TEAMS

Friday 22 November 2013

What is a Network Topology ?

In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.

 The physical topology of a network is the actual geometric layout of workstations. There are several common physical topologies, as described below and as shown in the illustration.

topology
BUS NETWORK TOPOLOGY:- 

Every workstation is connected to a main cable called the bus. Therefore, in effect, each workstation is directly connected to every other workstation in the network.



Star Network Topology :-

There is a central computer or server to which all the workstations are directly connected. Every workstation is indirectly connected to every other through the central computer.




Ring Network Topology  :-

The workstations are connected in a closed loop configuration. Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more intermediate nodes.




Mesh Network Topology :-

Employs either of two schemes, called full mesh and partial mesh. In the full mesh topology, each workstation is connected directly to each of the others. In the partial mesh topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data.







Tree Network Topology :-
Uses two or more star networks connected together. The central computers of the star networks are connected to a main bus. Thus, a tree network is a bus network of star networks.


Logical (Or Signal) Topology :- 

Refers to the nature of the paths the signals follow from node to node. In many instances, the logical topology is the same as the physical topology. But this is not always the case. For example, some networks are physically laid out in a star configuration, but they operate logically as bus or ring networks.

Thursday 21 November 2013

Hide folder or file with out any software

Password Protect folders in Windows without any Software

Most of us have private data. Not all of us have a private computer to keep that data. So, we just end up with other people viewing that data. Although password protecting software do work, it is almost useless to hide private data with these software(because we are always questioned as to what it is that we are hiding with the help of these software).

Hidden folders do not work as anyone can use Folder Options to make a hidden folder visible. So, we need an alternative way to create hidden password protected folders which only we can access. And that is exactly what we will learn in this post.

With this trick, you can create a secure password protected folder in Windows which no one except you can access. To use this trick, follow the instructions given below:-

1.  Open Notepad.
2.  Copy and paste the exact code given below:-

cls
@ECHO OFF
title www.tweakandtrick.com
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== computer goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End


Hide Folders without any Software


3.  Click on the File Menu. Click on Save As.
4.  Select All Types in the Save As Type dropdown menu. Save the file as *.bat or Locker.bat.


After creating the file, double click on the Saved file. A new folder will be created. Enter your data in the folder. Again, double click on the batch file. Type Y and press Enter. The folder will be hidden from view.

To re-view your folder, double click on the saved batch file. Enter password as "computer" without quotes and press Enter key. This is also the default password. Your folder will be visible again.

To change the default password, edit the part of the code given in blue and enter your own password.


The overall usability of this trick can be improved by deleting the batch file after hiding your folder and re-creating it when you wish to access your folder again.
Note: This works on Windows 8, Windows 7, Windows XP and Vista. First try this on useless data to be sure and then only hide your personal data.

Friday 8 November 2013

What is IP Address?






Internet Protocol Address (or IP Address) is an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have an unique IP address within its network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify a network device to deliver mail message, or call ("view") a website.

Dotted Decimals
The traditional IP Addresses (IPv4) uses a 32-bit number to represent an IP address, and it defines both network and host address. Due to IPv4 addresses running out, a new version of the IP protocol (IPv6) has been invented to offer virtually limitless number of unique addresses. An IP address is written in "dotted decimal" notation, which is 4 sets of numbers separated by period each set representing 8-bit number ranging from (0-255). 

An IPv4 address is divided into two parts: network and host address. The network address determines how many of the 32 bits are used for the network address, and remaining bits for the host address. The host address can further divided into subnetwork and host number.

Class A, B, C and CIDR networks
Traditionally IP network is classified as A, B or C network. The computers identified the class by the first 3 bits (A=000, B=100, C=110), while humans identify the class by first octet(8-bit) number. With scarcity of IP addresses, the class-based system has been replaced by Classless Inter-Domain Routing (CIDR) to more efficiently allocate IP addresses.

ClassNetwork AddressNumber of HostsNetmask
CIDR/4240,435,456240.0.0.0
CIDR/5134,217,728248.0.0.0
CIDR/667,108,864252.0.0.0
CIDR/733,554,432254.0.0.0
A/8 (1-126)16,777,216255.0.0.0
CIDR/98,388,608255.128.0.0
CIDR/104,194,304255.192.0.0
CIDR/112,097,152255.224.0.0
CIDR/121,048,576255.240.0.0
CIDR/13524,288255.248.0.0
CIDR/14262,144255.252.0.0
CIDR/15131,072255.254.0.0
B/16 (128-191)65,534255.255.0.0
CIDR/1732,768255.255.128.0
CIDR/1816,384255.255.192.0
CIDR/198,192255.255.224.0
CIDR/204,096255.255.240.0
CIDR/212,048255.255.248.0
CIDR/221,024255.255.252.0
CIDR/23512255.255.254.0
C/24 (192-223)256255.255.255.0
CIDR/25128255.255.255.128
CIDR/2664255.255.255.192
CIDR/2732255.255.255.224
CIDR/2816255.255.255.240
CIDR/298255.255.255.248
CIDR/304255.255.255.252

Note: (1) 127 Network Address reserved for loopback test. (2) Class D (224-247, Multicast) and Class E (248-255, Experimental) are not intended to be used in public operation.

Public and Private IP Addresses

In order to maintain uniqueness within global namespace, the IP addresses are publicly registered with the Network Information Center (NIC) to avoid address conflicts. Devices that need to be publicly identified such as web or mail servers must have a globally unique IP address, and they are assigned a public IP address. Devices that do not require public access may be assigned a private IP address, and make it uniquely identifiable within one organization. For example, a network printer may be assigned a private IP address to prevent the world from printing from it. To allow organizations to freely assign private IP addresses, the NIC has reserved certain address blocks for private use. A private network is a network that uses RFC 1918 IP address space. The following IP blocks are reserved for private IP addresses.

ClassStarting IP AddressEnding IP Address
A10.0.0.010.255.255.255
B172.16.0.0172.31.255.255
C192.168.0.0192.168.255.255

In addition to above classful private addresses, 169.254.0.0 through 169.254.255.255 addresses are reserved for Zeroconf (or APIPA, Automatic Private IP Addressing) to automatically create the usable IP network without configuration.

What is loopback IP address?

The loopback IP address is the address used to access itself. The IPv4 designated 127.0.0.1 as the loopback address with the 255.0.0.0 subnet mask. A loopback interface is also known as a virtual IP, which does not associate with hardware interface. On Linux systems, the loopback interface is commonly called lo or lo0. The corresponding hostname for this interface is called localhost.
The loopback address is used to test network software without physically installing a Network Interface Card (NIC), and without having to physically connect the machine to a TCP/IP network. A good example of this is to access the web server running on itself by using http://127.0.0.1 or http://localhost.


Thursday 17 October 2013

How To Set Up a Network Router


This guide explains how to set up a router for home computer networks. The exact names of configuration settings on a network router vary depending on the model and whether it is wired or wireless. However, this general procedure will guide you through the process for the common kinds of home network equipment.





   Difficulty:Average



Time Required: 1 hour
Here's How:
1.        Choose a convenient location to begin installing your router such as an open floor space or table. This does not need to be the permanent location of the device. Particularly for wireless routers, you may find it necessary to re-position the unit after installing it as the cables / signals may not reach all areas needed. At the beginning, its better to choose a location where it's easiest to work with the router and worry about final placement later.
2.        Plug in the router's electrical power source, then turn on the router by pushing the power button.
3.        (Optional) Connect your Internet modem to the router. Most network modems connect via an Ethernet cable but USB connections are becoming increasingly common. The cable plugs into the router jack named "WAN" or "uplink" or "Internet." After connecting the cable, be sure to power cycle (turn off and turn back on) the modem to ensure the router recognizes it.
4.        Connect one computer to the router. Even if the router is a wireless model, connect this first computer to the router via a network cable. Using a cable during router installation ensures the maximum reliability of the equipment. Once a wireless router installation is complete, the computer can be changed over to a wireless connection if desired.
5.        Open the router's administration tool. From the computer connected to the router, first open your Web browser. Then enter the router's address for network administration in the Web address field and hit return to reach the router's home page.



Many routers are reached by either the Web address "http://192.168.1.1" or "http://192.168.0.1" Consult your router's documentation to determine the exact address for your model. Note that you do not need a working Internet connection for this step.

6.        Log in to the router. The router's home page will ask you for a username and password. Both are provided in the router's documentation. You should change the router's password for security reasons, but do this after the installation is complete to avoid unnecessary complications during the basic setup.
7.        If you want your router to connect to the Internet, you must enter Internet connection informationinto that section of the router's configuration (exact location varies). If using DSL Internet, you may need to enter the PPPoE username and password. Likewise, if you have been issued a static IP address by your provider (you would need to have requested it), the static IP fields (including network mask and gateway) given to you by the provider must also must be set in the router.
8.        If you were using a primary computer or an older network router to connect to the Internet, your provider may require you to update the MAC address of the router with the MAC address of the device you were using previously. Read How to Change a MAC Address for a detailed description of this process.
9.        If this is a wireless router, change the network name (often called SSID). While the router comes to you with a network name set at the factory, you will never want to use this name on your network. Read How to Change the Router SSID for detailed instructions.
10.     Verify the network connection is working between your one computer and the router. To do this, you must confirmed that the computer has received IP address information from the router. See How to Find IP Addresses for a description of this process.
11.     (If applicable) Verify your one computer can connect to the Internet properly. Open your Web browser and visit a few Internet sites such as http://teamseducation.blogspot.in
12.     Connect additional computers to the router as needed. If connecting wirelessly, ensure the network name (SSID) of each is computer matches that of the router.
13.     Finally, configure additional network security features as desired to guard your systems against Internet attackers. These WiFi Home Network Security Tips offer a good checklist to follow.
Tips:
1.        When connecting devices with network cables, be sure each end of the cable connects tightly. Loose cables are one of the most common sources of network setup problems.
What You Need
·         A network router (wireless or wired)
·         Network adapters installed on all devices to be connected to the router
·         A working Internet modem (optional)

·         A Web browser installed at least one computer in the network

Friday 11 October 2013

How to Use Proxy IP address ? Change the Ip address


What is the Use of The Proxy?
Hide your IP. Browse the Internet anonymously.

100 percentage working process list
Share

Here is the list of proxy server address. use it and enjoy.

94.125.27.20:8080
93.91.200.146:8080
81.18.116.66:8080
79.125.28.242:3128
72.52.96.9:80
72.52.96.11:80
69.13.229.214:3128
68.96.75.146:9090
64.87.46.57:3128
64.23.156.82:8080
62.142.57.72:8080
61.79.87.93:3128
61.6.163.30:8080
61.244.235.34:3128
61.156.25.222:8080
58.215.78.157:808
58.17.71.121:8080
41.190.16.17:8080
222.77.69.210:3128
217.197.121.188:8080
216.27.81.163:8080
216.185.4.200:8080
213.192.246.133:80
213.192.246.133:80
213.192.246.130:80
213.192.246.130:80
213.151.33.58:3128
213.151.033.058:3128
213.109.130.80:54321
212.158.160.96:80
212.118.224.151:80
212.118.224.151:80
212.118.224.150:80
212.118.224.150:80
212.118.224.148:80
211.138.124.232:80
211.138.124.232:80
211.138.124.217:80
211.138.124.213:80
211.138.124.212:80
211.138.124.209:80
211.138.124.200:80
211.138.124.199:80
211.138.124.199:80
211.138.124.180:80
211.138.124.179:80
211.138.124.178:80
211.138.124.174:80
211.138.124.173:80
211.138.124.170:80
211.138.124.169:80
211.138.124.167:80
210.212.55.194:3128
210.187.51.43:8080
210.125.51.41:80
210.107.100.251:8080
209.203.19.2:8080
208.92.249.118:80
208.115.60.146:8080
208.100.40.46:80
208.100.40.46:80
208.100.40.43:80
208.100.40.42:80
207.135.129.5:8080
207.135.129.5:8080
206.196.111.110:80
205.213.195.70:8080
203.139.145.2:3128
202.201.34.101:3128
202.169.226.208:8080
202.162.192.232:8080
202.149.25.43:8080
202.143.146.205:8080
202.115.12.162:808
201.76.211.246:8080
201.20.18.165:3128
200.57.88.164:80
200.36.104.230:8080
200.36.104.230:8080
200.101.82.4:8088
199.3.183.242:8088
196.30.6.186:80
196.29.161.85:8080
196.29.161.84:8080
196.29.161.84:80
196.29.161.82:80
196.29.161.81:80
190.202.124.18:3128
190.141.4.5:8080
190.128.169.122:3128
190.120.10.71:3128
189.72.251.166:8080
189.61.196.10:3128
189.45.245.126:3128
189.17.118.10:3128
189.114.58.242:3128
189.11.211.237:3128
188.59.252.190:80
188.165.205.62:80
187.87.203.209:3128
187.45.232.176:8080
187.45.232.176:8000
187.45.213.100:3128
187.115.162.6:3128
187.115.162.6:3128
184.73.50.88:8118
184.73.131.27:80
184.73.120.223:80
184.73.114.189:8080
184.73.114.189:3128
184.72.9.242:8080
184.72.9.242:8000
184.72.9.242:80
184.72.9.242:443
184.72.9.242:3128
184.106.242.128:80
175.106.17.229:8080
174.143.202.39:80
174.143.168.38:8081
174.142.40.86:3128
174.142.40.84:3128
173.203.78.165:8080
173.203.78.165:3128
168.216.38.209:8080
164.78.252.24:80
164.78.252.24:80
164.078.252.110:80
164.078.252.025:80
125.95.189.82:8080
125.21.227.206:80
122.228.202.236:3128
122.184.133.210:8080
122.183.136.59:80
121.30.255.38:8080
120.50.57.234:3128
119.167.219.78:80
119.167.219.078:80
119.110.97.28:3128
119.110.97.28:3128
118.98.212.242:3128
118.98.160.99:80
118.98.160.99:3128
118.97.224.2:8080
118.97.224.2:8080
118.97.224.2:80
118.97.224.2:3128
118.97.169.173:8080
118.69.127.34:3128
117.40.29.89:80
111.1.32.93:80
111.1.32.92:80
111.1.32.91:80
111.1.32.8:80
111.1.32.7:80
111.1.32.72:80
111.1.32.71:80
111.1.32.69:80
111.1.32.61:80
111.1.32.59:80
111.1.32.4:80
111.1.32.47:80
111.1.32.45:80
111.1.32.44:80
111.1.32.19:80
111.1.32.15:80
110.164.66.98:3128
087.224.133.108:8080
082.206.129.160:3128
061.079.087.093:3128
058.056.108.114:80

How to Use?
Mozilla is the famous browser. So i will explain how to use the proxy servers in Mozilla.

Open Mozilla FireFox.
Select Tools from menu bar (or simply press ALT+T)
Click the Options
Small window Will Open.
Navigate to Advanced tab
Click Settings.
Now select the Manual Proxy Configuration Radio Button.
Paste the one of the Ip address of Proxy server and set the Port as defined in the list.
For Eg:
Let's take this proxy
058.056.108.114:80
Here ip address is 058.056.108.114
Port no is :80
That's all click ok.


Thursday 10 October 2013

RJ-45 Connector Cabling

RJ-45 connector data cable contains 4 pairs of wires each consists of a solid colored wire and a strip of the same color. There are two wiring standards for RJ-45 wiring: T-568A and T-568B. Although there are 4 pairs of wires, 10BaseT/100BaseT Ethernet uses only 2 pairs: Orange and Green. The other two colors (blue and brown) may be used for a second Ethernet line or for phone connections. 
.

To create a straight-through cable, you'll have to use either T-568A or T-568B on both ends of the cable. The diagram depicted on the left and right shows clip of the RJ-45 connector down.
To create a cross-over cable, you'll wire T-568A on one end and T-568B on the other end of the cable.
The straight-through cables are used when connecting Data Terminating Equipment (DTE) to Data Communications Equipment (DCE), such as computers and routers to modems (gateways) or hubs (Ethernet Switches). The cross-over cables are used when connecting DTE to DTE, or DCE to DCE equipment; such as computer to computer, computer to router; or gateway to hub connections. The DTE equipment terminates the signal, while DCE equipment do not.


More on straight-through and cross-over connections
The RJ45 data cables we use to connect computers to a Ethernet switch is straight-through cables. As noted above, the RJ45 cable uses only 2-pairs of wires: Orange (pins 1 & 2) and Green (pins 3 & 6). Pins 4, 5 (Blue) and 7, 8 (Brown) are NOT used. Straight-through cable, as its name suggests, connects pin 1 to pin 1, pin 2 to pin 2, pin 3 to pin 3, and pin 6 to pin 6. Cross-over cables are used to connect TX+ to RX+, and TX- to RX-, which connects pin 1 to pin 3, pin 2 to pin 6, pin 3 to pin 1 and pin 6 to pin 2. The unused pins are generally connected straight-through in both straight-through and cross-over cables.
To network two computers without a hub, a cross-over cable is used. Cross-over cable is also used to connect a router to a computer, or ethernet switch (hub) to another ethernet switch without an uplink. Most ethernet switches today provide an uplink port, which prevents a use of cross-over cable to daisy chain another ethernet switch. Straight-through cables are used to connect a computer to an ethernet switch, or a router to an ethernet switch.

Pin Number Designations 
There are pin number designations for each color in T-568B and T-568A.
                 T-568B                         T-568A
       --------------------------      ------------------------
Pin    Color             Pin Name      Color           Pin Name
---    -------------     --------      -------------   --------
 1     Orange Stripe     Tx+           Green Stripe    Rx+
 2     Orange            Tx-           Green           Rx-
 3     Green Stripe      Rx+           Orange Stripe   Tx+
 4     Blue              Not Used      Blue            Not Used
 5     Blue Stripe       Not Used      Blue Stripe     Not Used
 6     Green             Rx-           Orange          Tx-
 7     Brown Stripe      Not Used      Brown Stripe    Not Used
 8     Brown             Not Used      Brown           Not Used

RJ45 Color-Coded Scheme 
RJ45 cables have 8 color-coded wires, and the plugs have 8 pins and conductors. Eight wires are used as 4 pairs, each representing positive and negative polarity. The most commonly used wiring standard for 100baseT is T-586B stanrard described above. Prior to EIA 568A and 568B standards, the color-coded scheme was used to wire RJ45 cables. The table below depicts pin and color schemes used in traditional and standardized setup.

Pin
Colored Scheme
T-568B (Common)
T-568A
1
Blue
Orange Stripe
Green Stripe
2
Orange
Orange
Green
3
Black
Green Stripe
Orange Stripe
4
Red
Blue
Blue
5
Green
Blue Stripe
Blue Stripe
6
Yellow
Green
Orange
7
Brown
Brown Stripe
Brown Stripe
8
White (or Grey)
Brown
Brown

RJ-45 Wiring FAQ

1. What are T-568A and T-568B wiring standards, and how are they different? 
T-568A and T-568B are the two wiring standards for RJ-45 connector data cable specified by TIA/EIA-568-A wiring standards document. The difference between the two is the position of the orange and green wire pairs. It is preferable to wire to T-568B standards if there is no pre-existing pattern used within a building.

2. What is RJ stands for? 
RJ stands for Registered Jacks. These are used in telephone and data jack wiring registered with FCC. RJ-11 is a 6-position, 4-conductor jack used in telephone wiring, and RJ-45 is a 8-position, 8-conductor jack used in 10BaseT and 100BaseT ethernet wiring.

3. What is the Category Rating System? 
Electronic Industries Association (EIA) developed the TIA/EIA-568-A standard, which specifies wiring and performance standards for Unshielded Twisted Pair (UTP) cabling. Category Rating System specifies the definition of performance categories for 100 ohm UTP cabling system.
Category 3 specifies the twisted pair cable and connecting hardware that can support transmission frequency up to 16MHz, and data rates up to 10Mbps. This is primarily used in telephone wiring.
Category 4 specifies cables and connectors that supports up to 20MHz and data rates up to 16Mbps. With introduction of category 5, this is a rarely used category.
Category 5 specifies cables and connectors that supports up to 100MHz and data rates up to 100Mbps. With 100BaseT Ethernet today, Category 5 is a widely used cabling system that matches todays high-speed data requirements.

Category
TIA/EIA Standard
Description
Cat 1
None
POTS, ISDN and doorbell wiring
Cat 2
None
4 Mbps token ring networks
Cat 3
TIA/EIA 568-B
10 Mbps Ethernet - frequency up to 16MHz
Cat 4
None
16 Mbps token ring networks - frequency up to 20MHz
Cat 5
None
100 Mbps Ethernet - frequency up to 100 MHz
Not suitable for GigE (1000BaseT)
Cat 5e
TIA/EIA 568-B
100 Mbps & GigE Ethernet - frequency up to 100 MHz
Cat 6
TIA/EIA 568-B
2x Performance of Cat 5 & 5e - frequency up to 250 MHz
Cat 6a
None
Future specification for 10Gbps application
Cat 7
ISO/IEC 11801 Class F
Designed for transmission at frequencies up to 600 MHz

4. What is UTP Cable? 
UTP stands for Unshielded Twisted Pair. It is the cabling system with one or more pairs of twisted insulated copper wires contained in a single sheath. It is the most widely used cabling system in telecommunications and data communications environment today.



 
TEAMS EDUCATION . Powered by Blogger.