Monday, December 17, 2012

Latest Networking Courses

In the 21s century day an age that is ruled by the internet, it's no surprise that Networking Courses and now becoming a major trend in the country. Computer Institutions are springing up all across the country to meet the increasing demand of students that are looking for masters in anything from IT to Animation.

Networking Courses is a broad topic that covers a number of different and varied courses. The courses that are included or come under Networking Courses' are:

IBM Main Frame
CCNA
CCNP
CCVP
NIIT
Dot Net
SAP
CHFI
CCIE
In case you still aren't sure about what exactly networking courses, this is a little background into the field. Networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.

Area Networks
1)local area network(LAN)
2)metropolitican area network(MAN)
3)wide area network(WAN)

One of the biggest reasons most students are being drawn to Networking courses is because to be allegeable all you need 12th pass degree, post that you can opt for any Networking Course. Also the job opportunities for those that finish their Masters are incredibly high and that is obviously an added bonus. The call for network professional raises day by day that organization.

IT professional's proficient in networks could find themselves in demand next year. This is because recent research has shown that IT graduates are the most sought of even during these economic times.
If you were to opt for a career in Networking' you'd be well advised to attempt a master in any one of these areas. Jobs in these areas are on an increase, mostly because finding someone to fit these positions is becoming hard for various employers. The positions in question are.

1. Senior Level Java/J2EE and .NET Developers
most headhunters agree that finding lead developers with Java/J2EE or .NET proficiency and management experience can be a tall task in today's market.

2. Application Development Managers

the need for application development managers nips closely at the heels of Java/J2EE opportunities at the top of search lists from clients.

3. Security Professionals

In spite of increased awareness about IT security in recent years, there is still a skills gap when it comes to this specialty.

As you can see from all the information above the job opportunities in Networking is vast to put it lightly. Also the amount of students opting for these courses will not reduce the job opportunities. The online market is growing exponentially each year and this automatically translates to a higher demand of qualified professionals. It's no wonder then that networking courses' are becoming the place for graduates to go to as soon as they receive their college degrees.

Networking Jobs Require Proper Certification

Computer networking is the science of entwining computers in a way that data can be exchanged between the computers. In other words computer networking is the communication between computer systems or devices. It could be using LAN or Local Area Network, which is curbed to a small area like interconnected computers in an office. Networking can also be of WAN type, which is a large network covering a large geographic area. And computer networking can be wireless LANs and WANs (WLAN & WWAN), which is the wireless comparable of the LAN and WAN in which all networks are interconnected to allow communication with a varsity of different kinds of media, like Bluetooth and internet.

Computer networking jobs are highly specified and viable jobs that require sufficient training. In almost all organizations these days, network connectivity is mandatory for smooth functioning of all departments. Network engineers have a very important role to play in establishing and maintaining this capability at corporations, hospitals and universities. Responsibilities in computer networking jobs include building, maintaining and administering computer networks. The role greatly varies from industry to industry, however it broadly includes troubleshooting of hardware and software, providing network support and performing system design and analysis. Obviously, network engineers often work in high-pressure environment and are required to keep their cool and must stay up-to-date on the latest technologies. Qualification requirements include a bachelor's degree, certifications and several years of experience working on a help desk or as a system administrator

Computer network management and maintenance is another very important aspect, which includes maintenance of network facilities in individual machines, such as drivers and settings of personal computers. It also includes maintenance of network servers. Outsourcing provides access to highly skilled people without the expense of maintaining a large in-house staff, offering services such as computer help, reliable network management, network maintenance help and support, data backup support and much more.

With the growth of the Internet and the expansion of the World Wide Web a variety of occupations related to the design, development, and maintenance of web sites and their servers have come up. Since networks are configured in many ways, network systems and data communications analysts are needed to design, test, and evaluate systems such as local area networks, wide area networks, the Internet, Intranets and other data communications systems. Employment of network engineers and administrators is expected to increase faster than the average for all other occupations through 2014. Computer networking job growth will continue to grow and is rightly projected to remain one of the fastest-growing industries in the U.S. economy.

Which Is The Best Way Of Computer Networking?

When it comes to gadgets, gizmos and technology computers are perhaps the first thing that comes to mind. And when we talk about computers internet is perhaps the first thing people like to talk about. So what is it that drives the internet world? Computer networking is the new world that connects the rest of the world. Better networking helps the world connected with ease and to any part of the world.

Computer networking is the only way to stay connected to the rest of the world with ease. Gone are the days of telephones and letters welcome internet that lets you stay connected anytime and anywhere. Conceptualized in the early 40s the technology has seen its rise and falls but has become a well settled name and is considered the best way to c communicate around the world. Connectivity from one device to other makes the connectivity or the so called internet.

Networking is basically the connectivity of a computer hardware to another that may be wired or wireless. Talking of the wired technology it is a primitive way of networking and least preferred by people around the world. We have the long cables that are connected from place to another. These are ideal for institutes and corporate where the people need to be seated and work.

On the other side we have the wireless technology that is connectivity of two devices without any long cables or disturbing wires. The technology though at its nascent stage in the country has seen its rise amongst the users and the people being influenced by it. The technology is good for the people who need to stay connected on the move. Started off with the Wi-Fi technology that allows the user to stay connected by connecting to a router or switch and even multiple users could log in through this. We have the mobile networking that apart from computer hardware and networking allows the user to stay connected to the world by the use of their cell phones. The USB dongle internet connection is also an ideal and new concept of networking. This technology is powered by a small dongle that can be carried in the pocket and connected to the laptop or desktop computer anytime and anywhere.

Apart from just knowing the basics of networking the term has also been a mode of learning for many. Internet keeps the business running and is one of the best ways to gather information or communicating with businesses across the world. To run the businesses efficiently there is a need for computer hardware and networking engineer who can take care of all the networking infrastructure of the company. There are many institutes around the city who provide an array of networking courses. There are long term and short term courses as per the needs of the people. Many institutes even offer online courses for the people who have lack of time. So if you are looking for an ideal future with a good salary package, computer networking fits the bill!

Computer Networking: The Next Big Thing

Computer networks are basically these huge networks that allow computers to stay in touch with each other. As more and more organizations now rely on the computer for all their work and tasks it is important that they have someone looking after this network. Computer networking courses as a result have been on a rise in recent years.

Computer networking is such an important part of most businesses that computer networking courses are now a requirement for many degrees that one may be considering working towards. There are many types of training facilities and institutions that offer computer networking courses. Larger institutions may offer a bachelor's degree in computer networking and computer hardware or other computer related degrees that will require students to have completed the computer networking courses.

Finding the right institution to take a computer networking course at, will depend largely on what educational goal you are aiming for. Many traditional institutions offer work certificates in computer hardware and networking. With this type of degree one is certified to work as a computer network technician. For those who wish to pursue a more thorough education there are associate degrees and bachelor degree programs in computer networking as well. There generally are a wide variety of computer networking courses depending on the specific requirements, but most will include classes such as Network Analysis and Design, Cisco Networking, Local Area Networks, Wide Area Networks, Technology Foundations and Introduction to TCP/IP.

There is also a large assortment of online programs that will help you in achieving an education in computer networking. For those who wish to use the computer networking courses as an additional element to their existing training, this can be a wonderfully cheaper alternative. There are also online courses that will allow a student to achieve a complete degree whether it is only a certificate or associates degree. In addition online schools also offer many forms of bachelor degrees in the computer networking field.

When deciding on an institute it is important that one check the school thoroughly to be sure of its accreditations and who has accredited it. It is also good to check the institutes reputation and talk to former students in the institute. By taking a bit of time before deciding where to take your computer networking courses at, you can be assured that your training will be recognized by different organizations that are prospective employers. This can be beneficial in furthering your education and helping you in landing a good job in the computer networking area of many businesses. This will be a great benefit in the years to come.

While the amount of people now opting for these courses is high, this does not mean that by the time you graduate you will not get a job. In fact the amount of jobs available outweighs the amount of students graduating, so computer networking is a perfect course for those straight out of college.

Networking Jobs That Do Matter To The World

Computer networking is one of the best and perhaps the most robust IT discovery. It helps the world connected and stay as one through the term called Internet. Following which the scope of networking jobs has seen a tremendous competition with people wanting to be a part of the networking world. People want better and cost effective ways to stay connected. With the ever increasing competition in terms of jobs and the kind of opportunities in the field of networking finding the right job for yourself is good.

Computer networking that finds his history back to the early 60s has been the epitome of virtual knowledge and communication. Communication through online messages, chatting and even making calls through the computers has become a part of the computer network. The network that connects millions from Japan to America or from Russia to Africa is certainly the new fad. Talking about the scope and width of networking the numbers are never ending. The world has benefited though the networking and made the world come together be it business or personal communication or information. From the hardware to software networking has become an integral part of the world and people want to stay connected 24/7. Hardware like cables, routers and servers lets the world stay connected through various ways. Gone are the days of the jumbled wires, networking is now wireless that allows the users to network anywhere and anytime.

Looking at the good and the kind of features that networking has to offer there is a wide scope for jobs in the field and there are millions of potential around the world. We have the hardware engineers who are well versed with the ins and outs of the networking equipments. Companies need to have the best resources to leverage out the best from their company systems in terms of performance. There are the hardware consultants who provide information on the latest technology in IT and help in the networking infrastructure of the company. They also maintain the servers that stores important information on various projects of the company. These people also help in maintaining video calls and connectivity of the company to the world. The software engineers help in the development of softwares or applications for the internal communication of the employees. They develop various applications that makes communication more feasible and descriptive. Companies have the option of in house recruiting or consulting recruitment agencies. Now is the time of outsourcing that saves a lot of cost for the company and provides better solutions.

There are many institutes around the country that provide quality and apt solutions for better networking solutions around the world. These institutes provide computer certifications that helps in the development of knowhow and better practical experience that helps in the development of the company. There are many companies who offer certification courses to various interns and even offer Networking Jobs in their company after the course is ended.

Revolutionizing Business Computer Networking

At present networking has been the best option available to get the most desired career option. The computer education most extended a comprehensive and practical field is must and should, because the students can get to learn computer networking easily. The practical field can teaches how to configure routers and switches, install wiring, maintain networks, network problems other relevant Information technology skills. Additionally some computer programs are based on the networking, the student can study the computer networking and they get the quality certification for associated degrees.

Being essential for career in a network administration, network technology and programming, network system management learning the networking is very important.

Types of network:

The computer networking is classified at geographical area that are sharing and accessing the data. The computer networking is three types they are LAN, WAN, MAN. This plays the major role on the computer networking.

LAN stands for local area network. It can have the smallest size with other networking types. The LAN can arrange at the room, a floor, a building and etc.

MAN is stands for metropolitan area network, occupies the whole city or state.

WAN (world area network) occupies the whole world or group of country.

In The computer networking is classified into two types they are peer-to-peer network and client ""to-server network. The peer-to-peer network is a classification of the all computers is treated equally. There is no computer on the network that is higher value in the other computer it"s called peer-to-peer computer network. The client-to-server network is differ from peer-to-peer.the client-to-server network is treated the all computers are not equal. The server is processing power and storage power. Here the data is stored on the server to be shared across the network. Every computer needs to share the data from server; it is possible with only network. So the computer networking is used by almost all companies. Only a proper and well managed computer hardware and networking can make your business efficient. Computer hardware along with network is also one of the best career options.

The consumer arc is now showing a rapid bend towards the networking world. The number of computers in an office or a home is increasing, so is the number of cables and thus, wireless networking is a viable solution. In wireless networking radio transreceivers or infrared signals are used to communicate between computers and devices. Examples of wireless networking include Wi-Fi and Bluetooth technology, though there may be security issues involved in wireless networking. However there definitely is a stronger preference towards wireless networking nowadays among consumers. These methods have proved their strength with the accelerated technology in the world making the cyber world much faster and wider than the real world. Computer networks have revolutionized business, communication, travel, research, defense, society and almost all human endeavors. The evolution of networking has helped the technological revolution take a big leap forward adding a new dimension to the 21"st century. Computer networking today, is a very well established profession that is picking up immense pace with the help of various certified courses and institutes like Red Hat Linux and Jet King. Such courses and certifications help in polishing candidates with the best skills and knowledge that the industry expects from them.

Computer Networking Has In A Business

Importance That In todays world of technology no business can be done without connecting to other people. It is most essential to have networks and contacts which are the backbone of a business built up, and in this age the networking is done through the computers. Computer networking refers to an interconnected group of computers. The networks are classified on the basis of various factors like scale, connection method, and network relationships and depending on the size they are known as Local Area Networks (LAN), Wide Area Networks (WAN), Metropolitan Area Networks (MAN) and Personal Area Networks (PAN).

For a working network it is essential to know your computer hardware. The computer hardware and networking hardware basically consists of wiring, network cards and a hub. Computer network cards are used so that a receiver computer can interpret what information the sender computer has sent. Network cards have unique MAC address used to identify computers on a certain computer network. Hubs are machines that connect all the computers in a single network; they are also used to connect to other hubs to increase the size of the computer network if needed.

For a bigger network it is more sensible to opt for a wireless networking. In wireless networking, radio transreceivers or infrared signals are used to communicate between two computers or devices. A few much used examples of wireless networking are our very own Wi-fi and Bluetooth technology; still there is a hitch of security issues involved in wireless networking. Even though the current scenario is ruled by the wireless networks as it is most used by the people and youth.

A good computer networking takes place if there are proper professionals working for you. There are even many institutions that train people in computer networking and computer hardware. They after qualifying, get into money earning profession. Major companies employ professional who are CCNA certified. Cisco-Certified Network association includes training in Routing & Switching, Design, Network Security, Service Provider, Storage Networking, Voice, and Wireless. For you to do extremely well with software or hardware the CCNA certification is the most important. This certification guides you for the highly developed networking security, voice, wireless and video solution. This has given a way to a new and emerging profession that is being opted for by youth these days, adding a new technological dimension to the 21st century.

When you sit on the computer and log onto the internet for surfing, all you are doing is computer networking because internet itself is an immensely huge network through which you can connect yourself from one end of the globe to another without much delay. A list of advantages of computer networking are-

Connectivity and Communication- the networking helps to connect numerous computers and this makes business very convenient as you can spread it to the world.
Hardware resource- you can share one single printer with multiple employees at a work place through network.
Data sharing-it becomes much easier for you to share an image or file with your relative just through networking.

The Basics Of Paging Systems

There are instances when we cannot rely on these gadgets alone specifically for a few kinds of business that require a continuous communication. Indeed, the necessity of paging system comes as a very convenient option so that companies can easily reach out to their customers and assure satisfaction.

This is certainly true among companies just like hotels, airlines, restaurants, hospitals, among others as paging systems are such a reliable way to keep the communication among workers or attend to the customers" needs immediately. The usage of these devices will definitely help a lot in making sure that the workers are coordinated, the workflow is maintained, being contacted is made easier when there is an emergency, and customers" satisfaction is guaranteed.

Basically, paging systems are communication systems that are wirelessly operated that allow users to send brief messages to a subscriber. The message transmitted by the paging system, which is called a Page, is sent on the targeted service area though a Base Station, wherein the Page is broadcasted on a radio link.

Paging systems are classified into two types: the manual paging system which will require the caller to use a telephone line in order to deliver a message to the paging operator, from which the operator will send the message to the whole paging network; on the other hand, what is more commonly used nowadays is the automatic paging system. This allows the paging terminal to automatically process the incoming requests then the messages are delivered to the pager.

There are four kinds of messages transmitted in paging systems:

The Alert Tone Message "" it uses a telephone number which has to be dialed by the receiver in order to retrieve the message
The Digital String Message "" it uses a numeric pager as the receiver and includes the telephone number or a coded message of a caller
The Text String Message "" it uses alphanumeric characters on a larger screen to display the stings of texts
The Voice Message "" it enables the transmission of voice messages across paging systems usually after a beep, although some voice pagers are capable of displaying phone numbers

Of course the need for paging system varies on the specific needs of a company. A hospital may need a voice pager to alert a patient when it is his or her turn. This, however, may not work or appropriate for a restaurant, as it can cause disturbance for obvious reasons. There is an option for restaurants to offer a pager that vibrates or lights up when a table is ready for a waiting customer.

Regardless, a pager needs the four basic elements in order to operate.

Receiver "" it is tuned to the same radio frequency as the base station in order to receive and extract the paging signals
Decoder "" it decodes or interprets the binary information
Control Logic "" it controls and manages information such as duplicate messages, as well as locking and freezing messages
Display "" it is where the receiver reads the transmitted messages

There are several options when it comes to choosing the right paging system depending on what a company finds necessary for all employees and customers. These paging systems are also continuously improved in order to meet the demands in communication whether it is in a small or big establishment. As such, choosing the best paging system lies on what is best used in the specific industry that you are working in and if it is what you can afford especially if your business covers a wider area.

Getting Into The Best Computer Networking Schools

There are many college degrees that can give you the skills required to enter a booming industry with plenty of job openings. Such degrees can be obtained at computer networking school across the globe. Any level of degree in computer networking-- from associates to a masters-- can jumpstart your career and set you on the path toward a great long term job. With the skills you acquire at computer networking schools, you will be qualified for positions that will fund the life you want and allow you to pay off any student loans you take out.

In order to get your dream job, you should know what it is and what steps you need to take to get to it before you begin. The different levels of computer networking degrees will lead you to different careers. You should really know where you are headed before you try to get there. In the end, it could save you a lot of time and money.

To design and create secure computer networks, you will need a graduate degree in computer networking. However, in order to just maintain and service computer networks, a bachelors and some associates degrees will give you the skills you need. This is why it is important to know where you want to end up after obtaining a college degree before you begin. Dont end up spending money and time to get a higher degree than youll use.

One of the most valuable aspects of computer networking programs is the specialized certifications in various operating systems that are offered. You can be getting specialized training while you are working toward your degree. That extra specialized certification will set you apart from other applicants when you are looking for a job in that field.

Your current lifestyle will steer you toward the type of classes that you will take-- either online or traditional class sessions. There are many programs out there that are designed to work with the schedules of students with full time jobs, which may apply to you. Depending on your unique learning style, choosing the right class type will be important to your success.

If you are unable to attend scheduled classes on campus, there are two types of online classes that you should look into. The first includes online conferences and lectures that are scheduled at specific times. You would have to work your personal schedule around them, but thats a great option if you are unable to get to campus but have trouble learning completely on your own. The other option is made to fit the schedule of someone with a full time job. In these classes, you complete coursework on your own time, whenever it is convenient for you.

When you start your search for the perfect school, you should know exactly what degree you want first and foremost. Also, have an idea about what type of classes you want to take and how they are going to fit in with your current schedule. You will have better luck finding the perfect school if you know what you want from the beginning. There are tons of online resources that can match you with the perfect school if you know what you are looking for.

Finding the right a computer networking school that fits you is completely possible. If you have a clear image of what you want to accomplish and where you want your career to go in the long term, you will be better equipped to reach those goals. Getting a degree in computer networking will get you a great job that will earn you both a living wage and fulfillment in your career. There is nothing stopping you from finding the right school for you!

Sunday, November 11, 2012

Advantages of Performing Computer Inventory


It is difficult to imagine the modern life without computers. Moreover, it's impossible to think about the offices', companies' and organizations' operation process without these machines. Nowadays, almost any field is connected with computers: the work of accountants, engineers, journalists, designers, estimators, and so on. That is why not only the company's income, but its viability depends on stable operation of the computers. It is not difficult to keep a dozen of computers in a proper condition. But what if there are hundreds of them in the company? In this case, the system administrator has to organize the centralized computer inventory system. What is it? Let's try to give the definition.

The computer inventory process is a part of computer asset management in any organization. It includes creating the list of computers that are available in the company, recording their operational condition and parameters, collecting the inventory data from every organization's PC, and generating corresponding reports.

The computer inventory consists of a few parts:

1. The computer inventory process itself. In other words, it is an audit of all the machines in the organization, their allocation in offices and departments.

2. Hardware audit. It is a process of constant auditing the data on hardware: inventory of every monitor, every HDD, every video card, mouse, etc.

3. Software inventory process. It is the process of gathering and collecting data on software that is installed on every remote PC in the organization, versions of applications, updates and hotfixes installed.

The computer inventory process has to be employed systematically. What for? To answer this question, it is enough to say, that computer is an implement and it needs to be kept in a proper condition, which can be rather expensive. Often, the higher the investments you spend on the maintenance, the more profit the computer owner gets. Computer inventory software helps to keep machines in the operable state, and thus, to save the organization's money. How?

Firstly, the hardware inventory allows the system administrator to prevent losses of computer parts during their replacement with new ones or their repair. Moreover, hardware inventory helps to detect in time the computers details' disappearance or their replacement with the older ones, and, hence, to discover dishonest employees.

Secondly, software inventory helps to detect all changes in software that is installed on users' PCs. Unlicensed or cracked programs are against the Copyright Law, and lead to unpleasant consequences for the company. That is why the system administrator has to get all the information on a program's developer, its size, installation date, and the license key during the software audit process. Also, he has to know whether the program is needed for work or for personal affairs.

Thirdly, advanced computer inventory software allows generating summary tables on the company's hardware and software installed on PCs. This helps the system administrator to discover, which programs have to be updated, which have to be purchased to perform the particular tasks, which computer parts and on which PCs are out of date and should be replaced with newer ones. All this allows the head manager to plan future company expenses.

Usually, it is the system administrator who has to perform the computer inventory in a company. The dedicated computer inventory software makes this process much easier. It is usually installed on the system administrator's PC only and allows him to gather all the network information remotely. It is important for IT manager to have an opportunity to receive email notifications, for instance, if some software or hardware changes take place, because usually he is responsible for the security as well.


Top 5 Network Security Fundamentals


Relentless cyber criminals, disgruntled current and former employees and careless users can bring down your computer networks and compromise data. Network security's made up of the hardware, software, policies and procedures designed to defend against both internal and external threats to your company's computer systems. Multiple layers of hardware and software can prevent threats from damaging computer networks, and stop them from spreading if they slip past your defenses.

The most common threats to your systems:

Malicious programs like viruses, worms, Trojan horses, spyware, malware, adware and botnets
Zero-day and zero-hour attacks
Hacker attacks
Denial of Service (DoS) and Distributed Denial of Service Attacks (DDoS)
Data theft
These threats look to exploit:

Unsecured wireless networks
Unpatched software and hardware
Unsecured websites
Potentially unwanted applications (PUAs)
Weak passwords
Lost devices
Unwitting users or users with malicious intent
Top 5 fundamentals of network security 
These network security fundamentals are vital to downtime prevention, government regulation compliance, reduced liability and reputation protection:

1. Keep patches and updates current 
Cyber criminals exploit vulnerabilities in operating systems, software applications, web browsers and browser plug-ins when administrators are lax about applying patches and updates.

In particular, verify that office computers are running current versions of these much used programs:

Adobe Acrobat and Reader
Adobe Flash
Oracle Java
Microsoft Internet Explorer
Microsoft Office Suite
Keep an inventory to make sure each device is updated regularly, including mobile devices and network hardware. And make sure Windows and Apple computers have automatic updating enabled.

2. Use strong passwords 
By now, most users know not to write their passwords on Post-It Notes that are plastered to their monitors. But there's more to keeping passwords secure than keeping them out of plain sight.

The definition of a strong password is one that's difficult to detect by humans and computers, is at least 6 characters, preferably more, and uses a combination of upper- and lower-case letters, numbers and symbols.

Symantec gives additional suggestions:

Don't use any words from the dictionary. Also avoid proper nouns or foreign words.
Don't use anything remotely related to your name, nickname, family members or pets.
Don't use any numbers someone could guess by looking at your mail like phone numbers and street numbers.
Choose a phrase that means something to you, take the first letters of each word and convert some into characters.
The SANS Institute recommends passwords be changed at least every 90 days, and that users not be allowed to reuse their last 15 passwords. They also suggest that users be locked out of their accounts for an hour and a half after eight failed log-on attempts within a 45-minute period.

Train users to recognize social engineering techniques used to trick them into divulging their passwords. Hackers are known to impersonate tech support to get people to give out their passwords or simply look over users' shoulders while they type in their passwords.

3. Secure your VPN 
Data encryption and identity authentication are especially important to securing a VPN. Any open network connection is a vulnerability hackers can exploit to sneak onto your network. Moreover, data is particularly vulnerable while it is traveling over the Internet. Review the documentation for your server and VPN software to make sure that the strongest possible protocols for encryption and authentication are in use.

Multi-factor authentication is the most secure identity authentication method. The more steps your users must take to prove their identity, the better. For example, in addition to a password, users could be required to enter a PIN. Or, a random numerical code generated by a key-fob authenticator every 60 seconds could be used in conjunction with a PIN or password.

It is also a good idea to use a firewall to separate the VPN network from the rest of the network. 
Other tips include:

Use cloud-based email and file sharing instead of a VPN.
Create and enforce user-access policies. Be stingy when granting access to employees, contractors and business partners.
Make sure employees know how to secure their home wireless networks. Malicious software that infects their devices at home can infect the company network via an open VPN connection.
Before granting mobile devices full access to the network, check them for up-to-date anti-virus software, firewalls and spam filters.

4. Actively manage user access privileges 
Inappropriate user-access privileges pose a significant security threat. Managing employee access to critical data on an ongoing basis should not be overlooked. More than half of 5,500 companies recently surveyed by HP and the Ponemon Institute said that their employees had access to "sensitive, confidential data outside the scope of their job requirements." In reporting on the study's findings, eWeek.com said "general business data such as documents, spreadsheets, emails and other sources of unstructured data were most at risk for snooping, followed by customer data." When an employee's job changes, make sure the IT department is notified so their access privileges can be modified to fit the duties of the new position.

5. Clean up inactive accounts 
Hackers use inactive accounts once assigned to contractors and former employees to gain access and disguise their activity. The HP/Ponemon Institute report did find that the companies in the survey were doing a good job deleting accounts once an employee quit or was laid off. Software is available for cleaning up inactive accounts on large networks with many users.


Know The Job Responsibilities Of Server Administrator


To maintain and implement the system and to monitor the server activity and security is referred as server administration. It improves the server management, consistency, safety measures and performance. The person who handles these server administration jobs is called as server admin or administrator. Server admin has the authority to manage and maintain the server, and to implement the system. In an organization server admin is the brain of the company because he has the main control of server. Admin has to manage windows server and also web application server. All organizations are in need of a server admin because all of them are maintaining a server for their business necessities. Usually they work with computer networks and make sure to maintain the software updates. They will tune the servers as needed to support the high performance business applications and assist the security and integrity of the data server. Server admins develop strategies to implement client server and to architect the infrastructure to support it.

IT industry has multiple openings for system admin or server admin, their job is to manage all network hardware equipment. Certification in hardware engineering is the educational qualifications for this job and experience in managing systems. The process of installation, configuration, troubleshooting of end user hardware and software is also includes in administration. One should be very sportive and competitive enough to perform a main role in background. Finally, it has many options to use the solutions. Basically, this job is performed by backend. They will maintain the server; so that the rest of the work is goes on by the other streamline. Without server it is difficult to maintain the backup resources, files and other details of the business. All the IT companies are looking for the talented professionals who can maintain and design the applications and operating systems for businesses. Not only IT companies, but also marketing and advertising companies are maintaining the server. In IT industry they have many available tools to manage the server. There is a good scope for system or server administration jobs in the IT industry. The main responsibility of this job is to interact and coordinate with network engineering, database administration and business application and also includes monitoring protocols and web services. Admins are technical professional who will configure and maintain the services like file sharing, directory, data, web page access, resource sharing on the server. They will also name the resolution services on it.

What You Need to Know About Entry Level Information Technology Jobs


Inquiring about entry-level Information technology jobs would not be something that a regular person would be doing.

Either you are considering changing careers, or you are probably a college graduate trying to get some experience in computers, so you can be equipped for your next big job.

The term Information technology is sometimes referred to as "IT", and can relate to many career paths. Wikipedia, a popular online encyclopedia defines this term as, "a branch of knowledge concerned with the development, management, and use of computer-based information systems".

This article will approach this topic from the same perspective of Wikipedia's explanation. The majority of jobs in the Information Technology field are centered on the management and development of computer systems, and technology. For this reason, many entry-levels to advanced jobs are available in data centers around the world.

There are many basic characteristics present in all entry-level information technology jobs. Being armed with what characteristics to look for will give you the best chances of success, in finding a good technology job.

If you are in the process of changing careers, then you may have some difficulty in finding the right entry-level technology job. This is especially true, if you have no knowledge, or experience about information technology. Always remember that once you have acquired some basic training in computers, that you would be in a better position to get the right job, in an information technology department.

You should also be aware that if you have no degree, or experience in computers that you can still learn, as long as you have the desire to do so. Everyone has a chance, as long as they are shown the correct path to follow.

Experience has shown that many individuals, who had only acquired a high school diploma or a leaving certificate, were able to advance through the ranks within a data center, and into many advanced to medium technology jobs.

Listed below are the names, and basic details of some of the many entry-level to advanced tech jobs, that are available in many information technology departments today. These jobs are listed from entry-level first, to advance.

Entry Level Positions

Many of these positions that are listed below do not require a degree in computer science. Sometimes a high school diploma, with the willingness to learn is all that is required.

· First Level Tech Support, or Help Desk Support Technician

Working in first level tech support represents one of the most basic entry-level jobs that you can acquire. You do not even need a degree in computer science, to fill this position. A basic high school diploma may be all that is required, with some basic knowledge of computers.

Even if you have a bachelor's degree in computers but no experience, this would also be a very good place to start. Most employers prefer some experience, even with a degree.

First level tech support would be considered training grounds for second level technical support. The daily routine working in the tech support department, consists of answering the phones when people call into the department for help, and taking clear notes about the customer issues. This information is then passed on to the second level support technician.

· Second Level Tech Support, or Help Desk Support Technician

Second level tech support can also be classified as an entry-level position. A diploma may be required, but not necessarily needed. As long as you are able to demonstrate some technical ability in the area of computer repairs, then you would be considered teachable.

· Network Operation Support Technician

The network operations support technician assists with the monitoring of the entire infrastructure, and computer equipment of a company. This monitoring is done using sophisticated monitoring appliances, and tools.

All that is required to work as a network operation center personal employee, would be common sense and the ability to act on issues as quickly as possible. No technical abilities may be required, but having some ability may be a plus.

· PC Repair Technician

A computer repair technician takes care of all computer related repairs, of desktop computers. Persons working as computer repair technicians, also work along with the system administrator when servers are being prepared for deployment.

Working as a PC Repair Technician is somewhat entry-level in nature also. Even though it is a specialized job, it can still be filled in time by an entry-level person.


Working as a PC Repair Technician is somewhat entry-level in nature also. Even though it is a specialized job, it can still be filled in time by an entry-level person.

Sometimes we have to separate abilities, or gifting in areas related to computer repairs, from persons that are gifted in software applications.

In many organizations, you sometimes will encounter individuals that are really gifted in hardware support, but not software. If you try to fit an individual with talents in computer repairs into an administrative role, sometime that individual will fail.

Medium to Advance Positions

The positions listed below are advanced to medium and may require some kind of specialization to perform the duties required.

· Exchange System Administrator

This person normally works along with the System Administrators of a company. This position requires a trusted and dedicated individual. Trusted, mainly because that person would have wide open access to every employees email, including the Vice President of a company.

An exchange system administrator sometimes administrates the active directory of a company, in the absence of a system administrator. This normally happens within small to medium organizations, because of their inability to hire more employees.

This is also a specialized job function, but with some knowledge can be filled in time by anyone that has extensive understanding of email systems, including Microsoft Exchange Server.

The beauty of being an exchange administrator is that you would be highly respected by management.

· Windows System Administrator (Microsoft Applications)

These persons normally administrate Microsoft systems, including Active Directory and other Microsoft applications. They also work with other application like Symantec Backup Exec, and Net backup Applications.

The duties of this person may include, the daily administration of the company's domain, including adding new users to the company network.

· Network Engineer

Network Engineers normally works in the Network Services department, and takes care of the infrastructure, and security of the entire network of a company.

Persons working in the network services department, are normally persons that have acquired some sort of Cisco Certification.

This position is very specialized, and can only be filled by a certified Cisco person, or someone who has the ability to learn quickly. These persons are also known as the gate keepers of the company assets.

Always remember that any entry level computer job is good to start with, but once you have decided on a career path to pursue, you should strive to be the best you can be in your area of interest.


Computer Network Engineering Learning Choices


Computers are relied on to complete the day-to-day technological functions of a business. The maintenance of a businesses computer system is essential and without it operations would be hindered. The education required to be able to successfully work with a business in this capacity is gained through a computer network engineering degree program.

The main focus is to be able to create, maintain, repair, and update a computers network. The network is what links the information and data utilized by employees of a business. Employees use networks to perform their job and be able to fulfill their part in the businesses mission. Learning choices teach students everything from learning how to repair, create, research, and design a network system. Four primary options are available and students can work through any one of them to enter a career. The degree choices include:

*Associate's Degree in Computer Network Engineering

Students work through a two-year program where they learn how to work with computer technology. High emphasis is placed on understanding how to install, manage, operate, and fix a computers network. Wired and wireless networks are focused on to teach students how to understand the link between computers. Coursework teaches students how to perform these duties in light of the hardware and software used to create a network.

*Bachelor's Degree in Computer Network Engineering

This degree is typically the starting point for most students. This four-year degree has students studying how to create and operate networks. The focus of education is to give students advanced methodology to work with computers in this capacity. Computer architecture, microprocessor design, database design, and electronic transmission are some courses that develop the needed skills for students. These courses teach students to use computer software to design networks that can store and communicate electronically.

*Master's Degree in Computer Network Engineering

Once enrolled in a master's degree program students can choose a concentration that enables them to enter upper-level careers. Database design and administration topics are covered thoroughly to prepare students to design all types of networks. The technology and procedures to design advanced networks is covered through courses on information theory, optimization, coding, and transmission. The work required to understand computer architecture and network development is learned at this level.

*PhD in Computer Network Engineering

Education is centered on the concepts to design and contribute to research for networking systems. The advanced knowledge gained has students preparing for upper-level careers. Network software testing, quality assurance, research, advanced design, and more have students working towards facilitating the development and creation of networks.



Network Engineering and Project Management


A Network Engineer is a computer professional who builds and maintains the networks that computers use to communicate. These networks might be small business networks or huge global networks. Clearly, that is a highly technical job that demands a professional with a huge degree of detail orientation. The stereotype would have us perceive them as a group of brilliant book worms with poor social skills.

That is a generalization and not applicable to everyone in computer science. However, it would probably be fair to say that most information technology professionals are more comfortable working with computer code and networks than working in sales, marketing or public relations. Obviously, they felt a draw toward the tasks involved in that professional and chose to pursue it over other options.

That creates an interesting opportunity for professionals that are skilled in both technical and social aspects. There are two primary examples, technical sales and project management. Both positions involve taking a strong technical knowledge and relating that to other non-technical business people.

In computer networking, project managers are often part of service firms that are contracted by client companies to build, expand, or repair computer networks. A project manager has the responsibility of planning and executing projects. That requires heavy client interaction to achieve an exact understanding of their needs. Often times, the clients may not understand what is involved from a technical aspect to meet those needs, and it will be the responsibility of the project manager to educate them.

Once the project requirements are established, it is the job of the PM to design a plan for implementation including details like manpower, cost, timelines and scope of work. Then, they are responsible for coordinating all the components of that plan until completion while constantly communicating with the client and managing their expectations.

A good manager will quickly become the key point of contact between the computer services firm and their client. Their ability to utilize resources to efficiently complete the project, while simultaneously building rapport with the client company's decision makers will heavily influence the client's opinion of the IT firm. As a result, the project manager can be quintessential in building a relationship that will lead to lucrative future business.

The value of a project manager in the job market is demonstrated by the fact that among the top IT Certifications, the one that provides the most additional income is the Project Management Professional Certification, or PMP. The average PMP salary is roughly $90,000 per year, compared to other purely technical certifications. For example, the median CCNA salary is just about $60,000 annually.


Benefits Of Being A Computer Engineer


When we see the demand increasing in the computer software and hardware, we can definitely foresee the need for increase in the need of computer experts also. Computer engineers are the ones who have chosen to be in the profession that is of the computer field. As IT industry is the fastest growing industry in any country possible there is no chance that you can fall back with your career. The trend from the automobile engineering has now shifted to Computer engineering because of the progress in the technology. The pay packages offered to the professionals are also very good.

To become a computer expert there are many course offered these days so that you can get trained and have a qualification high enough to get a job into a good company. The computer institutes willingly give the knowledge about the basics of computers as well as the advanced courses that give you a proper certification. These training centers make you aware of the things like what computer hardware actually is, it includes- Monitor, Motherboard, CPU, RAM apart from these Expansion cards, Hard disk drive, Keyboard etc. the computer software includes the operating softwares like Linux and Windows.

If you want to have a job that is not ordinary but of a certain level, then it is advisable for you to go for certification that makes a differentiation between you and just a graduate. Many institutes train the candidates with the CCNA, MCSE certifications and give them the placements which they actually deserve. With their help nobody can question your knowledge and skills about computers. If you wish to have a future with computers you can even go for the courses online. There are institutes that allow you to give certain exams online only without you being actually there; this helps in appearing for a curse which is not within your reach. They may prove to be faulty, if not taken proper measures while choosing them. The online IT courses can help too but can ruin also, they take your fees money and might just end up not giving you the desired results.

The same measures go for the computer training institutes also. It is your responsibility to select the correct center and the suitable course that will benefit you with your computer filled career. With the fast track life of the people the progress is also fast and so is the need for computer engineers who take care about the whereabouts of the computer systems. This has smoothly led the functioning of computers which are used by all even if they are not experts or professionals. Engineering is such a subject matter that always is going to be in need. With the passage of time, this stream is evolving and so the requirement of engineers is never going down. From mechanical engineering to computer engineering it has found its own importance and so it can be something else also tomorrow. But for today its obvious for one to go for a computer field related career.

Saturday, September 22, 2012

Network Cable For Your Servers

Network cables are commonly used to physically connect servers and computers to allow the sharing of data. With the vast number of people want to connect to the internet on a daily basis, network cables will be used. If there is requirement of more than one computer to the same router, then make another network cable or two to make this work. Below are steps to make network cable.

- Cat 5 cable. you can buy a 1000 feet roll of Cat 5 cable at computer stores and industry supply houses for somewhere between 6 and 10 cents a foot, depending on the quality. Don't be cheap, get the decent quality stuff. You don't want to end up with network problems due to bad cables. Check to make sure that the color-coding on the wires is easily recognizable.

- Turn off all of your devices.
Carefully remove the outer jacket of the cable. Be careful when stripping the jacket as to not nick or cut the internal wiring. One good way to do this is to cut lengthwise with snips or a knife along the side of the cable, away from you, about an inch toward the open end.

- Turn off your modem, router and computer. Keep all of your devices switched off for some time, then turn on your devices and wait till your modem and router pick up Internet signals. If you see lights blinking, it is an indication that your router and modem are working.

- Configure the settings on your router. Insert your start-up-wizard disc in your computer CD-ROM drive; the disc will guide you through the set-up process. Open your browser and type in the IP address. Once the homepage is displayed, enter your user name and password. You can also use the default user name and password settings given in the manual.

- Enter the IP address and subnet mask. This will consume some time, but it will make your home network secure. To make it more secure from being hacked, you need to change your password and SSID settings. Though most of the routers available today have built-in firewall systems and other security options, it is better to change your password and SSID settings to make your network secure.

Now, you can get these network cables online also. There are many such stores, which deliver you these product rights at your doorstep. Most of these stores have huge stocks of network cables like cat cable, patch panel, cat 6 cable, rj45 cable, crossover cable etc.

Router Cables Explained

It is a very good idea to understand Router cables when deciding to purchase a new one for your home or business. Standard of category are important specifications to consider when choosing this type of cable. Cat5, Cat5e, and Cat6 are a few examples of types to choose from. The different categories offer difference in network speed. When choosing your new Router cable it's important to choose the category of cable that suits your networ. Cat5e are the industry standard.

The Ethernet cables connect directly from your router or modem to your computer. A common mistake made by many people when shopping for an Ethernet cable is to buy an RJ11. It's important to remember you the difference between an RJ11 cable and an RJ45 cable, the latter being the correct for a modem. RJ11 plugs connect from your telephone wall point into the back of your modem. An RJ11 plug is smaller in size than an RJ45. RJ45 is the standard plug used on all Ethernet Router cables, they are twice the size of an RJ11 and will not fit into the telephone wall point.

Router cables or network cables to give them another name are categorized into various cable types. It is important to purchase cables that meet or even go further than the specification standards when considering which cable to buy. A Cat5e cable is capable of speeds up to 100 mbs, whilst the newer and higher specified cat6 cables are capable of much higher Gigabit speed which is 1000 mbs. The plugs on the a cat5e and a cat6 cable are identical. The only difference is the speed they have been designed to work at. The higher speed lead will have a thicker core with less resistance. Higher speed router cables are also suitable for internet television which uses your broadband internet connection to stream video over the internet.

Shielding is another think to consider, a shielded cable will not suffer from crosstalk which is interference picked up from other electrical cabling in the area. You can get individually shielded or even a fully shielded ethernet cable. This is particularly useful if you are using longer runs which can act like aerials picking up interference from other equipment nearby. A good rule of thumb is to consider shielding if the distance is going to be longer than 5 meters or around 16 feet. Shielded Ethernet cables should not cost that much more to purchase and will offer a better and more stable connection for your network.

Types And Advantages Of Computer Networks

You must know that a network consists of more than one commuter that is linked in order to share resources. It is advantageous in that you can exchange files; allow electronic communications, even printers and CD-ROMs). There are three basic types of network that are normally used:

1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network

Local Area Network is confined to a small area and is generally limited to a geographical area about a mile apart to other computers. The configuration of LAN consists of software that controls the network and also the software that is shared by other computers that are attached to the network. It consists of a file server, a workstation and cables.

Metropolitan Area Network covers larger geographic areas and covers cities. They are used by local libraries and Government agencies to connect to citizens and private industries.

Wide Area Network connects larger geographic areas all over the world. It works with transoceanic cables or satellite uplinks.

ADVANTAGES

Speed is one of the advantages. Sharing and transferring files are very fast and saves a lot of time. It does not allow any fraud connections and is very safe. Another advantage is the cost. If the copies are made individually licensing each copy becomes very expensive.

If Networkable versions are used it saves cost. The upgrading of the program becomes easier in shared programs instead of upgrading individual work stations. Security is another factor. You must know that sensitive files on a network are password protected. They are termed as copy inhibit. This does not allow illegal copying. Another advantage is the Centralized Software Management. This can be loaded on just one computer which is the file server and time and energy in installing updates and tracking them on individual computers can be eliminated. Other advantages are Resource Sharing, Electronic Mail use, flexible access and Group Work computing.

Looking through all the advantages what does a technological person think? Yes, he feels nice that communication which the most important part of todays knowledge based work has developed very fast and is also helpful not only for science and technology but also for the common man who can connect himself to different people and places.

It is because of this fast paced communication network that globalization has become easy. The modern world has come closer to each other and each country is not an island by itself. Even continents have come closer because of the advent of information technology. Due to this economy have also improved and different types of businesses have come into being.

Another major advantage of this is that many new jobs have got created in the technical field and has provided opportunities for the new generation to earn more and have a better standard of living.

The present generations including young adults who are still in the field of education are also aware of file sharing and storage of major knowledge that they acquire. Even families have now learnt to have different modems if each member has a computer and they get interconnected using a network with just one modem and printer. Networking has resolved the problem of purchasing expensive soft wares available in the market. Software can be stored in one system or server and it can be used by different work stations.

Basics Of Ethernet Cables

There are many articles online, teaching you how to make a cat6 network cable. It will be a great help for you if you at least know the basics for further understanding of your network. To buy cables especially, you have to familiarize yourself what those technical terms are, like fiber optic cables, network cabling, and other common ethernet cables you will be using in your network.

There are almost 100 ethernet cables available. However, not all of them are well known. Basically, ethernet cables assist in connecting your computers hardware devices to transmit the data using this ethernet protocol. And you have to be able to identify these types for a better selection.

Every computer device, like your keyboard, mouse, your CPU, the modem and other computer paraphernalia are connected by using an ethernet cable. These ethernet cables or some fiber cables are being distinguished through their quality. Below are some of the common ethernet cables.

Ordinary Ethernet Cables
These are straight-through cables in which smaller cables within the ethernet cable at equal ends have the same color orders, starting from left up to the right. Two standards are arranged with these normal cables, namely T-568A and T-568B. Such variations of their order in colors does not indicate their performance, it is just with their standard. Commonly, this kind of ethernet cable is being utilized in connecting your computer to the router, to the switch or to the hub.

Ethernet Crossover Cable
This type of ethernet cable is being used in connecting computer devices all together, even without the utilization of a switch or a hub. Such cables though have various plugs on every side. The wires inside an ethernet crossover cable may be reversed to transmit, as well as receive signals. Beginning from the left side, 1st together with the 3rd wires as well as the 2nd and 6th wires are made crossed. These can be seen also via the RJ-45 connector in every end of crossover cable.

Ethernet Cable (Cat) Categories
Following categories are from Cat 3 up to Cat 7 ethernet cables. Cat3 is used for voice cabling, cat4 is used for token ring networks, cat5 is utilized for 10/100Mb ethernet, and cat6 is like cat5e and cat7, which is a standard ethernet.

Following are the tips on how to make network cabling.

Should you need your network cable to be future-proof, it is recommended you go for UTP CAT6 standard or CAT5, except for Gigabit Ethernet.

You have to be aware as well that when you buy plenum cables, CMP is more expensive. There is a requirement in codes during installations since cable will go through the ducts.

You have to note that there are types of fiber patch cables and it is based on how wires are being connected. Patch cable in favor of straight through and crossover cable also. They both utilize RJ45 connectors, but there is distinction in each of their wiring as well as their use.

You have to familiarize yourself with the color codes also. Two layouts for colors are specified with the standards of ethernet (586a and 586b).

Take note that for straight through cables, ensure to make both ends accurately the same, and only use one of these two color codes for the ends of your cables.

For crossover cables these should have different ends; one must have 568a while the other 586b. These crossover cables have dissimilar ends because they have its send as well as receive pairs.

Remember always that the orange and green pairs are made to be swapped just to create a crossover cable.

Network Cabling and Installation

Have you ever wondered what it is that connects computers and networks to one another? Network cable in conjunction with the associated hardware (network switches, hubs, demarcation equipment) is responsible for computers being able to connect and transfer data across intranets (internal network) and the internet. Network cabling today is used for many other purposes besides computer networking. It can be used to carry video for security camera systems as well as video for cable TV and AV (Audio/Visual) applications. Network cabling is also used as control cable in Building Maintenance Systems and Access Control Systems. There are several different types of cables that are used for this purpose, including unshielded twisted pair, shielded twisted pair, fiber optic and coaxial. In some cases, only one type of cable is used in a network, while in other cases, many different types are used. Wireless systems are becoming more and more popular but always remember you still need network cabling for the wireless system. There is still two things that make network cabling better than a wireless network: it is much more secure and reliable.

Understanding Cable Type

Before you can really understand how cable networking works, you need to know about the various cables and how they work. Each cable is different, and the type of cable used for a particular network needs to be related to the size, topology and protocol of the network. Here is a rundown of the cables that are most commonly used for network cabling:

Unshielded/Shielded Twisted Pair - This is the type of cable that is used for many Ethernet networks. There are four sets of pairs of wires inside the cable. There is a thick plastic separator that keeps each pair isolated through the run of cable. Each pair of wires are twisted so there will be no interference from other devices that are on the same network. The pairs are also twisted at different intervals so they will not cause interference between themselves. In an application where there is a lot of Electromagnetic Interference (EMI), such as a mechanical space, you may choose to use shielded twisted pair, which has an outer shielding that adds extra protection from EMI. Category 5e, 6, 6A and 7 are the general choices today. Twisted pair cable is limited to 295' on a horizontal run. Twisted pair cable is used for many applications. Standard station cabling for computers and VOIP phones, wireless access points, network cameras, access control and building maintenance systems are just a few. This is one of the most reliable types of cables, and when used, network failures are less common than when other cables are used.

Fiber Optic - Fiber optic cable is primarily used as backbone cable although it is being used more and more as station cable (think FIOS). By backbone cable I mean it connects Telecommunication Rooms within a space to each other. Fiber optic cable has huge broadband capacities which allow it to carry large amounts of information as super fast speeds. Fiber cables can cover great distances(hundreds of meters) as opposed to copper cable. Because these cables must work so hard and the information travels such distances, there are many layers of protective coating on fiber optic cables. Fiber cables transmit light as opposed to electrical current. Fiber optic cable requires much less power than high speed copper does. Fiber optic cable is a great choice for high speed reliable communications.

Coaxial Cable - Coaxial cable usually falls under the scope of work of the network cabling installation contractor. Coax will be used for the cable television locations within the space you are cabling. The service provider will drop off the outdoor cable at the point of entry. The contractor will run an extension (usually RG-11) to the local telecom closet within the space. The individual station runs(RG-6) will terminate on a splitter to connect to the service cable. The center of this type of cable has a copper conductor and a plastic coating that acts as an insulator between the conductor and the metal shield. This cable is covered with coating, which can vary in thickness. The thicker the coating, the less flexible it is going to be. There are a few types of terminations for coax. Compression, crimp and twist on are the three types of terminations. The best method is compression as long as they are performed correctly. Crimp terminations are also reliable and require the right tool for the particular connector you are using. I would not recommend twist on as they are not reliable and prone to problems. A few types of coax connectors are F connectors, BNC connectors and RCA connector.

Network Cabling Components

Patch panel - This is the panel where all of the station cables terminate within the Telecommunications Room. They are usually mounted on a wall mount or floor mount telecommunications rack. Typically there are 24, 48 or 72 ports on a patch panel. There are a few different styles such as angled or straight. Panels also have the option of having the 110 type pins attached to the back of the panel or you can terminate jacks and snap them into the empty panel.

Data Jack - This is the connector where each individual cable is terminated out at the station side. The jacks are snapped into a faceplate ranging from 1 to 8 ports typically. Data jacks can be terminated in a 568A or 568B pinout. Check with the customer or designer for the correct pinout.

RJ 45 Connector - The RJ-45 connector is installed on the end of a network cable. They are 8 pin connectors. The most common place to find the RJ 45 is on a cable terminating at a wireless access point. The RJ 45 is a male connector and would plug into the port on the WAP.

Wireless Access Points - These are devices that transmit network access wirelessly. Typically they are mounted on the ceiling or wall. A wireless survey would need to be performed to maximize the correct placement of WAP's. Contrary to popular belief wireless devices STILL need to be fed with network cabling.

Cable Supports - (Commonly called J-Hooks) Cable supports are mounted in the ceiling as a support structure for your cable bundles. Main path cable supports should be mounted to the concrete deck ceiling within the space. You are no longer permitted to hang j-hooks from ceiling supports, electrical or plumbing pipe or any other system infrastructure.

Wire Managers - Wire managers are installed between patch panels and switches to manage patch cables. They serve a very important purpose as they keep law and order in a Telecommunications Room. Nothing irks me more than finishing a brand new beautiful install and having the IT group come in and not use the wire managers. It ruins the aesthetics of the job. In addition it sets a bad precedence from the birth of the Telecommunications Room that others are sure to follow.

Firestop Sleeves - Firestop sleeves are a vital part of any network cabling installation these days. Gone are the days of just banging holes into sheetrock and passing cables through. When you penetrate any firewall on a job you must install a firestop sleeve. There are specific products made for this. EZ Path and Hilti both make excellent versions in varying sizes. You can install a sleeve of EMT pipe through a wall also as long as you use firestop putty or firestop silicone to seal off all openings. This can save lives and minimize damage in the event of a fire.

Cable Labels - All cables and termination points should have a unique label. This makes installation, maintenance and troubleshooting much simpler. For a professional all labels should be computer generated. Hand written labels are just not acceptable today.


Network Cabling Installation


Network cabling installation drawings should be designed by a BICSI certified RCDD (Registered Communication Distribution Designer). There are a few things that need to be considered.

The type of cabling solution to be implemented - The cabling vendor or customer will need to select a solutions manufacturer. Siemon, Leviton, Ortronics and Panduit are some of the more common choices. The type of cabling solution will need to be discussed. Cat 5e, Cat 6, Cat 6A or Cat 7 are the copper types of network cables that can be offered. The style of the racks, data jacks, faceplates, patch panels and wire managers will also need to be discussed and chosen. Make sure this is done early as lead times can be long for certain manufactures and styles.

The location of the network equipment and racks - The room where they are housed is commonly referred to as MDF (Main Distribution Frame) Data Room, Telco Room or Telecommunications Room. All cables runs need to be within 100 meters. If cable runs are going to be over 100 meters you will need to add a second Telecommunications Room. This is also called an IDF(intermediate Distribution Frame). The IDF will often need to be connected to the MDF via fiber optic backbone cabling. The MDF will house the service provider feed from the street, which will feed the network. Typically you will also find security equipment and access control equipment here. It is a better design to have all the low voltage systems housed in one location. Measure all equipment and racks that will be required based on cabling quantities. Include access control, security, electrical panels and air conditioning units. The room needs to be large enough to accommodate all equipment.

The pathways of the cable trunks above the ceilings - Cable paths need to steer clear of electrical light fixtures or other sources of EMI (Electro Magnetic Interference). Keep cable paths in accessible areas of the ceiling for future cable runs and ease of maintenance. All paths should be run above hallways or corridors and cables enter individual rooms on sweeping 90 degree turns. Install a firestop sleeve or putty for all penetrations of a fire wall. Be careful when pulling cables so as not to bend them beyond their bend radius. This will cause a failure when testing. DO NOT tie cables to ceiling hangers or sprinkler pipes. They need to be tied at least every 5' on horizontal runs, and even more on vertical runs. J-hook supports should be anchored to the concrete deck above. Use velcro wraps every 5' or so when finished running cable to give your cable bundles a great looking finish.

Terminating Network Cabling - When terminating cable make sure to check the floor-plan numbering to each cable label to make sure the cables are in the correct spot. If something is not matching leave that cable on the side to be "toned out" later on. Use a cable stripping & cutting tool to get a uniform cut on the cable jacket and to be sure you won't nick the copper conductors inside. Always keep each pair twisted as tight as possible right up to the pins where you terminate the cable. This will ensure you won't get a NEXT or Return Loss failure. Before you start any terminations inquire weather the pinout will be 568A or 568B. This will determine which order the conductors are terminated in and is very important before you start. All cables should be dressed nicely and uniform. The project manager should make a termination chart of the patch panels for the technician that will perform the terminations. This will show the back of the patch panels and where each cable gets terminated with it's label number.

Testing your network cabling - There are a number of cabling testers out on the market. The tester we prefer to use is the Fluke DTX-1800 Cable Analyzer. This is an amazing tool. It will give you a detailed report of each cable that is tested. It tests for wiremap, insertion loss, NEXT, PSNEXT, ACR-N, Insertion Loss and many others. The best part about these new age testers is their troubleshooting skills. The Fluke will tell you where a cable is damaged and which particular conductor is damaged. If you terminated a pair out of sequence the tester will tell you which pair and on what end the error was made. The Fluke does everything but fix it for you! Most clients want to see verified test results. The new testers will provide cleaned up PDF files of the test results. These can be emailed directly to the client.





How to Set Up a Home Computer Network

Many people want to know how to set up a home computer network so that they can benefit from having one link for their computers, external storage devices, printers, gaming consoles, files, telephones and home entertainment systems that have wired or wireless networking capabilities.


Network Architecture


The first stage is to decide on your network architecture, i.e. the network type: wired, wireless or mixed, the devices you would like include into your network and how they will be connected. Three main aspects to keep in mind are:

The network speed
The ease of cabling (for non-wireless devices)
The cost
The three most common network types are (1) Ethernet (wired connectivity using special cable), (2) Wireless Ethernet (Wi-Fi) or (3) Phone Line (HPNA). Also, there are networks that use a home electrical wiring for communication. Wireless (Wi-Fi) based network can operate in one of two radio bands - 2.4 or 5 Gigahertz or in both - 2.4 and 5 Gigahertz radio bands on dual-band wireless networks.

Ethernet Network Setup
If good speed is your main concern, then Ethernet is a good option. The standard Ethernet router's speed is 10/100 Mbps (Mega bits per second) and now you can find 1000 Mbps routers. It is also the least expensive of the network types. Once everything is connected, however, all three networks work the same.

Each home computer network that has more than two devices (computers and/or peripheral devices) consists of central device - a network router (wired and/or wireless) and a few network adapters - that connect network peripherals such as computers, printers, and storage devices to the network.

After choosing right type of network router, the next step is an adapter selection, of which Ethernet has three options - USB, PCI and PC Card. USB adapters plug straight into your computer or any peripheral device with USB port but the USB connection usually has a limit of 54 Mbps. PCI adapters (wired and wireless) less expensive and very fast but are inserted internally so you'll need to open the computer. PC Cards are for laptops.

After this come the cables for connections between the computers. Ethernet cables are of different CAT numbers which are an indication of quality. CAT5, CAT5e, CAT6 are of good quality. Connecting two computes will require a crossover cable. Connecting three or more computers requires an Ethernet Router, Switch or Hub.

Next, install the network drives and the network card that came with it on your PC, following the installation procedures instructions. When network drivers are properly installed the link lights for the nub and Ethernet cards come on. Link lights will not come on until everything is properly connected.



Determining the number of routers or hubs, cables and adapters you need depends on how many computers and peripheral devices you are linking up. Two computers will require a cross-over cable, two adaptors and one router, hub or switch (optional). Three or more computers require one router, hub or switch plus adapters and cables for each machine. Afterwards you must configure the network and this stage has four main elements and two levels.

4 Configuration Elements:

NetBEUI
Network Adapter Driver
Microsoft Windows Client
Microsoft Windows File and Print sharing
2 Configuration Levels:

The first level of configuration is the protocol levels which refers to the language that computers use to 'talk' with each other. For basic home networks NetBEUI is a good protocol as it is fast, non-complicated and easy to configure.
The second level of configuration is in regards to how Windows 'talks' to other Windows during file and print sharing through the first protocol level. The second level has two parts: 'Client for Microsoft Windows' and the 'File and Printer' sharing for Windows.
After the Network's Setup

Once the configuration is complete then you move into troubleshooting. This means clicking on the "Network" folder in Windows Explorer to ensure you can see all the other computers on your network. If you get a "network inaccessible" message, try again after a minute or so as it takes a while the first time for the network to completely initialize the router and peripherals. If still it doesn't work, switch off the router or hub and reboot, then reboot computer, followed by the other computer and all other peripherals (if applicable).

Home network is a complicated technical system, thus it requires some kind of of home networking software for easy managing, troubleshooting and repairing of the network.


Wednesday, July 11, 2012

Introduction To IP Addressing And Networking


Networks and networking have grown exponentially over the last 15years; they have evolved at light speed just to keep up with huge increases in basic critical user needs such as sharing data and printers, as well as more advanced demands such as video conferencing.

TYPES OF NETWORKS

LOCAL AREA NETWORK (LAN)

A LAN (Local Area Network) is a group of computers and network devices connected together, usually within the same building. A Local Area Network (LAN) is a high-speed communication system designed to link computers and other data processing devices together within a small geographical area, such as a workgroup, department, or building. Local Area Networks implement shared access technology. This means that all the devices attached to the LAN share a single communications medium, usually a coaxial, twisted pair or fibre optic cable.

METROPOLITAN AREA NETWORK (MAN)

Metropolitan area networks or MANs are large computer networks usually spanning a city or a town. They typically use wireless infrastructure or optical fibre connections to link their sites.

The IEEE 802-2001 standard describes a MAN as being: "A MAN is optimized for a larger geographical area than is a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications channels of moderate to high data rates. A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. MANs might also be owned and operated as public utilities. They will often provide means for internetworking of local networks. Metropolitan area networks can span up to 50km."

WIDE AREA NETWORK (WAN)

Wide Area Network (WAN) is a computer network that covers a broad area. A WAN in compares to a MAN, is not restricted to a geographical location, although it might be restricted to a geographical locations, it might also be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or organization) or accessible to the public.

The technology is high speed and relatively expensive. The INTERNET is an example of a worldwide public WAN.

NETWORKING DEVICES

ROUTERS

Routers are used to connect networks together and route packets of data from one network to another. Routers, by default break up a broadcast domain, which is the set of all devices on a network segment that hear all broadcasts sent on that segment.

Routers also break up collision domains. This is an Ethernet term used to describe a network scenario where one particular device sends a packet on a network segment, forcing every other device on that segment to pay attention to it. At the same time, a different device tries to transmit, leading to a collision, after which both devices must retransmit one at a time.

Routers run on the layer 3 of the OSI (Open System Interconnection) reference model.

SWITCHES

Switches are used for network segmentation based on the MAC addresses. Switches look at the incoming frame's hardware addresses before deciding to either forward the frame or drop it.

Switches break up collision domains but the hosts on the switch are still members of one big broadcast domain.

HUB

A hub is really a multiple port repeater. A repeater receives a digital signal and re-amplifies or regenerates that signal, and then forwards the digital signal out all active ports without looking at any data. An active hub does the same thing. This means all devices plugged into a hub are in the same collision domain as well as in the same broadcast domain, which means that devices share the same bandwidth. Hubs operate at the physical layer of the OSI model.

IP ADDRESSING

An IP address is a numeric identifier assigned to each machine on an IP network. It designates the specific location of a device on the network. An IP address is a software address and designed to allow host on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.

IP TERMINOLOGIES

Bit: A bit is one digit, either a 1 or a 0.

Byte: A byte is 7 or 8 bits, depending on whether parity is used.

Octet: An octet, made up of 8 bits is just an ordinary 8 bit binary number. In most cases byte and octet are completely interchangeable.

Network address: This is the designation used in routing to send packets to a remote network. For example 10.0.0.0, 172.16.0.0, and 192.168.10.0 are network addresses.

Broadcast address: The address used by applications and hosts to send information to all nodes on a network is called the broadcast address. Examples include 255.255.255.255 which is all networks, all nodes; 172.16.255.255, which is all subnets and hosts on network 172.16.0.0.

HEIRARCHICAL IP ADDRESSING SCHEME

An IP address consists of 32 bits of information (IPV4). IPV6, a new version of IP consists of 128 bits of information. The 32 bits IP is divided into four sections referred to as octet or bytes each containing 1 byte (8bits).

An IP address is depicted using any of these 3 methods.

Dotted decimal, as in 172.16.30.56

Binary, as in 10101100.00010000.00011110.00111000

Hexadecimal, as in AC.10.1E.38

All this examples represent the same IP address. But the most commonly used is the dotted decimal. The Windows Registry stores a machine's IP address in hex.

The 32 bit IP address is a structured or hierarchical address, as opposed to a flat non hierarchical address. Although either type of addressing scheme could have been used, hierarchical addressing was chosen for a good reason. The advantage of this scheme is that it can handle a large number of addresses, namely 4.3 billion (a 32 bit address space with two possible values for each position that is either 1 or 0 gives 237, or 4,294,967,296).

The disadvantage of the flat addressing scheme relates to routing. If every address were unique, all routers on the internet would need to store the address of each and every machine on the internet. This would make efficient routing impossible.

NETWORK ADDRESS RANGE

The network address uniquely identifies each network. Every machine on the same network shares that network address as part of its IP address. In the IP address of 172.16.30.56, 172.16 is the network address.

The node address is assigned to and uniquely identifies each machine on a network. This number can also be referred to as host address. In 172.16.30.56, 30.56 is the node address. Class A network is used when a small number of networks possessing a very large number of nodes are needed. Class C network is used when numerous networks with a small number of node is needed.

CLASS A ADDRESSES

The first bit of the first byte in a class A network address must always be off or 0. This means a class A address must be between 0 and 127, inclusive.

0xxxxxxx.hhhhhhhh.hhhhhhhh.hhhhhhhh

If we turn the other 7 bits all off and then turn them all on, we'll find the class A range of network addresses.

00000000 = 0

01111111 = 127

Class A format is network.node.node.node, so for example in the IP address 49.22.102.70, the 49 is the network address and 22.102.70 is the node address. Every machine on this particular network would have the distinctive network address of 49.

CLASS B ADDRESSES

The first bit of the first byte must always be turned on, but the second bit must always be turned off.

01xxxxxx.xxxxxxxx.hhhhhhhh.hhhhhhhh

If we can turn the first bit on and the second bit off and if the other 6 bits all off and then all on, we'll find the class B range of network addresses.

10000000 = 128

10111111 = 191

Class B format is network.network.node.node, so far in the IP address 132.163.40.57, the 132.163 is the network address and 40.57 is the node address.

CLASS C ADDRESSES

The first and second bit of the first byte must always be turned on, but the third bit can never be on.

110xxxxx.xxxxxxxx.xxxxxxxx.hhhhhhhh

If we turn the first and second bit on and the third bit off and then all other 5 bits all off and all on, we'll find the class C range of network address.

11000000 = 192

11011111 = 223

Class C format is network.network.network.node, for example in the IP address 195.166.231.75, the 195.166.231 is the network address and 75 is the node address.

CLASS D AND CLASS E ADDRESSES

The address between 224 and 255 are reserved for class D and E networks. Class D (224-239) is used for multicast addresses and class E (240-255) for scientific purposes.

PRIVATE IP ADDRESSES

Private IP addresses are those that can be used on a private network, but they're not routable through the internet. This is designed for the purpose of creating a measure of well-needed security, but it also conveniently saves valuable IP address space. If every host on every network had to have real routable IP addresses, we would have run out of IP addresses to hand out years ago.

Class A 10.0.0.0 through 10.255.255.255

Class B 172.16.0.0 through 172.31.255.255

Class C 192.168.0.0 through 192.168.255.255

TROUBLESHOOTING IP ADDRESSING

Here are the troubleshooting steps in resolving a problem on an IP network.

1. Open a DOS window and ping 127.0.0.1. This is the diagnostic or loopback address, and if you get a successful ping, your IP stack is considered to be initialized. If it fails, then you have an IP stack failure and need to reinstall TCP/IP on the host.

2. From the DOS window, ping the IP addresses of the local host. If that's successful, then your Network Interface Card (NIC) card is functioning. If it fails, then there is a problem with the NIC card. This doesn't mean that a cable is plugged into the NIC, only that the IP protocol stack on the host can communicate to the NIC.


3. From the DOS window, ping the default gateway. If the ping works, it means that the NIC is plugged into the network and can communicate on the local network. If it fails, then you have a local physical network problem that could be happening anywhere from the NIC to the gateway.
4. If steps 1 through 3 were successful, try to ping the remote server. If that works then you have IP communication between then local host and the remote server, you also know that the remote physical network is working.
5. If the user still can't communicate with the server after steps 1 through 4 were successful, then there's probably a resolution problem and there is need to check the Domain Name Server (DNS) settings.
NETWORK ADDRESS TRANSLATION
Network Address Translation (NAT) is used mainly to translate private inside addresses on a network to a global outside address. The main idea is to conserve internet global address space, but it also increases network security by hiding internal IP addresses from external networks.
TABLE 3: NAT ADVANTAGES AND DISADVANTAGES
ADVANTAGES
Conserves legally registered addresses.
Reduces address overlap occurrence.
Increases flexibility when connecting to internet.
Eliminates address renumbering as network changes.
Translation introduces switching path delays
DISADVANTAGES
Loss of end-to-end traceability
Certain applications will not function with NAT enabled.
TYPES OF NAT
Static NAT: This type of NAT is designed to allow one-to-one mapping between local and global addresses. Static NAT requires that there is one real internet IP address for every host on your network.
Dynamic NAT: This version gives one the ability to map an unregistered IP address to a registered IP address from out of a pool of registered IP addresses.
Overloading: This is also known as Port Address Translation (PAT). It is the most popular type of NAT configuration. Overloading is a form of dynamic NAT that maps multiple unregistered IP address to a single registered IP address by using different ports. With overloading thousands of users can connect to the internet using only one real global IP address.
NAT TERMINOLOGIES 
Local addresses: Name of local hosts before translation.

Global addresses: Name of addresses after translation.
Inside local: Name of inside source address before translation.
Outside local: Name of destination host before translation.
Inside global: Name of inside hosts after translation
Outside global: Name of outside destination host after translation.
LAYER2 SWITCHING
Layer2 switching is the process of using the hardware address of devices on a LAN to segment a network. The term layer2 switching is used because switches operate on the data-link layer which is the second layer of the OSI reference model.
Layer2 switching is considered hardware-based bridging because it uses specialized hardware called an application-specific integrated circuit (ASIC). ASICs can run up to gigabit speeds with very low latency rates.
Switches read each frame as it passes through the network, the layer2 device then puts the source hardware address in a filter table and keeps track of which port the frame was received on. The information (logged in the switch's filter table) is what helps the machine determine the location of a specific sending device. After a filter table is built on the layer2 device, it will only forward frames to the segment where the destination hardware is located. If the destination device is on the same segment as the frame, the layer2 device will block the frame from going to any other segments. If the destination is on a different segment, the frame can only be transmitted to that segment. This is called TRANSPARENT BRIDGING.
When a switch interface receives a frame with a destination hardware address that isn't found in the device filter table, it will forward the frame to all connected segments. If the unknown device that was sent the frame replies to this forwarding action, the switch updates its filter table regarding that device's location.
ADVANTAGES OF LAYER2 SWITCHING
The biggest benefit of LAN switching over hub-centred implementations is that each device on every segment plugged into a switch can transmit silmatenously whereas hubs only allow one device per network segment to communicate at a time.
Switches are faster than routers because they don't take time looking at the Network layer header information. Instead, they look at the frame's hardware address before deciding to either forward the frame or drop it.
Switches create private dedicated collision domains and provide independent bandwidth on each port unlike hubs. The figure below shows five hosts connected to a switch, all running 10Mbps half-duplex to the server. Unlike the hub, each host has 10Mbps dedicated communication to the server.
LIMITATIONS OF LAYER2 SWITCHING
Switched networks break up collision domains but the network is still one large broadcast domain. This does not only limits your network's size and growth potential, but can also reduce its overall performance.
FUNCTIONS OF LAYER2 SWITCHING
There are three distinct functions of layer2 switching, these are
Address learning.
Forward/filter decision
Loop avoidance.
ADDRESS LEARNING
When a switch is first powered on, the MAC forward/filter table is empty. When a device transmits and an interface receives the frame, the switch places the frame source address in the MAC forward/filter table, allowing it to remember which interface the sending device is located on. The switch then has no choice but to flood the network with this frame out of every port except the source port because it has no idea where the destination device is actually located.
If a device answers the flooded frame and sends a frame back, then the switch will take source address from that frame and place that MAC address in its database as well, associating this address with the interface that received the frame. Since the switch now has both of the relevant MAC addresses in its filtering table, the two devices can now make a point to point connection. The switch doesn't need to flood the frame as it did the first time.
If there is no communication to a particular address within a certain amount of time, the switch will flush the entry from the database to keep it as current as possible.
FORWARD/FILTER DECISIONS
When a frame arrives at a switch interface, the destination hardware address is compared to the forward/filter MAC database. If the destination hardware address is known and listed in the database, the frame is sent out only the correct exit interface.
The switch doesn't transmit the frame out any interface except for the destination interface. This preserves bandwidth on the other network segments and is called FRAME FILTERING.
LOOP AVOIDANCE
When two switches are connected together, redundant links between the switches are a good idea because they help prevent complete network failures in the event one link stops working.
Redundant links are extremely helpful but they often cause more problems than they solve, this is because frames can be flooded down all redundant links silmatenously creating network loops.
Switches use a protocol called STP (Spanning Tree Protocol) created by Digital Equipment Corporation (DEC) now Compaq to avoid network loops by shutting down redundant links. With STP running, frames will be forwarded only on the premium STP-picked link.
CONFIGURING THE CISCO 2950 CATALYST SWITCH FAMILY.
The 2950 switch is one of the Cisco Catalyst switch family's high-end model. The 2950 comes in many flavours and run 10Mbps all the way up to 1Gbps switched ports with either twisted-pair or fibre. They can provide basic data, video and voice services.
2950 SWITCH STARTUP
When the 2950 switch is first powered on, it runs through a Power-on-Self-test (POST). At first all port LEDs are green, and if upon completion the post determines that all ports are in good shape, all the LEDs blink and then turn off. But if the POST finds a port that has failed both the system's LED and the port's LEDs turn amber.
However, unlike a router, the switch is actually usable in Fresh-out-of-the-box condition. You can just plug the switch into your network and connect network segment together without any configuration.
To connect to the Cisco switch, use a rolled Ethernet cable to connect a host to a switch console serial communication port. Once you have the correct cable connected from your PC to the Cisco switch, you can start HyperTerminal to create a console connection and configure the device as follows:
1. Open HyperTerminal by clicking on start button and then All programs, then Accessories, then Communication, then click on HyperTerminal. Enter a name for the connection. It is irrelevant what you name it. Then click OK.
2. Choose the communication port either COM1 or COM2, whichever is open on your PC.
3. Now at the port settings. The default values (2400bps and no flow control hardware) will not work, you must set the port settings as shown in the figure below.
Notice that the bit rate is set to 9600 and the flow control is set to none. At this point click OK and press the Enter key, and you should be connected to your Cisco switch console port.
Here's the 2950 switch's initial output:
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [Yes/no]: no
Press RETURN to get started!
00:04:53: %LINK-5-CHANGED: Interface Vlan1, changed state to administratively down
00:04:54: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down 
Switch>

THE CONFIGURATION
The switch> prompt is called the user exec mode and it's mostly used to view statistics. You can only view and change configuration of a Cisco switch in privileged exec mode which you get into with the enable command.
Switch>
Switch> enable
Switch#
Switch# disable
Switch>
The global configuration mode can be entered from the privileged mode by using the configure terminal command or config t for short. 
Switch# config t 
Enter the configuration commands, one per line, End with CNTL/Z. 
Switch(config)# hostname zenith 
Zenith(config)#

The hostname command is used in naming the switch. The hostname of a switch is only locally significant but it's still helpful to set a hostname on a switch so that you can identify the switch when connecting to it.
SETTING THE ENABLE MODE PASSWORDS AND LINE PASSWORD.
Zenith> enable
Zenith# config t
Enter the configuration commands, one per line, End with CNTL/Z.
Zenith(config)# enable password bank
Zenith(config)# enable secret middle
The enable password bank command sets the enable password as bank and the enable secret middle command sets the enable secret password as middle. The enable secret password is more secure and it supersedes the enable password if it is set. The enable secret password and the enable password cannot be the same on the 2950 switch.
Zenith(config)# line ?
First line number
console Primary terminal line
vty Virtual terminal
Zenith(config)# line vty ?
First line number
Zenith(config)# line vty 0 15
Zenith(config-line)# login
Zenith(config-line)# password alex
Zenith(config-line)# line con 0
Zenith(config-line)# login
Zenith(config-line)# password malouda
Zenith(config-line)# exit
Zenith(config)# exit
Zenith#
The line vty 0 15, login and password alex commands set the telnet password to alex and the line con 0, login, and password malouda commands sets the console password to malouda.
SETTING IP INFORMATION
You don't have to set any IP configuration on the switch to make it work. You can just plug it in. But there are two reasons we set IP address information on the switch.
To manage the switch via Telnet or other management software.
To configure the switch with different VLANs and other network functions.
Zenith(config)# int vlan 1
Zenith(config-if)# ip address 172.16.10.17 255.255.255.0
Zenith(config-if)# no shutdown
Zenith(config-if)# exit
Zenith(config)# ip default-gateway 172.16.10.1
Zenith(config)#
The IP address is set to 172.16.10.17 and the no shutdown command must be applied to enable the interface.
CONFIGURING INTERFACE DESCRIPTIONS
You can administratively set a name for each interface on the switches with the description command.
Zenith(config)# int fastethernet 0/ ?
FastEthernet Interface number.
Zenith(config)# int fastethernet 0/1
Zenith(config-if)# description Sales LAN
Zenith(config-if)# int f0/12
Zenith(config-if)# description Connection to Mail server
Zenith(config-if)# CNTL/Z 
Zenith#

You can look at the descriptions at any time with either the show interface command or the show running-config command from the global configuration mode.
ERASING AND SAVING THE SWITCH CONFIGURATION 
Zenith# copy running-config startup-config 
Zenith# erase startup-config

The first command copies the configuration into the NVRAM (Non-volatile RAM) while the erase startup-config command erases the switch configuration.
Zenith# erase startup-config
Erasing the nvram filesystem will remove all files! Continue? [confirm] [Enter]
[OK]
Erase of nvram: complete
Zenith#
VIRTUAL LAN (VLAN)
A Virtual LAN (VLAN) is a logical grouping of network users and resources connected to administratively defined ports on a switch. When one create VLANs, one creates smaller broadcast domains within a switched internetwork by assigning different ports on the switch to different subnetworks. A VLAN is treated like its own subnet or broadcast domain, which means that frames broadcast onto the network are only switched between ports logically grouped within the same VLAN. 
By default, no hosts in a specific VLAN can communicate with any other hosts that are members of another VLAN. 
5.1 ADVANTAGES OF VLAN

A group of users needing security can be put into a VLAN so that no user outside the VLAN can communicate with them.
As a logical grouping of users by function, VLANs can be considered independent from their physical or geographical locations.
VLANs can enhance network security.
It can block broadcast storms caused by a faulty NIC (Network Interface Card) card.
VLANs increase the number of broadcast domains while decreasing their sizes.
VLAN MEMBERSHIP
VLANs are usually created by the administrator, who then assigns switch ports to each VLAN. Such a VLAN is called a static VLAN. If the administrator wants to do a little more work up front and assign all the host devices hardware addresses into a database, then the switch can be configured to assign VLANs dynamically whenever a host is plugged into a switch. This is called dynamic VLAN.
STATIC VLANs
Static VLANs are the usual way of creating VLANs, and they're also the most secure. The switch port that you assign a VLAN association to always maintain that association until an administrator manually changes that port assignment.
DYNAMIC VLANs
A dynamic VLAN determines a node's VLAN assignment automatically. Using intelligent management software, you can base assignment on hardware addresses, protocols, or even applications to create dynamic VLANs.
An example is the VLAN Management Policy Server (VMPS) service used to set up a database of MAC addresses that can be used for dynamic addressing of VLANs. A VMPS database maps MAC addresses to VLANs.
FRAME TAGGING
As frames are switched through the network, switches must be able to keep track of all the frames. Frames are handled differently according to the type of link they are traversing. The frame identification method uniquely assigns user defined ID to each frame. This is sometimes referred to as the "VLAN ID".
Each switch that the frame reaches must first identify the VLAN ID from the frame tag, and then it finds out what to do with the frame by looking at the information in the filter table. If the frame reaches a switch that has another trunked link, the frame will be forwarded out the trunk-link port.
Once the frame reaches an exit to an access link matching the frame's VLAN ID, the switch removes the VLAN identifier. This is so the destination device can receive the frame without having to understand their VLAN identification.
There are two different types of links in a switched environment, they are: 
Access links: This type of link is only part of one VLAN. Any device attached to an access link is unaware of a VLAN membership; the device just assumes its part of a broadcast domain. Access link devices cannot communicate with devices outside their VLAN unless the packet is routed. 
Trunk links: Trunk links can carry multiple VLANs. A trunk link is a 100 or 1000Mbps point to point link between two switches, between a switch and server. These carry the traffic of multiple VLANs from 1 to 1005 at a time. Trunking allows you to make a single port part of multiple VLANS at the same time. It also allows VLANs to span across multiple switches.

VLAN IDENTIFICATION METHODS
There are basically two ways of frame tagging.
Inter-Switch Link (ISL)
IEEE 802.1Q
The main purpose of ISL and 802.1Q frame tagging methods is to provide interswitch VLAN communication.
Inter-switch Link (ISL) Protocol: This is proprietary to Cisco switches, and it is used for fast Ethernet and gigabit Ethernet links only. ISL routing can be used on a switch port, router interfaces and server interface cards to trunk a server.
IEEE 802.1Q: Created by the IEEE as a standard method of frame tagging, it isn't Cisco proprietary so if you're trunking between a Cisco switched link and a different brand of switch; you have to use 802.1Q for the trunk link to work.
VLAN TRUNKING PROTOCOL (VTP)
This protocol was created by Cisco but it is not proprietary. The basic goals of VLAN Trunking protocol (VTP) are to manage all configured VLANs across a switched internetwork and to maintain consistency through the network. VTP allows an administrator to add, delete and rename VLANs on a switch, information that is then propagated to all other switches in the VTP domain.
Before one can get VTP to manage VLANs across the network, one has to create a VTP server. All switches sharing the same VLAN information must be in the same VTP domain.
One can use a VTP domain if there is more than one switch connected in a network, but if all the switches are in only one VLAN, there is no need to use VTP. VTP information is set between switches via trunk port.
This report exposes one to various aspects of computer networking, IP routing and IP switching and how to manage a network from an office network to larger networks. Areas covered in this report includes IP addressing, Network Address Translation (NAT), IP switching and Virtual Private Network (VPN).