#7780# Reset to factory settings
3) *#0000# To view software version
4) *#2820# Bluetooth device address
5) *#746025625# Sim clock allowed status
6) #pw+1234567890+1# Shows if ur sim as any restrictions
6/10/2013 11:45:00 pm
Sarkari Job
No comments
How to "Delete administrator Password" without any software
Method 1
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.
Method 2
Step 1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer -
Method 2
Step 1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer -
6/10/2013 11:40:00 pm
Sarkari Job
No comments
All (Ctrl+Alt+Del) Permanently deleted files Recovery solution
Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...For all those folks,Here is the solution
Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.
Click Here to download the .
1)To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.
2)When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.
3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).
6/10/2013 11:36:00 pm
Sarkari Job
No comments
How do a quick back up for SQL Server 2005
Here is the syntax to quickly backup a database in SQL Server 2005.
Backup database [database name] to disk=’path where you want the file.bak’
Eg:-
backup database CRM_MSCRM to disk=’c:\crmbackup_rakesh.bak’
You can make the backup command to a completely different level but this is a quick tip on just getting a backup to perform some quick maintenance.
6/10/2013 11:26:00 pm
Sarkari Job
No comments
Run Programs at Startup without using Startup folder
This tweak allows a program to be launched when the user logs onto the computer. It can be set to run minimized and there is no trace of the executable in the Startup folder on the Start Menu nor in the Documents and Settings folder accessible via Windows Explorer.
1. Click Start, click Run, and type regedit to run Registry Editor. Navigate to-
HKEY_CURRENT_USER\Software\Microsoft \Windows\CurrentVersion\Run
2. Modify/Create the Value Data Type(s) and Value Name(s) as given below:
Data Type: REG_SZ [String Value]
Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
3. Exit Registry and Reboot.Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
6/10/2013 10:12:00 pm
Sarkari Job
No comments
- Windows 7 & Windows 8 Problem Steps Recorder1.Open Problem Steps Recorder by clicking the Start button , and then typing psr. In the list of results, click psr.
- Click Start Record. On your computer, go through the steps on your computer to reproduce the problem. You can pause the recording at any time, and then resume it later.
- Click Stop Record.
- In the Save As dialog box, type a name for the file, and then click Save (the file is saved with the .zip file name extension).To view the record of the steps you recorded, open the .zip file you just saved, and then double-click the file. The document will open in your browser.
NETWORKING FULL FORMS
6/10/2013 09:38:00 pm
Sarkari Job
No comments
ACPI | advanced configuration and power interface |
ACT | activity |
ADSL | asymmetrical digital subscriber line |
AGP | accelerated graphics port |
AMD | advanced micro devices |
AMR | audio modem riser |
APIPA | automatic private internet protocol addressing |
APM | advanced power management |
ARP | address resolution protocol |
ASR | automated system recovery |
AT | advanced technology |
ATA | advanced technology attachment |
ATAPI | advanced technology attachment packet interface |
ATM | asynchronous transfer mode |
ATX | advanced technology extended |
BIOS | basic input/output system |
BNC | Bayonet-Neill-Concelman or British Navel Connector |
BRI | basic rate interface |
BTX | balanced technology extended |
CCD | charged coupled device |
CD | compact disc |
CD-ROM | compact disc-read-only memory |
CD-RW | compact disc-rewritable |
CDFS | compact disc file system |
CMOS | complementary metal-oxide semiconductor |
CNR | communication network riser |
COM1 | communication port 1 |
CPU | central processing unit |
CRIMM | continuity-rambus inline memory module |
CRT | cathode-ray tube |
DAC | discretionary access control |
DB-25 | serial communications D-shell connector, 25 pins |
DB-9 | 9 pin D shell connector |
DC | direct current |
DDOS | distributed denial of service |
DDR | double data-rate |
DDR RAM | double data-rate random access memory |
DDR SDRAM | double data-rate synchronous dynamic random access memory |
DFS | distributed file system |
DHCP | dynamic host configuration protocol |
DIMM | dual inline memory module |
DIN | Deutsche Industrie Norm |
DIP | dual inline package |
DLT | digital linear tape |
DLP | digital light processing |
DMA | direct memory access |
DNS | domain name service or domain name server |
DOS | disk operating system or denial of service |
DPMS | display power management signaling |
DRAM | dynamic random access memory |
DSL | digital subscriber line |
DVD | digital video disc or digital versatile disc |
DVD-RAM | digital video disc-random access memory |
DVD-ROM | digital video disc-read only memory |
DVD-R | digital video disc-recordable |
DVD-RW | digital video disc-rewritable |
DVI | digital visual interface |
ECC | error correction code |
ECP | extended capabilities port |
EEPROM | electrically erasable programmable read-only memory |
EFS | encrypting file system |
EIDE | enhanced integrated drive electronics |
EISA | extended industry standard architecture |
EMI | electromagnetic interference |
EMP | electromagnetic pulse |
EPROM | erasable programmable read-only memory |
EPP | enhanced parallel port |
ERD | emergency repair disk |
ESD | electrostatic discharge |
ESDI | enhanced small device interface |
EVGA | extended video graphics adapter/array |
EVDO | evolution data optimized or evolution data only |
FAT | file allocation table |
FAT12 | 12-bit file allocation table |
FAT16 | 16-bit file allocation table |
FAT32 | 32-bit file allocation table |
FDD | floppy disk drive |
FERPA | Family Educational Rights and Privacy Act |
Fn | Function (referring to the function key on a laptop) |
FPM | fast page-mode |
FRU | field replaceable unit |
FT | P file transfer protocol |
FQDN | fully qualified domain name |
GB | gigabyte |
GDI | graphics device interface |
GHz | gigahertz |
GUI | graphical user interface |
GPRS | general packet radio system |
GSM | global system for mobile communications |
HAL | hardware abstraction layer |
HCL | hardware compatibility list |
HDD | hard disk drive |
HDMi | high definition media interface |
HPFS | high performance file system |
HTML | hypertext markup language |
HTTP | hypertext transfer protocol |
HTTPS | hypertext transfer protocol over secure sockets layer |
I/O | input/output |
ICMP | internet control message protocol |
ICS | internet connection sharing |
ICR | intelligent character recognition |
IDE | integrated drive electronics |
IEEE | Institute of Electrical and Electronics Engineers |
IIS | Internet Information Services |
IMAP | internet mail access protocol |
IP | internet protocol |
IPCONFIG | internet protocol configuration |
IPP | internet printing protocol |
IPSEC | internet protocol security |
IPX | internetwork packet exchange |
IPX/SPX | internetwork packet exchange/sequenced packet exchange |
IR | infrared |
IrDA | Infrared Data Association |
IRQ | interrupt request |
ISA | industry standard architecture |
ISDN | integrated services digital network |
ISO | Industry Standards Organization |
ISP | internet service provider |
KB | kilobyte |
LAN | local area network |
LBA | logical block addressing |
LC | Lucent connector |
LCD | liquid crystal display |
LDAP | lightweight directory access protocol |
LED | light emitting diode |
LIP | or LiPoly lithium-ion polymer |
Li-on | lithium-ion |
LPD/LPR | line printer daemon / line printer remote |
LPT | line printer terminal |
LPT1 | line printer terminal 1 |
LPX | low profile extended |
LVD | low voltage differential |
MAC | media access control |
MAN | metropolitan area network |
MAPI | messaging application programming interface |
Mb | megabit |
MB | megabyte |
MBR | master boot record |
MBSA | Microsoft Baseline Security Analyzer |
MCR | multivariant curve resolution |
MFD | multi-function device |
MFP | multi-function product |
MHz | megahertz |
MicroDIMM | micro dual inline memory module |
MIDI | musical instrument digital interface |
MIME | multipurpose internet mail extension |
MLI | multiple link interface |
MMC | Microsoft management console |
MMX | multimedia extensions |
MP3 | Moving Picture Experts Group Layer 3 Audio |
MPEG | Moving Picture Experts Group |
MSCONFIG | Microsoft configuration |
MSDS | material safety data sheet |
MUI | multilingual user interface |
NAS | network-attached storage |
NAT | network address translation |
NetBIOS | networked basic input/output system |
NetBEUI | networked basic input/output system extended user interface |
NFS | network file system |
NIC | network interface card |
NiCd | nickel cadmium |
NiMH | nickel metal hydride |
NLI | not logged in or natural language interface |
NLX | new low-profile extended |
NNTP | network news transfer protocol |
NTFS | new technology file system |
NTLDR | new technology loader |
NWLINK | Netware Link |
OCR | optical character recognition |
OEM | original equipment manufacturer |
OMR | optical mark recognition |
OS | operating system |
OSR | original equipment manufacturer service release |
PAN | personal area network |
PATA | parallel advanced technology attachment |
PC | personal computer |
PCI | peripheral component interconnect |
PCIe | peripheral component interconnect express |
PCIX | peripheral component interconnect extended |
PCL | printer control language |
PCMCIA | Personal Computer Memory Card International Association |
PDA | personal digital assistant |
PGA | pin grid array |
PGA2 | pin grid array 2 |
PIN | personal identification number |
PKI | public key infrastructure |
PnP | plug and play |
POP | post office protocol |
POP3 | post office protocol 3 |
POST | power-on self test |
POTS | plain old telephone service |
PPP | point-to-point protocol |
PPTP | point-to-point tunneling protocol |
PRI | primary rate interface |
PROM | programmable read-only memory |
PS/2 | Personal System/2 connector |
PSTN | public switched telephone network |
PVC | permanent virtual circuit |
PXE | preboot execution environment |
QoS | quality of service |
RAID | redundant array of independent (or inexpensive) discs |
RAM | random access memory |
RAS | remote access service |
RBAC | role-based access control or rule-based access control |
RDRAM | RAMBUS dynamic random access memory |
RF | radio frequency |
RFI | radio frequency interference |
RGB | red green blue |
RIMM | RAMBUS inline memory module |
RIP | routing information protocol |
RIS | remote installation service |
RISC | reduced instruction set computer |
RJ | registered jack |
RJ-11 | registered jack function 11 |
RJ-45 | registered jack function 45 |
RMA | returned materials authorization |
ROM | read only memory |
RS-232 or RS-232C | recommended standard 232 |
RTC | real-time clock |
SAN | storage area network |
SATA | serial advanced technology attachment |
SC | subscription channel |
SCSI | small computer system interface |
SCSI ID | small computer system interface identifier |
SD | card secure digital card |
SDRAM | synchronous dynamic random access memory |
SEC | single edge connector |
SFC | system file checker |
SGRAM | synchronous graphics random access memory |
SIMM | single inline memory module |
SLI | scalable link interface or system level integration or scanline interleave mode |
SMB | server message block or small to midsize business |
SMTP | simple mail transport protocol |
SNMP | simple network management protocol |
SoDIMM | small outline dual inline memory module |
SOHO | small office/home office |
SP | service pack |
SP1 | service pack 1 |
SP2 | service pack 2 |
SPDIF | Sony-Philips digital interface format |
SPGA | staggered pin grid array |
SPX | sequenced package exchange |
SRAM | static random access memory |
SSH | secure shell |
SSID | service set identifier |
SSL | secure sockets layer |
ST | straight tip |
STP | shielded twisted pair |
SVGA | super video graphics array |
SXGA | super extended graphics array |
TB | terabyte |
TCP | transmission control protocol |
TCP/IP | transmission control protocol/internet protocol |
TDR | time domain reflectometer |
TFTP | trivial file transfer protocol |
UART | universal asynchronous receiver transmitter |
UDF | user defined functions or universal disk format or universal data format |
UDMA | ultra direct memory access |
UDP | user datagram protocol |
UL | Underwriter’s Laboratory |
UNC | universal naming convention |
UPS | uninterruptible power supply |
URL | uniform resource locator |
USB | universal serial bus |
USMT | user state migration tool |
UTP | unshielded twisted pair |
UXGA | ultra extended graphics array |
VESA | Video Electronics Standards Association |
VFAT | virtual file allocation table |
VGA | video graphics array |
VoIP | voice over internet protocol |
VPN | virtual private network |
VRAM | video random access memory |
WAN | wide area network |
WAP | wireless application protocol |
WEP | wired equivalent privacy |
WIFI | wireless fidelity |
WINS | windows internet name service |
WLAN | wireless local area network |
WPA | wireless protected access |
WUXGA | wide ultra extended graphics array |
XGA | extended graphics array |
ZIF | zero-insertion-force |
ZIP | zigzag inline package |
Hub, Switch, and Router Defined
6/10/2013 09:19:00 pm
Sarkari Job
No comments
The functions of the three devices are all quite different from one another, even if at times they are all integrated into a single device. Which one do you use when? Let's take a look...
Hub
A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
Switch
In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.
Sponsored
Migrate to a Private Cloud, Not a Virtual Datacenter Before you implement a private cloud, find out what you need to know about automated delivery, virtual sprawl, and more.Router
A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.
The Differences Between Hubs, Switches, and Routers on the Network
Today most routers have become something of a Swiss Army knife, combining the features and functionality of a router and switch/hub into a single unit. So conversations regarding these devices can be a bit misleading — especially to someone new to computer networking.
The functions of a router, hub and a switch are all quite different from one another, even if at times they are all integrated into a single device. Let's start with the hub and the switch since these two devices have similar roles on the network.
Each serves as a central connection for all of your network equipment and handles a data type known as frames. Frames carry your data. When a frame is received, it is amplified and then transmitted on to the port of the destination PC. The big difference between these two devices is in the method in which frames are being delivered.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.
Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance.
A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons why a switch is considered to be a much better choice then a hub.
Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of the key features of a packet is that it not only contains data, but the destination address of where it's going.
A router is typically connected to at least two networks, commonly two Local Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's network . for example, your PC or workgroup and EarthLink. Routers are located at gateways, the places where two or more networks connect. Using headers and forwarding tables, routers determine the best path for forwarding the packets. Router use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.
Today, a wide variety of services are integrated into most broadband routers. A router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network Address Translator (NAT). In addition, they usually include a Dynamic Host Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy server and a hardware firewall to protect the LAN from malicious intrusion from the Internet.
All routers have a WAN Port that connects to a DSL or cable modem for broadband Internet service and the integrated switch allows users to easily create a LAN. This allows all the PCs on the LAN to have access to the Internet and Windows file and printer sharing services.
Routers might have a single WAN port and a single LAN port and are designed to connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be connected to a router with multiple PC ports to expand a LAN. Depending on the capabilities (kinds of available ports) of the router and the switches or hubs, the connection between the router and switches/hubs may require either straight-thru or crossover (null-modem) cables. Some routers even have USB ports, and more commonly, wireless access points built into them.
Some of the more high-end or business class routers will also incorporate a serial port that can be connected to an external dial-up modem, which is useful as a backup in the event that the primary broadband connection goes down, as well as a built in LAN printer server and printer port.
Besides the inherent protection features provided by the NAT, many routers will also have a built-in, configurable, hardware-based firewall. Firewall capabilities can range from the very basic to quite sophisticated devices. Among the capabilities found on leading routers are those that permit configuring TCP/UDP ports for games, chat services, and the like, on the LAN behind the firewall.
So, in short, a hub glues together an Ethernet network segment, a switch can connect multiple Ethernet segments more efficiently and a router can do those functions plus route TCP/IP packets between multiple LANs and/or WANs; and much more of course.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.
Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance.
A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons why a switch is considered to be a much better choice then a hub.
Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of the key features of a packet is that it not only contains data, but the destination address of where it's going.
A router is typically connected to at least two networks, commonly two Local Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's network . for example, your PC or workgroup and EarthLink. Routers are located at gateways, the places where two or more networks connect. Using headers and forwarding tables, routers determine the best path for forwarding the packets. Router use protocols such as ICMP to communicate with each other and configure the best route between any two hosts.
Today, a wide variety of services are integrated into most broadband routers. A router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network Address Translator (NAT). In addition, they usually include a Dynamic Host Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy server and a hardware firewall to protect the LAN from malicious intrusion from the Internet.
All routers have a WAN Port that connects to a DSL or cable modem for broadband Internet service and the integrated switch allows users to easily create a LAN. This allows all the PCs on the LAN to have access to the Internet and Windows file and printer sharing services.
Routers might have a single WAN port and a single LAN port and are designed to connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be connected to a router with multiple PC ports to expand a LAN. Depending on the capabilities (kinds of available ports) of the router and the switches or hubs, the connection between the router and switches/hubs may require either straight-thru or crossover (null-modem) cables. Some routers even have USB ports, and more commonly, wireless access points built into them.
Some of the more high-end or business class routers will also incorporate a serial port that can be connected to an external dial-up modem, which is useful as a backup in the event that the primary broadband connection goes down, as well as a built in LAN printer server and printer port.
Besides the inherent protection features provided by the NAT, many routers will also have a built-in, configurable, hardware-based firewall. Firewall capabilities can range from the very basic to quite sophisticated devices. Among the capabilities found on leading routers are those that permit configuring TCP/UDP ports for games, chat services, and the like, on the LAN behind the firewall.
So, in short, a hub glues together an Ethernet network segment, a switch can connect multiple Ethernet segments more efficiently and a router can do those functions plus route TCP/IP packets between multiple LANs and/or WANs; and much more of course.
6/10/2013 01:20:00 am
Sarkari Job
No comments
Windows IP Utilities
1. PING
PING is a simple application (command) used to determine whether a host is online and available. PING command sends one or more ICMP Echo messages to a specified host requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns it back to the sender. This confirms that the Host is online and available. Otherwise the host is said to be unavailable.
Syntax:
C:\>ping gohacking.com
C:\>ping gohacking.com
2. TELNET
Telnet command is used to connect to a desired host on a specified port number. For example
Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
NOTE: The default port number is 23. When the port number is not specified the default number is assumed.
Telnet Hacking is explained in detail in the following post.
How To Send Fake Email
How To Send Fake Email
3. NSLOOKUP
Many times we think about finding out the IP address of a given site. Say for example google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some websites that can be used to find out the IP address of a given site. But in Windows we have an inbuilt tool to do this job for us. It is nslookup. Yes this tool can be used for resolving a given domain name into it’s IP address (determine the IP of a given site name). Not only this it can also be used for reverse IP lookup. That is if the IP address is given it determines the corresponding domain name for that IP address.
Syntax:
C:\>nslookup google.com
C:\>nslookup google.com
4. NETSTAT
The netstat command can be used to display the current TCP/IP network connections. For example the following netstat command displays all connections and their corresponding listening port numbers.
Eg: C:\>netstat -a
This command can be used to determine the IP address/Host names of all the applications connected to your computer. If a hacker is connected to your system even the hacker’s IP is displayed. So the netstat command can be used to get an idea of all the active connections to a given system.