vineri, 31 ianuarie 2014

Trying out Wifi WiMax

Many people in the world today have the need for unlimited access to the Internet. Unlimited Internet access is actually no issue. All you really need to do is subscribe to a good broadband or cable connection and you are good to do. Of course, this is only applicable when talking about 24/7 Internet access. If what you need is access to the Internet wherever you go, that is a whole different story. A slight solution to an all access Internet need is Wifi. Wifi, short for Wireless Fidelity, is a type of Internet connection protocol that uses wireless technology. Wifi provides mobile connectivity to any mobile device capable of wireless connection. This is a good solution to mobile needs, but Wifi is limited. If you go beyond the range of any Wifi router, you will no longer have access to the connection. Moreover, the farther you move away from the source signal, the weaker your connection will be. If you need all-around access to the Internet anywhere you go, then what you re ally need is Wifi WiMax. So what is Wifi WiMax? Wifi WiMax is a telecom protocol that provides mobile and other capable devices access to the Internet 24/7, regardless of location. WiMax is short for Worldwide Interoperability for Microwave Access. The term was coined by the WiMax Forum, the organization promoting the use of this new and innovative technology. WiMax is the ultimate mobile Internet solution as it can provide a reliable connection regardless of location. Wifi WiMax is often mixed up with regular Wifi. These two are actually not the same. Yes, they both use wireless technology but they work very differently. As mentioned previously, Wifi has a very limited range. WiMax, on the other hand, is wide-scale and unlimited when it comes to range. Even the most high-tech of Wife routers cannot match the range of a Wifi WiMax server. Another difference between the two is the fact that WiMax is a free-standing independent server. Regular Wifi is composed of a separate, line or cable-connected ser ver or modem and a Wifi router. A WiMax server is independent of any DSL or cable connection. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Although regular Wifi is currently more popular and more widely used than Wifi WiMax, it is expect that WiMax technology will overtake DSL and cable-related connections in the future. WiMax is considered to be the future of Internet connection; not only for mobile devices, but for other devices that need Internet connection as well. WiMax technology is currently available in almost all developed countries and some developing countries. If you want to try it out, all you have to do is go to your local telecommunications provider and ask if they offer WiMax services. If you sign up with them, they will take care of all the necessary needs your system will have to be able to handle a WiMax connection. WiMax can really give you mobility and power. If you want a taste of the future of connectivity, try it out.

access point vs router

Learn All about Fourth Generation Mobile Broadband

Smart shoppers know that the best way to get exactly what they want is to do the right amount of research before buying. And while it might seem like an obvious call when looking for a new car or considering upgrading a television set, this technique sometimes doesn't seem as obvious when it comes to services like cable versus dish television or even traditional web access versus the new world of options that make getting online from anywhere a whole lot easier. For those who would like to be able to connect to the net from anywhere, there is really only one choice out there that gets the job done: mobile broadband. While Wi-Fi might be great for hopping online to check email from a hot spot, it doesn't have the kind of far-reaching network ability that the new generation of communications from anywhere does. And anyone who has tested the limits of traditional Wi-Fi service knows and understands that once more than a few people connect to the same router, the signal is going to start seriously lagging. This means a world of frustration for those trying to upload files, download important information, or get any semblance of work done from the road. The reason that anything on a 4G network can get around this is the fact that the network has been built for speedy delivery of data. There is more room for information to speed across the country, meaning that data gets delivered quicker. And quicker delivery of data is what customers are actually concerned about when thinking about "speed" of a connection. Plenty of different companies, from the big cell phone providers to the latest web communications outfits, have embraced the world's speediest existing network, providing far better service for customers. For the latest generation of mobile broadband, this kind of network means that now it's possible to do anything from the road, without worrying about plugging into modem or sitting too close to a router. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Because of the fact that this alternative to Wi-Fi service now has towers that criss-cross the nation, there is uninterrupted service form coast to coast. A businessperson from one part of the country can take advantage of the same reliable signal from the west coast, hop on a flight to the east coast, and open a laptop the minute the plane touches the ground without having to spend time setting up networks or remembering passwords. That's a huge time-saver, and one reason that investing in this type of connection makes sense. While spending time roaming around the city or state is one reason to consider making the upgrade, the convenience of being able to get online from anywhere in the house is another crucial component of switching to WiMax. Because there is no central router to worry about, surfing the web from home is no longer about getting stuck at a desk in a home office. Whether it's freelancing and telecommuting or simply enjoying some music while whipping up dinner via web radio, it's possible to enjoy a strong signal from anywhere in the house. And that's something entirely new for plenty of people who count on the world wide web for work and entertainment needs.

access point vs router

Remote Viewing Explained

Remote television viewing on your Slingbox is not only an extremely useful tool, but also a great way to enjoy all of your favorite programs while on the go. Using any high speed broadband connection, you can turn your monitor into a high quality and high speed television viewing apparatus. But what exactly is remote viewing? In this article, remote television viewing using a Samsung tv will be explained and detailed. First, this article is going to detail all of the particular details that need to be worked out on the home end. This will be where your actual Slingbox peripheral will be attached to your television, for this I recommend Samsung tvs or a 22 inch LCD tv. The first step if to connect the Slingbox unit to the television that you want to have control over. You can attach the Slingbox via S-Video, composite, or a co-ax aerial cable. Next, you need to connect the Slingbox to your broadband router. Your router should be attached to cheap laptops, as more expensive ones are not as cost effective. Once attached, you need to procure the Slingbox software, which comes included in the Slingbox packaging or available on the Slingbox website. To properly set up the software, you need to connect the Slingbox to your router and allow external connectivity to your Slingbox. The easiest way to do this is with the included Slingbox software. However, if this doesn't work properly, you can manually forward the ports, the numbers of which are updated frequently and are available on the Slingbox homepage. Once this is all taken care of, you will have a Finder Identification number that you will need at the "Away" end. The away end is typically described at the end where you will be doing the remote viewing. This will be the final part of the article, where we will finally detail how to set up the actual remote viewing aspect of the Slingbox. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; For this section, you will need either a PC or a Macintosh with a high speed internet connection. First, you need to download and install the Slingbox software onto the desktop or laptop that you want to view your television on, which you can acquire from slingbox.com. Next, you will need to make sure that you are set up properly to your internet connection, and that you are truly receiving high speed internet. If this is not the case, the video that you will be viewing will be choppy and pixelated. Once this is done, you should start the actual Slingbox software, and enter the Finder identification number, and once this is done you will be able to start streaming television on your computer.

access point vs router

2wire Wireless Adapter

With all the way to connect your Dish Network receiver to the internet, how about connecting with a 2wire wireless gaming adapter. I will be using the 2wire wireless adapter from the 1022 At&t Homezone on a Vip 612 receiver. What I am showing you will also work with all the Vip and K series Dish Network receivers. This 2wire gaming adapter can also work on your Xbox, PS3, Pc, laptop etc. To setup you 2wire gaming adapter with your Dish Network receiver you will need the following: � Computer � 2Wire Wireless Gaming Adapter � Wireless Router "I'm using a 2wire 2700 HG-B � Vip, K series or receiver with ethernet The first thing that you must do to setup your dish network receiver with the wireless gaming adapter is to configure the gaming adapter to be able to talk with your wireless router. So what you will need to do is plug the 2wire wireless adapter directly into your router and power the wireless adapter on. Then point a web browser to your routers default gateway. This will usually be 192.168.1.1 or 192.168.1.254. Once your web browser open up your wireless router's default gateway screen look for an option that will allow you to see the ip address of 2wire wireless gaming adapter. Once you find the wireless located in the list, click on view details to see the ip address. Now that you have the ip address of the gaming adapter, you will now need to type this address into your web browser. You should now see a screen that resembles the image below, which will allow you to change setting on the 2wire gaming adapter. Open up the wireless setting option from the list on the left side of the screen. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Within screen you can now see a list of all the local wireless networks within range of the adapter. Pick your wireless network from the list and fill in the detail for you security encryption. The only problem is that 2wire gaming adapter does not work WPA2, but works with WEP and WPA. After you have configured you wireless adapter, unplug it from you router and now plug it into your Dish Network receiver. Once you plug in the power cord, press the menu button on your dish network remote. Then press: � #6 for system setup � #1 for installation � #8 for broadband setup � #1 for Network Setup Now all you have to do is reset your connection to acquire the ip address from the gaming adapter for the dish network receiver. If you see a 0.0.0.0 then there is a problem. Your Dish Network receiver is now online and ready to begin downloading content from Dish On Demand. Just press the DVR button and press #5 for Dish ONLINE. If you have any problems make sure that you have setup port forwarding for the port range of 2200 - 2299.

access point vs router

Practical Uses of Mobile Hotspot for Business Travelers

Business travel has become second nature for organizations competing to expand their operations. Every month several business trips to different destinations are organized for individuals. During the business travel time, mobile hotspot plays an important role in surfing on the Internet. Among pocket mobile hotspot devices, ZTE MF60 mobile hotspot is one pretty kick-ass unit for business travelers -- small(about the size of a credit card), lightweight, bar soap shaped 3G/WiFi router. It actually supports HSPA+ networks. That means you can theoretically reach as fast as 21Mbps over mobile internet. It is very beneficial for travelers. Being able to take such high-speed connections with you to anywhere you go is something which can be put to very good use. No time will be wasted when you have this kind of technology in your pocket -- literally. Everybody can benefit from the MF60 mobile hotspot. Students can finish their homework on the bus ride back home. Journalists can research on their topics while on their way to the office. Business travelers, on the other hand, have a lot to gain from this technology. Business travelers don't have a lot of time in their hands - and when they do make time, they usually use it up on even more business work. Time is very important for them, as is efficiency. And with MF60, they get to focus on what they need to do. One use of the mobile hotspot for business travelers is, of course, on long business trips. Instead of having to waste the idle time while waiting for the plane, train, bus, or whatever vehicle to get to the destination, business travelers now would have the option to go online and finish everything that needs to be finished. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; They can even start a business meeting early, while on the plane to feel out their business prospects before meeting them face to face. Imagine being able to prepare your presentation on the way to the meeting, getting through the meeting, and then writing your report and sending it to your boss on the way back. Now that's efficient. The advent of the WiFi MF60 has truly created the first practical. However, what would best help business travelers when using the MF60 is their personal life. Business travelers give up most of their time for work, leaving only a couple of hours (if there are at all) for their families. As they are always on the go, they don't have time to sit down at a coffee shop to access the WiFi to instant message their spouse or kids. With this device, they can talk to their families while traveling, keeping them in touch while working. The importance of this transcends business theories -- nothing inspires you to work harder more than your family. And being able to hear them and even see them while you're on your way to that very important meeting which could land you a big promotion would do wonders to your self-esteem and confidence -- and that would most likely be the factor between closing the deal and losing it to the competitors. So the mobile hotspot is a big boon for business travelers -- both for their professional and personal lives. This mobile hotspot technology helps a lot of people from all walks of life -- but business travelers, almost as much as anyone, get a lot out ofhis. Mobile hotspot is surely a welcome addition to their business arsenal. Besides the MF60, Huawei E586 is also a good choice of mobile hotspot for traveling.

access point vs router

Dfl-860 Utm Security Firewall ? Ideal Solution for Small Businesses

As an Information Technology manager who is in charge of the availability, the confidentiality, and the integrity of your small business information system � you should build a high performance and secure network infrastructure. To build a secure network infrastructure you should have a strong security protection in the entry point of the internet by implementing the UTM appliance. UTM ( Unified Threat Management) appliance is a very essential device in protecting your network environment against any types of emerging internet threats which always evolve to get smarter in penetrating your system vulnerabilities which cannot be just blocked by layer-2 and layer-3 devices such as traditional router / firewall. Your system must be able to scan deep up to the application layer. The other important system you need to have for your small business network infrastructure is the capability of creating the secure tunnels for remote sites or travelling users to your internal network through the internet as if they work locally in the office. With the limitation of the personnel experts in networking and security, you have lots of works to do. But with all-in-one UTM security appliance you can build a secure small business network easily. Consider D-Link NetDefend DFL-860 � a single solution for UTM and VPN firewall appliance. What this Product Does DFL-860 UTM Security appliance is an all in one device � a core device for building secure network infrastructure in protecting your small business against any emerging internet threats. The device includes two WAN Ethernet ports for load balance internet connection or failover when the primary connection fails. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; For your small business, you can subscribe broadband internet plans both cable and DSL for load balance or fail-over. The DFL-860 also includes one DMZ port to allow you setup a security boundary when you require hosting a public resource such as a Web or FTP server. VPN Supports The DFL-860 includes integrated Virtual Private Network (VPN) client and server to allow remote sites or traveler users to create secure tunneling to connect to your private network via the internet. With secure tunneling they can access the office network resources such as email, files, or application via the internet as if they were connected locally. The firewall supports the IPSec, PPTP, and L2TP protocols and if you have external RADIUS server, you can use the RADIUS for VPN authentication. Advanced Security The D-Link DFL-860 NetDefend UTM firewall security appliance provides a complete security features and allow you manage the bandwidth, the URL filtering, access policies, and network monitoring including email-alerts, system logs, and real-time statistic and the good thing is that you can manage remotely. Unlike traditional router / firewall, the DFL-860 includes a high-performance threats management to scan the internet packets deep into up to the layer-7 (application layer) including the IPS (intrusion prevention system), gateway antivirus, and up-to-date content filtering services. This will assure a clean network against any types of Internet threats. To defend your system against the viruses, the DFL-860 uses stream-based virus scanning technology to help you reduce network bottleneck and the virus signature from Kaspersky Labs. To help you filter the Web for clean internet, the device includes the web content-filtering services by implementing multiple global index servers and updated in a real-time. Unfortunately, those update services to assure your secure network is not free. You have to spend lots of bucks for security trade off. Security is not free, it's very expensive but it is worth for protecting your valuable information assets. Alternative Solution For SOHOs, you can consider Cisco RV 120W. Cisco RV 120W is a Wireless-N VPN Firewall and VLAN Router which is ideal solution for small offices. The router includes the wireless access point to create wireless LAN for your office. For small to medium businesses, you can consider NSA 240 Sonicwall Small Business Network Security. NSA 240 Sonicwall is ideal for your small business and complex environment. It includes 3xGigabit Ethernet ports; 6x 10/100Mbps ports (configurable Ethernet interfaces); 2USB and PC-Card slot (for optional 3G modems). By Ki Grinsing

access point vs router

joi, 30 ianuarie 2014

Voip - Internet Broadband Phone Services

What is VoIP - VoIP stands for Voice over Internet Protocol. VoIP also called VoIP, IP Telephony, Voice over Internet Phone, VoIP Telephone, Broadband Telephony, Broadband Phone, Voice over Broadband, or simply the Internet Phone. Voice over Internet Protocol (VoIP) is a protocol optimized for voice through the Internet or other switched network. It is described as the transmission of voice traffic over IP networks, a unique technology that allows us to make calls using a broadband Internet connection (broadband modem) instead of a telephone line (analog) regularly. Initially, the Internet Protocol (IP) was originally designed for data networking systems. Later, with its success in the data networking field and the explosion of the Internet era, was developed in VoIP networks, and today he brings us the most profit in this area. VoIP is increasingly popular because of cost advantages to consumers over traditional telephone networks. A brief explanation of how VoIP Phone work? - The traditional phone system is using analog phone signals to deliver and receive calls using the VoIP system, it is by means of digital signals that can be sent over the Internet. If you have a quality Internet connection - DSL (Digital Subscriber Line), described as high speed Internet service that allows a fast connection to the Internet), you can get phone service provided by your Internet connection instead of from your company local service. In essence, here is how it works. PC to PC: Computer connects to Broadband Modem connects to Internet connects to Broadband Modem connects to Computer. PC to Phone: Computer connects to Broadband Modem connects to Internet connects to Telephone Network connects to Telephone. Phone to Phone ( using Router ): Telephone connects to Phone Adaptor connects to Router connects to Broadband Modem connects to Internet connects to Telephone Network connects to Telephone. Benefits of using VoIP: There are two major reasons to use VoIP: Low Cost and More Profits. Low Cost: Phone services via VoIP costs less than equivalent services from analog systems. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; In a traditional analog phone service, users pay a fixed monthly fee for the service, and pay fees to other telephone services, long distance, as well as charging per minute. VoIP users who have high-speed Internet service (DSL) can benefit from this service - Many VoIP service providers allow you to enjoy unlimited calls over the Internet - means that you can play other clients on the network without no charge. Other companies allows you to call any number, including local, long distance, mobile and international numbers. International calls for users who using VoIP can get big savings with lower rates. Depends on each VoIP service offer, you can enjoy unlimited calling worldwide to many destinations for a flat monthly fee with no minute charge or low rates. More Profits: Compares to analog phone networks, VoIP has more advantage functions. You can make calls from your personal computer to others computer or others regular phone, or you can make calls directly from your regular phone to others regular phone. Besides, The digital signals let you enjoy high quality voice and many advantage services such as Voice Mail, Caller ID, 3-Way Calling, Call Waiting, Speed Dial, Repeat Dial, Do Not Disturb, Call Forwarding, Emergency 911 Service, Online Account Management, Virtual Calling Card, access the service to your cell phone. Incoming calls are automatically routed to a VoIP phone where ever you connect to a network, so you can take a VoIP phone, with you on a trip, around the world - anywhere you can connect it to the High Speed Internet, you can call and receive your incoming calls anytime. VoIP Router can be placed anywhere with high-speed Internet, it provides you the advantage of savings. For example, a VoIP provider allows you get the US number and connect the router outside of the US. So when you call to that number, just like you call locals, and the person who is in other country calls you by using this service (connected through router) just pay a very small charge per minute, or sometimes its free.

access point vs router

The Energy Efficient IT Equipment Market to 2020 - Increasing Capital Requirements and Significant Inefficiencies Boosting Green Data Centers

The Energy Efficient IT Equipment Market to 2020 - Increasing Capital Requirements and Significant Inefficiencies Boosting Green Data Centers Summary "The Energy Efficient IT Equipment Market to 2020 - Increasing Capital Requirements and Significant Inefficiencies Boosting Green Data Centers" provides key information and analysis on the market opportunities in the energy efficient IT equipments in data centers. The report does a detailed assessment of the market forces influencing the energy efficient IT equipments market in data centers. It segments the global energy efficient IT equipments market on the basis of geography, business segments and end-users. Data Centers, widely considered the backbones of IT Infrastructure of Global corporations, are undergoing robust growth globally due to the increasing IT requirements of businesses. Globally carbon ""Cap and Trade"" programs are gaining steam with tighter regulations on businesses emitting greenhouse gases. These are some of the trends making cases for how conducive the ecosystem is, facilitating the offtake of Green IT products, services and practices. The report has a dedicated chapter on the regulatory framework and provides comprehensive profiles of key players in the industry. IT equipment has traditionally been benchmarked on performance with no clear metrics for energy efficiency. The manufacturers always focused on performance and thus, they failed to check the increase in power demand by IT equipment. Now, data centers are the �energy hog' of an organization. The networking infrastructure is becoming a growing portion of the energy footprint in data centers. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; With rising energy prices affecting every sector of industry, increasing energy consumption can no longer be kept on the back burners. Furthermore, these are mounting regulatory pressures from governmental quarters � the EU Code of Conduct for Data Centers and the European Commission putting forward the climate action and renewable energy package of proposals. This report is built using data and information sourced from proprietary databases, primary and secondary research and in-house analysis of industry experts.Scope - Key geographies such as the United States (US), Canada, the United Kingdom (UK), Germany, France, Italy, Spain, Japan, China, India, Australia, and Brazil - Qualitative analysis of market drivers and restraints for the global energy efficient IT equipment market. - Market revenue and unit shipment of the global blade server market from 2005 to 2009, forecast forward for 11 years to 2020. - Market revenues of the global energy efficient network storage market from 2005 to 2020. - Market revenues of the global switch market from 2005 to 2020. It also contains the global switch market revenue breakdown on the basis of top layer and bottom layer network switch - Market revenues of the global router market from 2005 to 2020. It contains the global router market for service provider router and enterprise router - Competitive landscape includes the market share and product portfolio of key players in server, storage, switch and router market for the year 2009. - Key topics covered include the distribution structure, technology analysis, regulatory framework including the standards, patents etc. Reasons to buy The report will enhance your decision making capability in a rapid and time sensitive manner. It will allow you to: - Develop business strategies by understanding the trends and developments that are driving the global data center IT equipment market - Design and develop your product development, marketing and sales strategies - Identify key players best positioned to take advantage of the emerging market opportunities - Develop business strategies and future plans by the region wise understanding of the data center IT equipment market future trends - What's the next big thing in the data center It equipment market landscape across the world? � Identify, understand and capitalize - Make more informed business decisions from the insightful and in-depth analysis of the data center IT equipment market and the factors shaping it. For more information, please visit :/reports/The-Energy-Efficient-IT-Equipment-Market-to-2020-Increasing-Capital-Requirements-and-Significant-Inefficiencies-Boosting-Green-Data-Centers-58326.html

access point vs router

The Writing Is On The Wall, Ping Has a Limited Time To Live

There is a truck full of information that you can derive from a ping test. But detailing all the variations would require an entire book. So in this article we want to drill right down to one really useful statistic that is often overlooked - the Time to Live field. In the example below a Windows PC has just �pingged' � i.e. sent an ICMP echo request to another host with the IP address 192.168.23.1. We can see from the output that the host 192.168.23.1 has replied and that the time taken between the original request and the receipt of the reply is also recorded for each request. C:\WINDOWS>ping 192.168.23.1 Pinging 192.168.23.1with 32 bytes of data: Reply from 192.168.23.1: bytes=32 time=10ms TTL=250 Reply from 192.168.23.1: bytes=32 time=17ms TTL=250 Reply from 192.168.23.1: bytes=32 time=10ms TTL=250 Reply from 192.168.23.1: bytes=32 time=61ms TTL=250 Ping statistics for 192.168.23.1 Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 10ms, Maximum = 61ms, Average = 24ms To the right hand side of the output (the line beginning with Reply from�) we can see a TTL= variable. This is the Time to Live field that we will discuss in this article. Firstly, the TTL is in place in order to prevent the packet from bouncing indefinitely if a routing loop is encountered. A routing loop occurs when two routers have the same destination pointing towards each other, so the packet is forwarded back and forth between the routers who essentially disagree on the direction of the destination. Because the ping packet, more correctly known as an ICMP packet, decrements the TTL field every time that it crosses a router, the number of times the packet can be bounced back and forth is limited. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; This prevents the packet from getting stuck in an endless loop. In fact, Windows limits this to 255 bounces by default. That is the reason for the TTLs' existence. But the information it provides can also assist in interpreting the other information presented in the output. Since we now know that the formula 255 - TTL indicates the number of hops taken to reach the destination we can use this information, together with knowledge of the network and the rest of the output to help to draw an accurate picture of the ping packet's journey. Say, for example, that the TTL differed between packets as seen below. Reply from 192.168.23.1: bytes=32 time=10ms TTL=253 Reply from 192.168.23.1: bytes=32 time=27ms TTL=250 Reply from 192.168.23.1: bytes=32 time=10ms TTL=253 The varying TTL variables above indicate that packets are taking different paths to the destination. In this case packets 1 and 3 had a TTL of 253 suggesting that the packets traversed 2 routers on their way to the destination while packet 2 traversed 5 routers. A significant variance in delay can also help to highlight that one of the paths is experiencing impairment. Another example of how this field is useful is the fast identification of inefficient routing. If a high number of hops is encountered when the destination is reasonably close to the source then this can be an indication of inefficient routing. An important gotcha with the TTL field, however, is that it does not decrement as it traverses an MPLS cloud or other layer 2 switched technologies such as frame relay. This field is not touched when Layer 2 switching technologies carry the packet within a cloud because the packet is not being routed through that section of the network, it is being switched. In summary, as a field on its own - TTL performs the important function of loop prevention. But used in perspective to the other information provided by the ping output the time to live adds another level of detail to icmp output that can help to shed light on variable delay results.

access point vs router

dLAN adapters - create a network of local power, Internet and audio

Previously, most digital music sold on CDs. But since its launch the MP3 player has made his CDs increasingly disappeared from the picture. MP3 music was very popular about 10 years ago, but the only way to enjoy MP3 was through special software on your computer. What is it? An Internet radio, network music often called is a device that autonomously receives and plays music from the computer, internet radio stations or online music services via the home network. Background Previously, most digital music sold on CDs. But since its launch the MP3 player has made his CDs increasingly disappeared from the picture. Especially since the music on CD is uncompressed state. This makes music so great that it is very inconvenient for this to send via the Internet or on a MP3/4-speler turn. With the advent of the MP3/4-speler and the ease of converting and compressing CD music, almost all music is now stored in digital format as an audio file on your computer. The most common formats are MP3, WMA, RealAudio, and AAC. Compressed music has become the music format du jour, and for good reason: it is very easy to store, take or send it online. Songs are also equipped with a tag and thus easier to find and share with your friends. MP3 music was very popular about 10 years ago, but the only way to enjoy MP3 was through special software on your computer. While the computer was meant to "help" as the source. By storing music, he was in fact used as a sort of 'Hi-Fi system. In the ever growing and developed multimedia landscape more is possible with MP3 music. In recent years the MP3/4-speler highly developed and also with your mobile phone you can listen to music. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; However, they have one disadvantage: they have nowhere near as much storage as the computer. There is a need for a solution... The Internet And that solution has also come, the Internet, also called network music player. You can connect to a wireless router (Wireless), (often B standard Wi-Fi or Wi-Fi G standard compliant). This router is connected to your home network and your computer. Through this (wireless) internet connection can access the music collection of the user on the computer. But can they access Internet radio stations and online music. Accessories For the Internet, you have a (wireless) router with which this 'online' can go. Looking at other places use the Internet, such as the attic or the barn, then you need dLAN. What is dLAN? dLAN stands for direct Local Area Network. With the dLAN adapters, you can create a network of local power, Internet and audio. With the adapters you can use the Internet to connect to the router without wrangling with cables. The network traffic passes through as your mains. You connect an adapter to your router and plug the other adapter in your internet and as you can in the attic, in the barn and every other place where the Internet is moderate, enjoy your music. The benefits: * It is wireless; * You have not because you lack the storage capacity of your computer; * You can reach many areas worldwide; * It is extensive with approximately 13,000 radio stations that you can achieve. Fans and owners of the Nintendo Wii all across the country will take this as good news. Conrad Electronic UK�s online electronics store will now feature a new USB network adapter that will help you access high-speed internet on the big-screen TV right in your living room. These USB adapters can be used on PC�s and Mac�s too, and are much better options than Wireless LAN connections, since pure LAN can offer much faster speeds substantially in comparison. Whether it�s watching HD videos on YouTube or streaming media on your home network, you can do it all from the comfort of your sofa with the Wii wireless controllers. And to top it all off, the USB network adapter doesn�t need drivers to run, just plug it into your console and things will be up and running.

access point vs router

Qno Help Normal School Campus Bazhou Case - Campus, Normal School - Education Industry

User Background Bazhou founded in 1938 Normal School, located in China First State?? Bayinguolen Korla City, the capital of culture road. Schools less than 700 meters away from the town square, transport facilities, beautiful scenery, an "autonomous region single national unity and progress Bit, "" autonomous spiritual advanced unit "and" comprehensive management of advanced unit "and many other titles. Covers an area of 61,272 square meters. The existing classroom building two, 8000 square meters, can accommodate more than 50 classes ; a teacher's office, reading room, information room, campus closed-circuit systems, multimedia, electronic classrooms, studios and other laboratory building with a library, 2,300 square meters. equipped physical, chemical, biological, experimental, Audio-visual , Language, computer room. (586-type computer network 50 sets); 2001 invested over one hundred million construction cost to first-class Gigabit backbone Campus Network Contact, also has first-class multi-network engine room, "electronic reading room" teachers "e-lesson preparation room" and other modern teaching facilities; reading room, library books 85 000, 219 kinds of newspapers. Art Body Building 1: 2195 square meters, equipped gym, music room, dance room, studio, pian o room. Student Restaurant 1, 2 layers, total 1528 square meters, the implementation of computer Canteen. Two student dormitory. Standard Sports 1 (state government has decided that the school building west), the training hall? L months, experimental primary schools, kindergartens, the one experiment, the existing facilities can accommodate more than 2,000 students enrolled in school. Existing school faculty 144, of whom 89 were Chinese, Mongolia 34, Victoria 21, back to 3 people, 98 full-time auditors, teachers reach college degrees account for 90% of the total number of teachers, including senior 18 lecturers, 51 lecturers, to help about 29 people, more than 2,000 people in school, while more than 300 college students in correspondence courses. User needs With the network information Technology Continuous development, in order to strengthen the information infrastructure and educational resources, thus further strengthening the computer and network management, unified network standards, to achieve the campus network and information to promote the network application to promote and enhance the efficiency of school management and office automation to improve efficiency. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Normal decision Bazhou structural transformation of the old and new campus, new and old campuses within the realization of Gigabit fiber connections, external network security by QNO routing technology to connect wide area network products, internal and networked unified management, resource sharing, etc., outside information release, build schools and outside window for exchanges requirements. In the information society, the network increasingly become an indispensable part of life. Bazhou Normal School campus into the future, for students in Beijing to manage the information dissemination activities carried out outside education and teaching activities, to provide universal access to quality education, network conditions, specific application requirements are as follows: Building a WEB Server , Normal Bazhou construction site, internal information technology to achieve integrated management, implementation of information publishing, advertising and other functions; Build an FTP server, to achieve resource sharing within the network; Create an integrated office environment, providing staff with desktop multi-function office environment that addresses the needs of office staff to handle different services use different working conditions; Support the transmission of information, to solve by hand delivery or magnetic media information paper at the problem, to achieve efficiency and reliability improve; Provides a window for exchanges between schools and outside school as well as related campus network users associated with the Internet, through the campus network to understand the world; By Router Unified user management, access to the different levels of management, license requirements, to achieve flow control, port mirroring requirements. Related through a router Firewall Functions for network security management. Network scheme Campus network for telecommunications a fixed IP, router products through QNO single WAN port to connect the Internet to achieve, within a network router LAN port to connect more than three-gigabit core Switch Structural backbone network, the division of multiple VLAN to meet the multi-user client access requests, new and old campus single-mode fiber connectivity through Gigabit core switching, to achieve new and old campus network connection. At the same time through the router's port mapping feature to achieve within the network of Web servers and FTP servers external connection. Specific network structure of the network as shown below.

access point vs router

miercuri, 29 ianuarie 2014

Steps to be taken to start a home business

I am planning to start a stock broking firm in one portion of my house. This will be a partnership based business with my friend. Since we have to start everything from the scratch, we have to plan a lot. As a first step we will first concentrate on home network set up. After setting up a home network we will divide it into several terminals and carry out all kinds of trading such as day trading, futures and option trading, commodity trading and Forex trading. To set up all these we are in search of an excellent network administrator. Before calling the network admin we thought of doing some research by ourselves. From the research we got so many details about networking. We think a Wi-Fi network will give a better connection than the wired one. Since Wifi network does not need any cable wires the conection will be reliable and fixed. Most of the routers have few ethernet ports, so even old PCs can be connected to the network. Buying a wireless router and some wireless network interface cards can help us in setting up a wireless home network. A home network setup with a wireless router can be finished in 5 to 6 steps. Since steps related to home network set up is purely technical it won�t digest. By placing the wireless router in a central location every room in the building will be covered by the wifi signal. Since so many Internet service providers are introducing wifi hotspots in central locations, the need for home networking is reducing day after day. However, we are planning to buy one wireless router for our business. We know that the installation guides in Microsoft wizard will take us through the procedures of adding other computers and devices to the network; still we are not sure whether it will come out well or not. So we will call a network expert to do all those stuff. By setting a home network half we can complete half of the job. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Next we have to advertise our brokerage firm in newspapers, radio, TV channels and in various websites. As customers are the backbone of a stock broking firm, we will try our level best to enroll more and more customers. For that we have to approach a good advertising firm and create an eye-catching video and audio advertisement. Some of the services offered by our advertising firm are as follows:- A helping hand to open trading account - For new users we will give all the possible help to open a trading account. This account will help them in doing day trading and long-term trading. Online share trading- This facility allows customers with share trading account to buy and sell shares. Our brokerage firm allows traders to do online share trading and telephonic share trading. Some of the services available free with this facility are day trading tips, stock holding tips and intimation about current account status. Stock portfolio management- While experienced investors choose stock according to their wish, inexperienced ones needs expert support. Our stock broking firm will help such type of investors to manage their stock portfolio. The portfolio managers give advises to investors, about when to buy and when to quit. IPO purchases � We will inform investors about initial public offerings. We will also place bid for IPO shares on behalf of customers. Daily, weekly and monthly stock newsletters � These types of newsletters help customers to know more about the market and the existing economic conditions. Some of the articles in the newsletter will throw light into the areas such as best trading stocks, stock market trends, different companies and their performances and general political and economic scenario. We will start our firm as early as possible. Let's hope for the best.

access point vs router

Dynamic Host Configuration Protocol

Dynamic Host Configuration Protocol works in a client/server mode. DHCP enables clients on an IP network to obtain or lease an IP address or configuration from a DHCP server. This reduces workload when managing a large network. DHCP protocol is described in the RFC 2131. Most modern operating system includes DHCP in their primary settings, these includes windows OS, Novell NetWare, Sun Solaris, Linux and Mac OS. The clients' requests for addressing configuration from a DHCP network server, the network server manages the assignment of IP addresses and must be obliged to answer to any IP configuration requests from clients. However, network routers, switches and servers need to have a static IP addresses, DHCP is not intended for the configuration of these types of hosts. Cisco routers use a Cisco IOS features known as Easy IP. This offers an optional but full-featured DHCP server. Easy IP leases address for 24hrs by default, it is most useful in homes and small offices where users can take the advantages of DHCP and NAT without having an NT or UNIX server How DHCP works DHCP works by providing a process for a server to assign IP configuration or address to clients. The assigned configuration from the server is for an administratively defined period then it will be withdrawn, when the address is expired, the client must request for another address, although, in most cases the client is issued with the same address. The DHCP sever uses User Datagram Protocol (UTP) as it's transport protocol to send message to the client on port 68, while the client uses port 67 to send messages to the server. DHCP severs can offer other information, this include, DNS server addresses, WINS server addresses, Domain names, and in most servers administrators are allowed to define clients MAC addresses, which the server automatically assigns same IP, address each time. Advantages. 1. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; The configuration of DHCP on a default router saves time that could be wasted for the configuration of other user workstations. Other device can be simply plugged into the network at any point, and DHCP will automatically allocate an IP address for that location. 2. Because IP configuration is not done manually, this minimizes error; helps in management and centralized control over configuration information. 3. Another remarkable feature of DHCP is the allocation of IP addresses for a given period of time, called the lease period. If a client device decides to keep an allocated IP address for longer than this period, it must renew the lease before it expires. Clients are free to renew their leases as many times as possible. Disadvantages. IP addresses allocated by DHCP are duplicates, and this can cause serious problems on a network, most DHCP servers' track address conflicts. They do this by attempting to ping each IP address before telling a machine or end device that it is safe to use the address. A lot of DHCP clients send an ARP request to verify if the allocated IP address is not already in use before using it. Nevertheless, some DHCP clients and servers do not check before using an address.

access point vs router

Fasten your internet speed

This article describes how to speed up your Internet connection without use of web accelerators, and is geared towards Windows and Internet Explorer. Step 1 Do some basic maintenance on your PC. Run Disk Defrag, a scan disk, a virus scan, a malware scan, and clear your recycle bin. An unusually slow Internet connection experience is often the only sign that your computer is infected with viruses or other malware. Delete old files and temporary files. Never allow the free space on your C: drive to be less than 10% of the total size or twice the installed RAM (which ever is larger). A well maintained PC will operate much better than a PC that has never had any maintenance. Google or your local computer repair store should be able to help you with this if you don't know how. Step 2 fasten your internet speed Reset Your Home Network. Sometimes restarting your home network if you have one will drastically increase the speed of your connection. Step 3 fasten your internet speed Optimize your cache or temporary Internet files. These files improve your Internet connection performance by not downloading the same file over and over. When a web site puts their logo graphic on every page your computer only downloads it when it changes. If you delete the temporary files it must be downloaded again. if you disable the cache, it must be downloaded every time you view a page that uses it. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; This can be done by opening Internet Explorer, clicking on "Tools" at the top and choosing "Internet Options". On the General tab, click the "Settings" button next to Temporary Internet Files. Set Check for newer versions to "Automatically". Set amount of disk space to use to 2% of your total disk size or 512 MB, which ever is smaller. On Firefox, click "Tools" then "Options," and go to the privacy tab. Then click on the Cache tab within this. Step 4 Never bypass your router. Most routers include a firewall that is very difficult for hackers to defeat. If you don't need to use Wireless then hook your computer directly to your router. Routers will only slow down your connection by a few Milli-seconds. You won't notice the difference but the hackers will. Step 5 fasten your internet speed If you are using a Wireless router, make sure it doesn't conflict with a cordless phone or wireless camera. Wireless routers come in two varieties; 802.11bg (2.4Ghz) or 802.11a (5.8Ghz) If you are using a 2.4Ghz Cordless phone and 2.4Ghz Wireless router then your Internet connection speed will slow while you use the cordless phone. The same is true of wireless security cameras. Check on your phone and camera, if it's 900Mhz then it's fine. If it says 2.4Ghz or 5.8Ghz then it could be the cause of your slow connection speed while they're in use. Step 6 Call your Internet service provider (ISP). Sometimes you just have bad service. They can usually tell if your connection is substandard without having a technician come to your home. Just be nice and ask. Step 7 Upgrade your computer. If your computer is slow, it doesn't matter how fast your Internet connection is, the whole thing will just seem slow. You can only access the Internet as fast as your PC will allow you to. Step 8 Replace your old cable modem. Any solid-state electronics will degrade over time due to accumulated heat damage. Your broadband modem will have a harder and harder time �concentrating' on maintaining a good connection as it gets older (signal to noise ratios will go down, and the number of resend requests for the same packet will go up). An after-market cable modem as opposed to a cable-company modem will frequently offer a better connection. Step 9 Often your connection speed is slow because other programs are using it. To test if other programs are accessing the Internet without your knowing, Click Start, Click Run. Type "cmd" (without quotes). Type "netstat -b 5 > activity.txt". After a minute or so, hold down Ctrl and press C. This has created a file with a list of all programs using your Internet connection. Type activity.txt to open the file and view the program list. Ctrl Alt Delete and open up the Task Manager. Go to the process menu and delete those processes that are stealing your valuable bandwidth. (NOTE: Deleting processes may cause certain programs to not function properly) Step 10 After you have tried all this try your connection again and see if it's running any faster. Tips Call your ISP and have them verify all of your TCP/IP settings if you are concerned. Ask them to verify that your Proxy settings are correct. Don't expect dial up or high speed lite service to be fast. The Internet is primarily geared towards Broadband Connections. Sometimes, you have to wait a little. Download programs that make browsing faster: Loband.org is a browser inside of a browser that loads web pages without the images. Firefox and Opera both have options to disable images. In Firefox, you can also use extensions such as NoScript that let you block scripts and plug-ins that would otherwise slow things down a lot. If you are using Internet Explorer or Firefox, try downloading Google Web Accelerator. It is meant to speed up broadband connections, but it can also slow your Internet connection. Try enabling it and disabling it and see when your Internet connection runs faster. If you are using Firefox, download the Fasterfox extension and Firetune. Reduce the amount of programs running that use your Internet connection (Instant Messengers, RSS Feeders, and MS Applications set to send Internet data) Google Accessible Is designed to search pages in order of how clean they are of junk. This will bring up pages that are usually not only easy to read, but are quick to load. Upgrade your RAM. This will not only improve your regular computer use, but it will affect the speed of your Internet connection because your computer works faster. Use the Stop button to stop loading pages once you've gotten what you want. Some times malware on your computer can eat up your bandwidth. Make sure you have an up-to-date malware protection program.

access point vs router

Centralized Network Storage

Network Attached Storage As we store more of our entertainment media in digital format, our storage needs have increased. While megabytes of storage were once considered adequate, today we require gigabytes and sometimes terabytes. While DVDs, with a capacity of about 4.7 gigabytes , were once considered high quality, now BD ( Blue-ray Disc), with a 50GB capacity , is considered high quality video standard. As our usage and desire for higher quality media increases and more of that media is available for download, our need for storage increases, too. NAS (network attached storage) is one of the ways storage companies are addressing this need. NAS Defined As the name implies, NAS is a storage device attached to a network. In the early day of networking, the role of NAS was usually filled by a separate computer , a file server. These days, though, the role of a file server has mostly been subsumed by NAS, which is typically little more than a large storage device tha t has one or more hard drives and either a separate or integrated networking component. Any computer on the network can access the documents, photos, videos, music, and other files that you store on the NAS device. Due to the costs, NAS was once a product marketed primarily to businesses, but in recent years, as storage prices have dropped and home networks have become a viable product for the home and home office market. Today, many storage companies (such as Data Robotics, Seagate, and Iomega) offer NAS solutions for the home market. Prices vary, but several companies offer NAS with 1 TB (terabyte) of storage for about $200. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Why You Need NAS If you have several computers in your home and they have access to your home network, NAS has several advantages: - It provides centralized storage, so anything stored on the NAS device can be accessed easily by other computers and devices (for example, a network-ready Blu-ray player) on the network. All your movies and music can be stored on the NAS for easy playback on any computer in the house. - NAS devices can be easily added to the home network. As long as network ports are available on your router, you can add more. NAS devices to your network. - NAS provides an easy means to centralize your backups. No need for tapes , CDs, DVD.s... {Just scheduled easy means to centralize your backups} Networking the NAS Device To use a NAS, you need a network. If you have Broadband Internet Access, you can create a network by adding a router, which is the backbone of most home networks. You plug and network ready device into that router, including y our new NAS and then you set up and configure it just like any typical NAS network. Easy Setup Using the Iomega Home Media Network Hard Drive, you will find that the steps are easy. The 1 terabyte unit has one USB port (this lets you connect it directly to your computer) and a 1 gigabyte Ethernet port (which lets you connect it directly to your network). It is DLNA (Digital Line Network Alliance; a media sharing standard)- and iTunes compatible. As is the case with many NAS devices, the Home Media Network Hard Drive can serve as a Media Server, delivering video, music and pictures to computers, game consoles, DVD players, and anything else capable of receiving media. It can function as an iTunes server. It also includes software to provide backup and data recovery for the PCs on your network. It is a centralized device for all your digital media and backup needs. Setting Up The NAS Device The first thing you want to do is connect the Ethernet cable to your router. If you check the back of the router you will find several ports. One of the connections is for the cable that leads to your broadband modem.; the other connections are Ethernet ports for additional computers and devices, such as the NAS device. The router will usually have four to six ports for your devices. Plug the provided Ethernet cable into one of the available ports on the router. Then, plug the other end of the cable into the NAS. Plug the power supply into the NAS, then into an available electrical outlet. In the case of the Home Media Network Hard Drive, it will power up automatically once you plug it in. The NAS does all the hard work. Its networking logic sets itself up on your home network, and it is ready for use right away. The NAS will appear as a new device on your home network. To check your home network, click 'Start' and then select 'Network' menu. If 'Network' is not a option on your main menu, you can get to it through your 'Control Panel', and the ' Network And Sharing Center'. If 'Network Discovery' is 'Off', then click 'On'. After installing the device, install the Iomega software on the CD included with the device. Using The NAS Device Using the NAS device is almost as easy as setting it up. The Iomega NAS comes with preconfigured folders for your backups, music photos and movies. Simply store the appropriate media in the requisite folder (for example, videos in the movies folder) and you can access them from any computer on the network. This is important for the Movies and Music folders, as these are preconfigured for their respective media. The Music folder expects iTunes compliant media, and the Movies folder configured for DLNA compliant media. The other folders (Backups, Photos, Public and Active Folders) are not preconfigured for any particular media and can handle any type of file. Now that you are at this point, you are ready to load your files onto the device and share them with your networks compute rs and devices. In Conclusion Storage needs for home users have increased during the previous years as home networks have become more prevalent and more network ready devices have become available and entered the home. Users need to prepare for the increase in storage needs by installing a NAS device to the home network.

access point vs router

Scp Sc0-451 Study Guide

Download Free SC0-451 Tactical Perimeter Defense Practice Exam Questions. Question: 1 You are concerned about attacks against your network, and have decided to implement some defensive measure on your routers. If you have 3 interfaces, S1, S0, and E0, and you implement the following configuration, what attack will you be defending against? Router#config terminal Router(config)# Interface Ethernet 0 Router(config-if)#no ip directed broadcast Router(config-if)#Interface Serial 0 Router(config-if)#no ip directed broadcast Router(config-if)#Interface Serial 1 Router(config-if)#no ip directed broadcast Router(config)#^Z Router# A. Smurf B. BO2K C. SubSeven D. Any Trojan E. Any Worm Answer: A Question: 2 You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any IP address to any port between 1 and 1024 on any host in the 10.0.10.0/24 network? A. log tcp 0.0.0.0/24 -> 10.0.10.0/24 11024 B. log tcp any any -> 10.0.10.0/24 11024 C. log tcp any any -> 10.0.10.0/24 1:1024 D. log tcp 0.0.0.0/24 -> 10.0.10.0/24 1:1024 E. log udp any any -> 10.0.10.0/24 1:1024 Answer: C Question: 3 It has been decided that you must implement new security on your wireless networks. What wireless protection system is defined as: MIC + TKIP + EAP + 802.1x? A. WTLS B. WEP C. WPA D. W3DES E. WPKI Answer: C Question: 4 You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy? A. The Acceptable Use Statement B. The Firewall Administrator Statement C. The Network Connection Statement D. The Incident Handling Statement E. The Escalation Procedures Statement Answer: A, B, C Page 1 of 32 Question: 5 You need to diagram wireless security options for your team during a planning meeting. What wireless security process is shown in this image? A. WPA B. WEP C. WTLS D. WPKI E. W3DES Answer: B Question: 6 You are configuring the rules on your firewall, and need to take into consideration that some clients in the network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks? A. 169.254.0.0 /4 B. 169.254.0.0 /16 C. 169.254.0.0 /8 D. 169.254.0.0 /0 E. 168.255.0.0 /16 Answer: B Question: 7 You need to add a line to your IPTables Firewall input chain that will stop any attempts to use the default install of Back Orifice against hosts on your network (the 10.10.10.0 network). Which of the following would be the correct command to use? A. ipchains -A input TCP -d 0.0.0.0/0 -s 10.10.10.0/24 31337 -J DENY Page 2 of 32 B. ipchains -A input UDP -s 0.0.0.0/0 -d 10.10.10.0/24 p:31337 -j DENY C. ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 -p 31337 -j DENY D. ipchains -A input TCP -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j DENY E. ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j deny Answer: D Question: 8 You have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system will not be able to perform. What is a reason an IDS cannot manage hardware failures? A. The IDS can only manage RAID 5 failures. B. The IDS cannot be programmed to receive SNMP alert messages. C. The IDS cannot be programmed to receive SNMP trap messages. D. The IDS cannot be programmed to respond to hardware failures. E. The IDS can only inform you that an event happened. Answer: E Question: 9 You have been given the task of building the new wireless networks for your office, and you need to verify that your equipment will not interfere with other wireless equipment frequencies. What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range? A. 802.11b B. 802.11e C. 802.11a D. 802.11i E. 802.11g Answer: A Question: 10 You are configuring the IP addressing for your network. One of the subnets has been defined with addresses already. You run ifconfig on a host and determine that it has an address of 10.12.32.18/14. What is the broadcast address for this network? A. 0.0.0.0 B. 10.255.255.255 C. 10.12.0.0 D. 10.12.255.255 E. 10.15.255.255 Answer: E Question: 11 At a policy meeting you have been given the task of creating the firewall policy. What are the two basic positions you can take when creating the policy? A. To deny all traffic and permit only that which is required. B. To permit only IP traffic and filter TCP traffic C. To permit only TCP traffic and filter IP traffic D. To permit all traffic and deny that which is required. E. To include your internal IP address as blocked from incoming to prevent spoofing. Answer: A, D Question: 12 Page 3 of 32 Original Resource : Visit SC0-451 Link : SC0-451 Download SC0-451 PDF : SC0-451SCP SC0-402 Study GuideSCP SC0-411 Study GuideSCP SC0-451 Study GuideSCP SC0-471 Study GuideSCP SC0-501 Study GuideSCP SC0-502 Study Guide

access point vs router

marți, 28 ianuarie 2014

Scp Sc0-451 Certification

Download Free SC0-451 Tactical Perimeter Defense Practice Exam Questions. Question: 1 You are concerned about attacks against your network, and have decided to implement some defensive measure on your routers. If you have 3 interfaces, S1, S0, and E0, and you implement the following configuration, what attack will you be defending against? Router#config terminal Router(config)# Interface Ethernet 0 Router(config-if)#no ip directed broadcast Router(config-if)#Interface Serial 0 Router(config-if)#no ip directed broadcast Router(config-if)#Interface Serial 1 Router(config-if)#no ip directed broadcast Router(config)#^Z Router# A. Smurf B. BO2K C. SubSeven D. Any Trojan E. Any Worm Answer: A Question: 2 You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any IP address to any port between 1 and 1024 on any host in the 10.0.10.0/24 network? A. log tcp 0.0.0.0/24 -> 10.0.10.0/24 11024 B. log tcp any any -> 10.0.10.0/24 11024 C. log tcp any any -> 10.0.10.0/24 1:1024 D. log tcp 0.0.0.0/24 -> 10.0.10.0/24 1:1024 E. log udp any any -> 10.0.10.0/24 1:1024 Answer: C Question: 3 It has been decided that you must implement new security on your wireless networks. What wireless protection system is defined as: MIC + TKIP + EAP + 802.1x? A. WTLS B. WEP C. WPA D. W3DES E. WPKI Answer: C Question: 4 You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy? A. The Acceptable Use Statement B. The Firewall Administrator Statement C. The Network Connection Statement D. The Incident Handling Statement E. The Escalation Procedures Statement Answer: A, B, C Page 1 of 32 Question: 5 You need to diagram wireless security options for your team during a planning meeting. What wireless security process is shown in this image? A. WPA B. WEP C. WTLS D. WPKI E. W3DES Answer: B Question: 6 You are configuring the rules on your firewall, and need to take into consideration that some clients in the network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks? A. 169.254.0.0 /4 B. 169.254.0.0 /16 C. 169.254.0.0 /8 D. 169.254.0.0 /0 E. 168.255.0.0 /16 Answer: B Question: 7 You need to add a line to your IPTables Firewall input chain that will stop any attempts to use the default install of Back Orifice against hosts on your network (the 10.10.10.0 network). Which of the following would be the correct command to use? A. ipchains -A input TCP -d 0.0.0.0/0 -s 10.10.10.0/24 31337 -J DENY Page 2 of 32 B. ipchains -A input UDP -s 0.0.0.0/0 -d 10.10.10.0/24 p:31337 -j DENY C. ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 -p 31337 -j DENY D. ipchains -A input TCP -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j DENY E. ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j deny Answer: D Question: 8 You have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system will not be able to perform. What is a reason an IDS cannot manage hardware failures? A. The IDS can only manage RAID 5 failures. B. The IDS cannot be programmed to receive SNMP alert messages. C. The IDS cannot be programmed to receive SNMP trap messages. D. The IDS cannot be programmed to respond to hardware failures. E. The IDS can only inform you that an event happened. Answer: E Question: 9 You have been given the task of building the new wireless networks for your office, and you need to verify that your equipment will not interfere with other wireless equipment frequencies. What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range? A. 802.11b B. 802.11e C. 802.11a D. 802.11i E. 802.11g Answer: A Question: 10 You are configuring the IP addressing for your network. One of the subnets has been defined with addresses already. You run ifconfig on a host and determine that it has an address of 10.12.32.18/14. What is the broadcast address for this network? A. 0.0.0.0 B. 10.255.255.255 C. 10.12.0.0 D. 10.12.255.255 E. 10.15.255.255 Answer: E Question: 11 At a policy meeting you have been given the task of creating the firewall policy. What are the two basic positions you can take when creating the policy? A. To deny all traffic and permit only that which is required. B. To permit only IP traffic and filter TCP traffic C. To permit only TCP traffic and filter IP traffic D. To permit all traffic and deny that which is required. E. To include your internal IP address as blocked from incoming to prevent spoofing. Answer: A, D Question: 12 Page 3 of 32 Original Resource : Visit SC0-451 Link : SC0-451 Download SC0-451 PDF : SC0-451SCP SC0-402 CertificationSCP SC0-411 CertificationSCP SC0-451 CertificationSCP SC0-471 CertificationSCP SC0-501 CertificationSCP SC0-502 Certification

access point vs router

Scp Sc0-451 Study Questions

Download Free SC0-451 Tactical Perimeter Defense Practice Exam Questions. Question: 1 You are concerned about attacks against your network, and have decided to implement some defensive measure on your routers. If you have 3 interfaces, S1, S0, and E0, and you implement the following configuration, what attack will you be defending against? Router#config terminal Router(config)# Interface Ethernet 0 Router(config-if)#no ip directed broadcast Router(config-if)#Interface Serial 0 Router(config-if)#no ip directed broadcast Router(config-if)#Interface Serial 1 Router(config-if)#no ip directed broadcast Router(config)#^Z Router# A. Smurf B. BO2K C. SubSeven D. Any Trojan E. Any Worm Answer: A Question: 2 You are configuring your new IDS machine, where you have recently installed Snort. While you are working with this machine, you wish to create some basic rules to test the ability to log traffic as you desire. Which of the following Snort rules will log any tcp traffic from any IP address to any port between 1 and 1024 on any host in the 10.0.10.0/24 network? A. log tcp 0.0.0.0/24 -> 10.0.10.0/24 11024 B. log tcp any any -> 10.0.10.0/24 11024 C. log tcp any any -> 10.0.10.0/24 1:1024 D. log tcp 0.0.0.0/24 -> 10.0.10.0/24 1:1024 E. log udp any any -> 10.0.10.0/24 1:1024 Answer: C Question: 3 It has been decided that you must implement new security on your wireless networks. What wireless protection system is defined as: MIC + TKIP + EAP + 802.1x? A. WTLS B. WEP C. WPA D. W3DES E. WPKI Answer: C Question: 4 You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy? A. The Acceptable Use Statement B. The Firewall Administrator Statement C. The Network Connection Statement D. The Incident Handling Statement E. The Escalation Procedures Statement Answer: A, B, C Page 1 of 32 Question: 5 You need to diagram wireless security options for your team during a planning meeting. What wireless security process is shown in this image? A. WPA B. WEP C. WTLS D. WPKI E. W3DES Answer: B Question: 6 You are configuring the rules on your firewall, and need to take into consideration that some clients in the network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks? A. 169.254.0.0 /4 B. 169.254.0.0 /16 C. 169.254.0.0 /8 D. 169.254.0.0 /0 E. 168.255.0.0 /16 Answer: B Question: 7 You need to add a line to your IPTables Firewall input chain that will stop any attempts to use the default install of Back Orifice against hosts on your network (the 10.10.10.0 network). Which of the following would be the correct command to use? A. ipchains -A input TCP -d 0.0.0.0/0 -s 10.10.10.0/24 31337 -J DENY Page 2 of 32 B. ipchains -A input UDP -s 0.0.0.0/0 -d 10.10.10.0/24 p:31337 -j DENY C. ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 -p 31337 -j DENY D. ipchains -A input TCP -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j DENY E. ipchains -A input -s 0.0.0.0/0 -d 10.10.10.0/24 31337 -j deny Answer: D Question: 8 You have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system will not be able to perform. What is a reason an IDS cannot manage hardware failures? A. The IDS can only manage RAID 5 failures. B. The IDS cannot be programmed to receive SNMP alert messages. C. The IDS cannot be programmed to receive SNMP trap messages. D. The IDS cannot be programmed to respond to hardware failures. E. The IDS can only inform you that an event happened. Answer: E Question: 9 You have been given the task of building the new wireless networks for your office, and you need to verify that your equipment will not interfere with other wireless equipment frequencies. What wireless standard allows for up to 11 Mbps transmission rates and operates in the 2.4GHz range? A. 802.11b B. 802.11e C. 802.11a D. 802.11i E. 802.11g Answer: A Question: 10 You are configuring the IP addressing for your network. One of the subnets has been defined with addresses already. You run ifconfig on a host and determine that it has an address of 10.12.32.18/14. What is the broadcast address for this network? A. 0.0.0.0 B. 10.255.255.255 C. 10.12.0.0 D. 10.12.255.255 E. 10.15.255.255 Answer: E Question: 11 At a policy meeting you have been given the task of creating the firewall policy. What are the two basic positions you can take when creating the policy? A. To deny all traffic and permit only that which is required. B. To permit only IP traffic and filter TCP traffic C. To permit only TCP traffic and filter IP traffic D. To permit all traffic and deny that which is required. E. To include your internal IP address as blocked from incoming to prevent spoofing. Answer: A, D Question: 12 Page 3 of 32 Original Resource : Visit SC0-451 Link : SC0-451 Download SC0-451 PDF : SC0-451SCP SC0-402 Study QuestionsSCP SC0-411 Study QuestionsSCP SC0-451 Study QuestionsSCP SC0-471 Study QuestionsSCP SC0-501 Study QuestionsSCP SC0-502 Study Questions

access point vs router

Ipv6

Motivation and origins The first publicly used version of the Internet Protocol, Version 4 (IPv4), provides an addressing capability of about 4 billion addresses (232). This was deemed sufficient in the early design stages of the Internet when the explosive growth and worldwide proliferation of networks was not anticipated. During the first decade of operation of the TCP/IP-based Internet, by the late 1980s, it became apparent that methods had to be developed to conserve address space. In the early 1990s, even after the introduction of classless network redesign, it became clear that this would not suffice to prevent IPv4 address exhaustion and that further changes to the Internet infrastructure were needed. By the beginning of 1992, several proposed systems were being circulated, and by the end of 1992, the IETF announced a call for white papers (RFC 1550) and the creation of the "IP Next Generation" (IPng) area of working groups. The Internet Engineering Task Force adopted IPng on July 25, 1994, with the formation of several IPng working groups. By 1996, a series of RFCs were released defining Internet Protocol Version 6 (IPv6), starting with RFC 2460. The technical discussion, development and introduction of IPv6 was not without controversy and the design has been criticized for lack of interoperability with IPv4 and other aspects, for example by noted computer scientist D. J. Bernstein. Incidentally, the IPng architects could not use version number 5 as a successor to IPv4, because it had been assigned to an experimental flow-oriented streaming protocol (Internet Stream Protocol), similar to IPv4, intended to support video and audio. It is widely expected that IPv4 will be supported alongside IPv6 for the foreseeable future. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; IPv4-only nodes are not able to communicate directly with IPv6 nodes, and will need assistance from an intermediary; see Transition mechanisms below. IPv4 exhaustion Main article: IPv4 address exhaustion Estimates of the time frame until complete exhaustion of IPv4 addresses used to vary widely. In 2003, Paul Wilson (director of APNIC) stated that, based on then-current rates of deployment, the available space would last for one or two decades. In September 2005, a report by Cisco Systems suggested that the pool of available addresses would dry up in as little as 4 to 5 years. As of May 2009[update], a daily updated report projected that the IANA pool of unallocated addresses would be exhausted in June 2011, with the various Regional Internet Registries using up their allocations from IANA in March 2012. There is now consensus among Regional Internet Registries that final milestones of the exhaustion process will be passed in 2010 or 2011 at the latest, and a policy process has started for the end-game and post-exhaustion era. Features and differences from IPv4 In most regards, IPv6 is a conservative extension of IPv4. Most transport- and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed network-layer addresses, such as FTP or NTPv3. IPv6 specifies a new packet format, designed to minimize packet-header processing. Since the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. Larger address space The most important feature of IPv6 is a much larger address space than that of IPv4: addresses in IPv6 are 128 bits long, compared to 32-bit addresses in IPv4. An illustration of an IP address (version 6), in hexadecimal and binary. The very large IPv6 address space supports a total of 2128 (about 3.41038) addressesr approximately 51028 (roughly 295) addresses for each of the roughly 6.5 billion (6.5109) people alive in 2006. In another perspective, there is the same number of IP addresses per person as the number of atoms in a metric ton of carbon. While these numbers are impressive, it was not the intent of the designers of the IPv6 address space to assure geographical saturation with usable addresses. Rather, the longer addresses allow a better, systematic, hierarchical allocation of addresses and efficient route aggregation. With IPv4, complex Classless Inter-Domain Routing (CIDR) techniques were developed to make the best use of the small address space. Renumbering an existing network for a new connectivity provider with different routing prefixes is a major effort with IPv4, as discussed in RFC 2071 and RFC 2072. With IPv6, however, changing the prefix announced by a few routers can in principle renumber an entire network since the host identifiers (the least-significant 64 bits of an address) can be independently self-configured by a host. The size of a subnet in IPv6 is 264 addresses (64-bit subnet mask), the square of the size of the entire IPv4 Internet. Thus, actual address space utilization rates will likely be small in IPv6, but network management and routing will be more efficient because of the inherent design decisions of large subnet space and hierarchical route aggregation. Stateless address autoconfiguration IPv6 hosts can configure themselves automatically when connected to a routed IPv6 network using ICMPv6 router discovery messages. When first connected to a network, a host sends a link-local multicast router solicitation request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters. If IPv6 stateless address autoconfiguration is unsuitable for an application, a network may use stateful configuration with the Dynamic Host Configuration Protocol for IPv6 (DHCPv6) or hosts may be configured statically. Routers present a special case of requirements for address configuration, as they often are sources for autoconfiguration information, such as router and prefix advertisements. Stateless configuration for routers can be achieved with a special router renumbering protocol. Multicast Multicast, the ability to send a single packet to multiple destinations, is part of the base specification in IPv6. This is unlike IPv4, where it is optional (although usually implemented). IPv6 does not implement broadcast, which is the ability to send a packet to all hosts on the attached link. The same effect can be achieved by sending a packet to the link-local all hosts multicast group. It therefore lacks the notion of a broadcast addresshe highest address in a subnet (the broadcast address for that subnet in IPv4) is considered a normal address in IPv6. Most environments, however, do not currently[update] have their network infrastructures configured to route multicast packets; multicasting on single subnet will work, but global multicasting might not. IPv6 multicast shares common features and protocols with IPv4 multicast, but also provides changes and improvements. When even the smallest IPv6 global routing prefix is assigned to an organization, the organization is also assigned the use of 4.2 billion globally routable source-specific IPv6 multicast groups to assign for inner-domain or cross-domain multicast applications [RFC 3306]. In IPv4 it was very difficult for an organization to get even one globally routable cross-domain multicast group assignment and implementation of cross-domain solutions was very arcane [RFC 2908]. IPv6 also supports new multicast solutions, including Embedded Rendezvous Point [RFC 3956] which simplifies the deployment of cross domain solutions. Mandatory network layer security Internet Protocol Security (IPsec), the protocol for IP encryption and authentication, forms an integral part of the base protocol suite in IPv6. IPsec support is mandatory in IPv6; this is unlike IPv4, where it is optional (but usually implemented). IPsec, however, is not widely used at present except for securing traffic between IPv6 Border Gateway Protocol routers. Simplified processing by routers A number of simplifications have been made to the packet header, and the process of packet forwarding has been simplified, in order to make packet processing by routers simpler and hence more efficient. Concretely, The packet header in IPv6 is simpler than that used in IPv4, with many rarely used fields moved to separate options; in effect, although the addresses in IPv6 are four times larger, the (option-less) IPv6 header is only twice the size of the (option-less) IPv4 header. IPv6 routers do not perform fragmentation. IPv6 hosts are required to either perform PMTU discovery, perform end-to-end fragmentation, or to send packets smaller than the IPv6 minimum MTU size of 1280 octets. The IPv6 header is not protected by a checksum; integrity protection is assumed to be assured by both a link layer checksum and a higher layer (TCP, UDP, etc.) checksum. In effect, IPv6 routers do not need to recompute a checksum when header fields (such as the TTL or Hop Count) change. This improvement may have been made less necessary by the development of routers that perform checksum computation at link speed using dedicated hardware, but it is still relevant for software based routers. The Time-to-Live field of IPv4 has been renamed to Hop Limit, reflecting the fact that routers are no longer expected to compute the time a packet has spent in a queue. Mobility Unlike mobile IPv4, Mobile IPv6 (MIPv6) avoids triangular routing and is therefore as efficient as normal IPv6. IPv6 routers may also support Network Mobility (NEMO) [RFC 3963] which allows entire subnets to move to a new router connection point without renumbering. However, since neither MIPv6 nor MIPv4 or NEMO are widely deployed today, this advantage is mostly theoretical. Options extensibility IPv4 has a fixed size (40 octets) of option parameters. In IPv6, options are implemented as additional extension headers after the IPv6 header, which limits their size only by the size of an entire packet. The extension header mechanism allows IPv6 to be easily 'extended' to support future services for QoS, security, mobility, etc. without a redesign of the basic protocol. Jumbograms IPv4 limits packets to 65535 (216 - 1) octets of payload. IPv6 has optional support for packets over this limit, referred to as jumbograms, which can be as large as 4294967295 (232 - 1) octets. The use of jumbograms may improve performance over high-MTU links. The use of jumbograms is indicated by the Jumbo Payload Option header. Packet format The IPv6 packet is composed of three main parts: the fixed header, optional extension headers and the payload. Fixed header The fixed header makes up the first 40 octets (320 bits) of an IPv6 data packet. The format of the fixed header is presented in the table below. The octet (byte) offsets are in hexadecimal (base16) and the bit offsets are in decimal (base10). Octet Offset 0 1 2 3 Bit Offset 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 0 0 Version Traffic Class Flow Label 4 32 Payload Length Next Header Hop Limit 8 64 Source Address C 96 10 128 14 160 18 192 Destination Address 1C 224 20 256 24 288 The fields used in the header are: Version: The number 6 encoded (bit sequence 0110). Traffic class: The packet priority (8 bits). Priority values subdivide into ranges: traffic where the source provides congestion control and non-congestion control traffic. Flow label: Used for QoS management (20 bits). Originally created for giving real-time applications special service, but currently unused. Payload length: The size of the payload in octets (16 bits). When cleared to zero, the option is a "Jumbo payload" (hop-by-hop). Next header: Specifies the next encapsulated protocol. The values are compatible with those specified for the IPv4 protocol field (8 bits). Hop limit: Replaces the time to live field of IPv4 (8 bits). Source and destination addresses: 128 bits each. The protocol field of IPv4 is replaced with a next header field. This field usually specifies the transport layer protocol used by a packet's payload. In the presence of options, however, the next header field specifies the presence of one or more out of six extension headers, which then follow the IPv6 header in distinct order; the payload's protocol itself is specified in the next header field of the last extension header. Extension header Extension Header Type Size Description RFC Hop-By-Hop Options 0 variable Options that need to be examined by all devices on the path. RFC 2460 Routing 43 variable Methods to specify the route for a datagram. (Used with Mobile IPv6) RFC 2460, RFC 3775, RFC 5095 Fragment 44 64bits Contains parameters for fragmentation of datagrams. RFC 2460 Authentication Header (AH) 51 variable Contains information used to verify the authenticity of most parts of the packet. (See IPsec) RFC 4302 Encapsulating Security Payload (ESP) 50 variable Carries encrypted data for secure communication. (See IPsec). RFC 4303 Destination Options 60 variable Options that need to be examined only by the destination of the packet. RFC 2460 No Next Header 59 empty A placeholder indicating no next header. RFC 2460 Payload The payload can have a size of up to 64KB in standard mode, or larger with a "jumbo payload" option in a Hop-By-Hop Options extension header. Fragmentation is handled only in the sending host in IPv6: routers never fragment a packet, and hosts are expected to use Path MTU discovery. Addressing Main article: IPv6 address The increased length of network addresses emphasizes a most important change when moving from IPv4 to IPv6. IPv6 addresses are 128 bits long, whereas IPv4 addresses are 32 bits; where the IPv4 address space contains roughly 4.3109 (4.3 billion) addresses, IPv6 has enough room for 3.41038 (340 trillion trillion trillion) unique addresses. IPv6 addresses are normally written with hexadecimal digits and colon separators like 2001:db8:85a3::8a2e:370:7334, as opposed to the dot-decimal notation of the 32 bit IPv4 addresses. IPv6 addresses are typically composed of two logical parts: a 64-bit (sub-)network prefix, and a 64-bit host part. IPv6 addresses are classified into three types: unicast addresses which uniquely identify network interfaces, anycast addresses which identify a group of interfacesostly at different locationsor which traffic flows to the nearest one, and multicast addresses which are used to deliver one packet to many interfaces. Broadcast addresses are not used in IPv6. Each IPv6 address also has a 'scope', which specifies in which part of the network it is valid and unique. Some addresses have node scope or link scope; most addresses have global scope (i.e. they are unique globally). Some IPv6 addresses are used for special purposes, like the loopback address. Also, some address ranges are considered special, like link-local addresses (for use in the local network only) and solicited-node multicast addresses (used in the Neighbor Discovery Protocol). IPv6 in the Domain Name System Main article: IPv6 address#IPv6 addresses in the Domain Name System A quad-A record (AAAA) is defined in the DNS for returning IPv6 addresses to forward queries; a new format of PTR record is also defined for reverse queries. Transition mechanisms Until IPv6 completely supplants IPv4, a number of transition mechanisms are needed to enable IPv6-only hosts to reach IPv4 services and to allow isolated IPv6 hosts and networks to reach the IPv6 Internet over the IPv4 infrastructure. For the period while IPv6 hosts and routers co-exist with IPv4 systems various proposals have been made: RFC 2893 (Transition Mechanisms for IPv6 Hosts and Routers), obsoleted by RFC 4213 (Basic Transition Mechanisms for IPv6 Hosts and Routers) RFC 2766 (Network Address Translation - Protocol Translation NAT-PT), obsoleted as explained in RFC 4966 (Reasons to Move the Network Address Translator - Protocol Translator NAT-PT to Historic Status) RFC 2185 (Routing Aspects of IPv6 Transition) RFC 3493 (Basic Socket Interface Extensions for IPv6) RFC 3056 (Connection of IPv6 Domains via IPv4 Clouds) RFC 4380 (Teredo: Tunneling IPv6 over UDP through Network Address Translations NATs) RFC 4214 (Intra-Site Automatic Tunnel Addressing Protocol ISATAP) RFC 3053 (IPv6 Tunnel Broker) RFC 3142 (An IPv6-to-IPv4 Transport Relay Translator) Dual IP stack implementation A fundamental IPv4-to-IPv6 transition technology involves the presence of two Internet Protocol software implementations in an operating system, one for IPv4 and another for IPv6. Such dual-stack IP hosts may run IPv4 and IPv6 completely independently, or they may use a hybrid implementation, which is the form commonly implemented in modern operating systems on server and end-user computers. Dual-stack hosts are described in RFC 4213. Modern hybrid dual-stack implementations of TCP/IP allow programmers to write networking code that works transparently on IPv4 or IPv6. The software may use hybrid sockets designed to accept both IPv4 and IPv6 packets. When used in IPv4 communications, hybrid stacks use IPv6 semantics internally and represent IPv4 addresses in a special IPv6 address format, the IPv4-mapped address. IPv4-mapped addresses Hybrid dual-stack IPv6/IPv4 implementations typically support a special class of addresses, the IPv4-mapped addresses. This address type has its first 80 bits set to zero and the next 16 set to one while its last 32 bits are filled with the IPv4 address. These addresses are commonly represented in the standard IPv6 format, but having the last 32 bits written in the customary dot-decimal notation of IPv4; for example, ::ffff:192.0.2.128 is the IPv4-mapped IPv6 address for IPv4 address 192.0.2.128. Because of the significant internal differences between IPv4 and IPv6, some of the lower level functionality available to programmers in the IPv6 stack might not work with IPv4 mapped addresses. Some common IPv6 stacks do not support the IPv4-mapped address feature, either because the IPv6 and IPv4 stacks are separate implementations (e.g., Microsoft Windows 2000, XP, and Server 2003), or because of security concerns (OpenBSD). On these operating systems, it is necessary to open a separate socket for each IP protocol that is to be supported. On some s

access point vs router

MTNL broadband connection with wireless modem

have taken an MTNL broadband connection (combo plan) and since they could not supply a wireless modem, I went ahead and bought an SMC7901WBRA-2 modem-router. Now, come what may, I am just not being able to configure it to connect to MTNL . Even the guys from MTNL have given up since they do not have too much of a clue about modems other than the ones specified by them. Does anyone on this forum use the said modem for connecting to MTNL? If yes, it will be great if you could help me out.have taken an MTNL broadband connection (combo plan) and since they could not supply a wireless modem, I went ahead and bought an SMC7901WBRA-2 modem-router. Now, come what may, I am just not being able to configure it to connect to MTNL . Even the guys from MTNL have given up since they do not have too much of a clue about modems other than the ones specified by them. Does anyone on this forum use the said modem for connecting to MTNL? If yes, it will be great if you could help me out. MTNL broadband connection with wireless modem have taken an MTNL broadband connection (combo plan) and since they could not supply a wireless modem, I went ahead and bought an SMC7901WBRA-2 modem-router. Now, come what may, I am just not being MTNL broadband connection with wireless modem have taken an MTNL broadband connection (combo plan) and since they could not supply a wireless modem, I went ahead and bought an SMC7901WBRA-2 modem-router. google_ad_client = "pub-2311940475806896"; /* 300x250, created 1/6/11 */ google_ad_slot = "0098904308"; google_ad_width = 300; google_ad_height = 250; Now, come what may, I am just not being able to configure it to connect to MTNL . Even the guys from MTNL have given up since they do not have too much of a clue about modems other than the ones specified by them. Does anyone on this forum use the said modem for connecting to MTNL? If yes, it will be great if you could help me out.have taken an MTNL broadband connection (combo plan) and since they could not supply a wireless modem, I went ahead and bought an SMC7901WBRA-2 modem-router. Now, come what may, I am just not being able to configure it to connect to MTNL . Even the guys from MTNL have given up since they do not have too much of a clue about modems other than the ones specified by them. Does anyone on this forum use the said modem for connecting to MTNL? If yes, it will be great if you could help me out. MTNL broadband connection with wireless modem have taken an MTNL broadband connection (combo plan) and since they could not supply a wireless modem, I went ahead and bought an SMC7901WBRA-2 modem-router. Now, come what may, I am just not being able to configure it to connect to MTNL . Even the guys from MTNL have given up since they do not have too much of a clue about modems other than the ones specified by them. Does anyone on this forum use the said modem for connecting to MTNL? If yes, it will be great if you could help me out. able to configure it to connect to MTNL . Even the guys from MTNL have given up since they do not have too much of a clue about modems other than the ones specified by them. Does anyone on this forum use the said modem for connecting to MTNL? If yes, it will be great if you could help me out.

access point vs router