Saturday, March 29, 2008









Cisco Certification: The "Secret" Key To Getting Your CCNA And CCNP


Whether you're working on your CCNA or CCNP, Cisco certification exams are the most demanding computer certification exams in the IT field. Cisco exams are not a test of memorization, they're a test of your analytical skills. You'll need to look at configurations and console output and analyze them to identify problems and answer detailed questions. To pass these demanding exams, you've got to truly understand how Cisco routers and switches operate - and the key to doing so is right in front of you.

The debug command.

Of course, there is no single "debug" command. Using IOS Help, you can quickly see that there are hundreds of these debugs, and I want to mention immediately that you should never practice these commands on a production router. This is one major reason you need to get some hands-on experience with Cisco products in a home lab or rack rental. No software program or "simulator" is going to give you the debug practice you need.

Now, why am I so insistent that you use debugs? Because that's how you actually see what's going on. It's not enough to type a frame relay LMI command, you have to be able to see the LMIs being exchanged with "debug frame lmi". You don't want to just type a few network numbers in after enabling RIP, you want to see the routes being advertised along with their metrics with "debug ip rip". The list goes on and on.

By using debugs as part of your CCNA and CCNP studies, you're going beyond just memorizing commands and thinking you understand everything that's happening when you enter a command or two. You move to a higher level of understanding how routers, switches, and protocols work -- and that is the true goal of earning your CCNA and CCNP.

Chris Bryant, CCIE #12933, is the owner of The Bryant Advantage, home of over 100 free certification exam tutorials, including Cisco CCNA certification test prep articles. His exclusive Cisco CCNA study guide and Cisco CCNA training is also available!

Visit his blog and sign up for Cisco Certification Central, a daily newsletter packed with CCNA, Network+, Security+, A+, and CCNP certification exam practice questions! A free 7-part course, "How To Pass The CCNA", is also available, and you can attend an in-person or online CCNA boot camp with The Bryant Advantage!

Chris Bryant - EzineArticles Expert Author

Friday, March 21, 2008


Download The Best Digital eBooks Online
Networking Interview Questions

Here are the basic interview questions for the network administrators, system administrators and IT manager posts. These questions provide the basic information about the network communication technology, network topologies, network troubleshooting techniques, network devices and the basic overview of the LAN - WAN communication model.

What is DHCP?

DHCP stands for Dynamic Host Configuration Technology. The basic purpose of the DHCP is to assign the IP addresses and the other network configuration such as DNS, Gateway and other network settings to the client computers. DHCP reduces the administrative task of manually assigning the IP addresses to the large number of the computers in a network.

What is DNS and how it works?

DNS stands for Domain name system and it translates (converts) the host name into the IP address and IP address into to the host name. Every domain and the computer on the internet is assigned a unique IP address. The communication on the internet and in the network is based on the IP addresses. IP addresses are in this format 10.1.1.100, 220.12.1.22.3, 1.1.1.1 etc. IP addresses can’t be remembered but the host names are easy to remember instead of their IP addresses.

What is a Firewall?

Firewall is a protective boundary for a network and it prevents the unauthorized access to a network. Most of the Windows operating system such as Windows XP Professional has built-in firewall utilities. There are the large number of the third party firewall software and the basic purpose of all the firewall software and hardware is same i.e. to block the unauthorized user access to a network.

What is WAN?

WAN stands for wide area network and it covers the broader geographical area. Basically there are three types of a computer network LAN (Local Area Network), MAN (Metropolitan Area Network) and WAN (Wide Area Network). The communication in a WAN is based on the Routers. A WAN network can cover a city, country or continents.

Define VOIP Communication Technology

VOIP stands for Voice over IP and this technology is used for transmitted the voice over the IP based long distance network to make phone calls. VOIP phone calls are very cheap and a large number of the corporate offices and home users are using VOIP technology to make long distance phone calls.

What is Wi Max Technology?

Wi Max is a wireless broadband technology and it is a advance shape of the Wi Fi (which was a base band technology). Wi Max supports data, video and audio communication at the same time at a very high speed up to 70 Mbps.

Define Network Gateway

Network Gateway can be software or a hardware. A gateway is usually a joining point in a network i.e. it connects two networks. A computer with two LAN cards can act as a gateway. What is a Router?

A router routes the traffic to its destination based on the source and destination IP addresses, which are placed in the routing software known as routing table.

How Fiber Optic Cable Works

Fiber optics provides the fastest communication medium for data and voice. Data can travel at the speed of light through the fiber optic cables. ISPs and corporate offices are usually connected with each other with the fiber optic cables to provide high speed connectivity.

What is File Server?

A file server is a computer in a network that authenticates the user access in a network such as Windows 2000/2003 Servers.

Define Seven Layers of OSI Model

There are seven layers of the OSI model. The basic purpose of these layers is to understand the communication system and data transmission steps. The seven layers are Application, Presentation, Session, Transport, Network, Data Link and Physical. You can remember the name of these layers by this phrase. “All people seems to need data processing”.

Define GSM Technology

GSM is a short range wireless technology and is usually used in the mobile phones, hand help devices, MP3 players, Laptops, computers and in cars.

B. Bashir manages this website Networking Tutorials and regularly writes articles on various topics such as Computer Networking, Network Troubleshooting Tips Wireless Networking, Computer Hardware, Certifications, How Tos, Network Security Guide and computer tips.


China's Internet Threat

In 1946, Albert Einstein made the famous statement: "I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones." Well Albert, I can now tell you how World War III will be fought. The weapons will be keyboards and the battleground will be cyberspace. No longer does a nation have to bomb an enemy to destroy that nation's critical economic and military infrastructure. Today, industrialized nations rely on the Internet for every aspect of their economy, government and military operations. A total disruption of the Internet could bring the world economy to a halt and cripple the ability of western nations to effectively deploy their military.

A recent report by the Heritage Foundation entitled, "Trojan Dragons: China's International Cyber Warriors" describes the emphasis that China is placing on cyber warfare. The Chinese People's Liberation Army (PLA) has cyber warfare brigades that are already at work probing, hacking and stealing data from US and European computer systems. The Chinese cyber attacks haven't been limited to government systems. In fact, their primary target is economic and industrial information systems. China's intelligence collection is the top intelligence threat to America's science and technology secrets.

"America is under widespread attack in cyberspace", testified General James Cartwright of the US Strategic Command to Congress in March 2007. There were more than 80,000 attempted attacks on military computer networks in 2007. These attacks were often successful in impacting US military operations. Of concern to the government isn't the high school hacker having fun, but the concerted Internet attacks that are coming out of China. In the last three months, attacks against the US government from China have tripled. The Chinese cyber warfare units have already penetrated the US military's unclassified but sensitive IP router network (NIPRNET) and have designed software to disable it in time of conflict.

The Chinese have developed a very sophisticated and advanced capability to attack and degrade US and European computer networks and it is time that western nations recognize the threat. This threat is not only to the military, but to commercial, financial and energy networks. The actions of the Chinese cyber warriors in penetrating and stealing data from foreign nations have crossed the boundary of acceptable international behavior during peace time. It is time for the US and Europe to take strong diplomatic actions to halt and control the cyber warfare actions of the Chinese military.

Michael E. Bennett has over 25 years of experience in federal government telecommunications and information technology systems. He is currently the operations officer for a Department of Defense organization that provides worldwide telecommunications for the US military. Mr. Bennett's expertise covers a wide area of disciplines to include broadband, SONET, ATM, DWDM, fiber optics and satellite communications. Mr. Bennett is a 1981 graduate of the University of Maryland and holds a Masters of Science degree in Telecommunications from the University of Denver.

Labels: Michael_Bennet

Wednesday, March 12, 2008

Types Of Networks

<meta name="verify-v1" content="TTvZgDtptrx65s7uGhaAEatKWV6ry7mmj1olIksHSxg="></head>Here are the types of networks as follows <br /> <br />LAN -> LAN is Local Area Network used to connect computers within an organisation such <br /> as school or college. Its range is limited upto an institute. <br /> <br />MAN-> MAN is a Local Area Network use to cover Large geographical Area upto cities <br /> For Ex:-> Connecting two offices of the same company within a city etc. <br /> Metropolitan area networks can span up to 50km, devices used are modem and wire/cable.It is bigger than LAN. To connect two MAN's a LAN is used. <br /> <br />WAN-> WAN is a Wide Area Network which covers a large area such as two countries <br /> or continents.WAN is mostly used forMNC's i.e. for companies having offices <br /> worldwide. <br /> <br />CAN-> CAN is a network made up of interconnection of LAN's . It can be considered as a metropolitan area network CAN is likely to cover campus buildings such as university building and student residence halls <br /> <br />Now the Big question Arises <br /> <br />What is an Internet ? <br /> <br />Internet is a Network of networks <br />It comprises of all the above networks. <br /> <br /> <br /> <br /><h1>How the Internet works</h1> <h3>Seeing through the magic</h3> <h4>Is it really magic?</h4> <p> Arthur C. Clarke once remarked that "...any sufficiently advanced technology is indistinguishable from magic." Many of us use the Internet with increasing regularity, but still see it as largely magic. There is actually nothing wrong with that point of view, but it can be nice to know how the 'magic' really works. although the Internet is a complex phenomenon, it is possible for ordinary people to understand much of its inner workings. </p> <p> There is a lot of information in this article, but don't let that intimidate you. We don't intend for you to earn a degree in computer science here. If, by some exceptionally bizarre set of circumstances you find yourself transported into the middle of a cocktail party full of Internet computer scientists, this will give you enough material to talk about so you can understand some of their jokes and slip through the buffet line before you get noticed as a neophyte. </p> <h4>Computing equals communication</h4> <p>The term 'computer' originally conjured up images of behemoth machines churning out complex mathematical calculations. The original computers did calculations all the time. Recently, though, we have not used computers as much for calculation. Most of us use our computers for communication rather that computation. The explosive growth of the Internet is a clear sign of this trend. </p> <p>The early computers were designed to be shared by many users at the same time. This had an interesting side effect; people sharing the computer could send messages to each other through it. This communication ability turned out to be very handy, but it was largely lost when businesses and individuals turned to personal computers. The personal computers were almost as powerful as their larger cousins, but they were intended for one person at a time, so the communication aspect was lost.</p><p> <br /></p><h4>The trend towards connectivity</h4> <p> <img src="http://wally.cs.iupui.edu/n241-new/webMag/lan.jpg" align="left" /> Clever computer users started connecting personal computers together through Local Area Networks (sometimes abbreviated LAN) and through telephone connections and special hardware devices. The personal computers could then be used again as communication tools, but only with other computers they were directly tied to. </p> <p>Gradually, LANs became more powerful, and were often tied together to make Wide Area Networks (WANs). Most businesses today use a combination of LAN and WAN technology. </p> <p> <img src="http://wally.cs.iupui.edu/n241-new/webMag/wan.jpg" align="right" /> At the same time, educational and defense institutions were working on ways to connect the large research machines. They had a special problem. During the height of the cold war, these computers were used in support of nuclear defense initiatives. It was vital that there be many paths between the computers, and that messages could get through even if some of the communications hubs were brought down by the bad guys. </p> <h4>An underlying protocol</h4> <p>The earliest form of the Internet was based on an ingenious idea called TCP/IP. This stands for Transfer Control Protocol / Internet protocol. TCP/IP is a big name for a simple idea. Essentially, a message is automatically broken into small parts, which are called 'packets.' A packet is labeled with its source and destination, as well as some other information. Each packet finds its own way from the starting machine to the destination, and if it finds itself blocked, it has the capacity to back up and find a new path. When the packets arrive at the destination, they are pieced back together, and the message can be read.</p> <br /><p> <br /></p><p> The entire Internet from email to web pages and streaming video, is currently based on TCP/IP packets. Anything you see or hear on the Internet was broken into these packets and sent to you. The TCP/IP protocol is invisible and automatic. Most users never see it and never have to know it is there. This has some interesting side effects. A message that goes from one machine to another in the next room might find its way to France in the meantime (not too often, but it happens). The other side effect of this is that messages you send might temporarily reside on dozens of computers you will never see before they get to the destination. </p><h4>The 'traffic cops' of the Internet</h4> <p> <img src="http://wally.cs.iupui.edu/n241-new/webMag/router.jpg" align="left" />As scientists were developing TCP/IP and networking technology became more prevalent among personal machines, it became apparent that there ought to be a way to connect the two. Essentially, the solution was a special class of computer called a router. The router's job is to sit between a network and the rest of the internet, and act as a kind of mailman to the network. Any traffic the network sends to the Internet goes through the router, and any messages destined for sites on the network only get there through the router. Routers are connected through high-speed cables to even more powerful machines, which are eventually connected to a number of special high-end machines, often referred to as the 'Internet Backbone'. (This network was originally called the NSF backbone, after the National Science Foundation, which provided much of the original funding. Currently, the NSF is backing a brand new version of the Internet backbone with a research focus called the 'Internet II' or 'Abilene network'. ) </p> <h4>Hi, what's your number?</h4> <p>Since there are literally millions of computers connected to the Internet, it could be nearly impossible to locate just one. Fortunately, the original planners of the Internet had some clever ideas. Every machine on the Internet was assigned a number. The number would be composed of four smaller numbers between 0 and 255, separated by dots. (There are some wonderful urban legends about why the numbers don't go to 999, but the real answer is related to the vagaries of base two mathematics. Let's leave that for another session.) The number is called an IP (for internet protocol) number. IP numbers work like zip codes. They are easy for computers to understand, and they make it reasonably easy for packets to be routed to the appropriate destinations. </p> <h4>The Domain name solution</h4> <p> The problem with IP numbers is they are, well, numbers. People tend to be not good with numbers. They much prefer characters and words. For this reason, computer scientists developed the Domain Name Service (often called DNS). DNS is just a big database (actually several) that contains a bunch of computer names and the IP addresses associated with those names. The interNIC (www.internic.net) is currently the organization which manages the assignment of domain names, although the process is being privatized, and others will soon have the capacity to assign domain names. There is a registration fee for a domain name, which is currently $70.00 for two years, but that may change as competition enters the marketplace. The good news is that most of us do not need to worry about a domain name. We are usually given an account by our employer or some kind of provider, and the domain name we use reflects that entity. Part of your email address is usually your domain name. For example, I used to have an email address like this: andyharris@aol.com The part after the @ sign is domain name of my organization. </p> <p> Domain names have a number of parts, and they can actually give you a lot of information about the person or entity attached to them. They usually end with a two or three digit code. The two digit codes refer to countries, so .fr means 'France' and .ca means 'Canada.' In the United States, we generally leave off the two digit country code '.us' The three digit code refers to the type of organization that owns the computer. These fall into a number of standard categories. Mine ends in '.com', which stands for 'commercial enterprise'. In addition, you often see domain names ending with '.gov' (government organization), '.edu' (educational institution), '.org' (non-profit organization), or '.net' (Internet service provider). The first part of a domain name (the 'aol' part in the example above) is the name of a particular computer or organization. Sometimes there are a number of intermediate words, that can give you more clues. For example, 'stats.math.indiana.edu' would most likely refer to the statistics section of the math department of Indiana University. (such a machine does exist, but its name has changed). </p> <p>Domain names, as you can see, are used as part of email addresses, and they also make up part of the address of a web page. When used in a web address, the domain name usually comes near the beginning. We will look more closely at how web addresses work in a moment. </p> <h4>When are you here? Is existence essence?</h4> <p>It is important to determine what it means for a person or a computer to be 'on the internet,' because there is some potential for confusion. If you can use a computer to send email, is it on the Internet? Is it on the net because it has a web browser (like Internet Explorer or Netscape) installed? Is a computer always on the Internet? </p> <h4>Servers and clients</h4> <p> Some computers stay on the Internet all the time, but these tend to be large expensive machines. The computers that store information like web pages should stay on all the time, and should always have some kind of connection to the Internet. Such machines are called servers. It can be complicated and expensive to manage a permanent connection, and even more complex to manage a server. Most ordinary people don't want to do it, and want to leave those jobs to a professional. We would usually just prefer to connect our computer to a server for short periods of time, and use the services of a professional to ensure our connection stays valid and we have all the right programs in place. For example, you probably turn your home computer off at night. What if you get an email at two o'clock in the morning, when your computer is not turned on? Likewise, you might have a small business and want to host a homepage. You will want people to be able to get to that page any time of the day, not simply when your computer is turned on and 'hooked up.' </p> <p>In addition to servers, the internet is also full of clients. You will frequently hear the term 'client-server' used in Internet conversation. The good news is you already know what this means: </p> <h4>A client-server analogy</h4> <p>Imagine driving up to a fast-food restaurant. You get to the speaker and the sixteen-year-old bored kid mumbles something incomprehensible into the microphone. You then order a 'cholesto-burger supreme' special, hear something that resembles a request for some cash, and you drive to the window. You then exchange the money for your meal and drive off. The cashier eagerly leaps to his microphone awaiting the opportunity to serve another customer. </p> <p> In this example, the customer is the client and the cashier is the server. The server sits around waiting for a client. A client shows up and makes a request. The client and server follow a ritualized conversation (a protocol) to make a transaction. Finally, the transaction is complete, the client moves on, and the server prepares to receive another client. </p> <p>Your machine is a client. The Internet programs on your own machine (like netscape, a telnet program, or an FTP program) are also considered clients. Clients exist to talk to servers. Servers can also be both machines and special programs. You will almost never directly talk to a server program, but use a client program to communicate with. </p> <h4>So how do I get my client talking to a server?</h4> <p>What most people do is subscribe to some sort of internet service provider. There are two main flavors in common use. One is the HUGE services such as America Online, Prodigy, Compuserve, and many others. These guys offer connections to the internet, and they also offer customized content only for members of the service. They can be a great choice if you are just starting out, and you have probably already gotten some software from one or more of them in the mail or when you purchased your computer. You can often get free hours to try out a service, and then you will need to pay a monthly service plan, or perhaps pay by the hour. Be very careful as you read the plan to understand its terms, particularly if you are sharing an account with members of your family. If you are unaware of an hourly service charge, you could be in for a big shock when the bill comes due. </p> <p> The other main approach to connecting to the Internet is through some sort of commercial Internet Service Provider (ISP). These have sprung up all over the country, and they often offer cheaper service than the larger services, but usually without custom software or content. Many experienced Internet users prefer using an ISP, but it can often be an intimidating choice for beginners. </p> <p>One other source of Internet access you might pursue is free access. Often employers, schools, or libraries will offer some kind of limited free Internet access. Most universities now include Internet access as a standard student perk, like a library card. Your employer may have free or reduced-rate Internet access available to you. Local schools, libraries, and community centers sometimes also offer some kind of access. Often these accounts are limited in some way, but they can get you started. </p> <h4>Is there a free lunch?</h4> <p> There are a few commercial ventures that get you on the Internet for free as well, but most already require you to have some kind of access to begin with. One notable exception is juno (www.juno.com) which is a free email-only service. This service includes special software to connect your machine to the internet. Of course, you will have to endure some advertising in order to receive this 'free' service, but it's not a bad trade-off, particularly if all you want right now is email. </p> <h4>The software you might need</h4> <p>You probably already have some Internet software (clients) on your machine. All of these programs 'know' how to speak one or more of the protocols and connect to the appropriate servers. That's all that internet programs are!! </p> <p> Once you are connected, your machine has an IP number (and maybe also a domain name) assigned to it. This means that you can now send TCP/IP packets to and from your machine. Of course, most of us don't really want to deal directly with TCP/IP, we would prefer the packages to be put together in a more usable format. </p> <p> TCP/IP is the most basic of the internet protocol, but it is used to put together fancier and more powerful protocols. A protocol is simply a name for an agreement about how a communication will ensue. Formal meetings have a very different protocol than discussions on a basketball court, for example. There are a number of protocols in common use on the Internet, but you only need to know a few. In fact, you don't need to know the protocols at all, only which clients are used for them!! We'll discuss a few anyway, just in case it comes up on a quiz show ("Internet protocols for a thousand, please.") </p> <h4>The wild, wonderfully wacky world wide web!!</h4> <p> The protocol most of us know best is called HTTP (Hyper Text Transfer Protocol) by the People Who Like Big Names For Simple Ideas. The rest of us call it the world-wide-web. HTTP is a truly wonderful protocol, because it allows us to have links and images, and gives us a chance to make much more interesting documents than we could have made in the old 'text-only' days. If you only have one Internet client program on your computer, you should get a good web browser. Browsers are powerful because the HTTP protocol can be used to handle some other protocols (although in limited ways) and because HTTP itself is just so cool. If your computer can handle it, you should definitely have one of the latest versions of the big two browsers (Netscape 4.5 or later, or Microsoft Internet Explorer 4.0+). For ordinary personal users, both are free. </p> <p> This takes us back to the idea of web addresses. Addresses on the web are also called URLs (for Uniform Resource Locator). You have probably blindly typed http:// at the beginning of every web address, and you never knew why. (It's a ritual. Throw salt over your shoulder, wave a chicken over the monitor, and type http://). Now perhaps you can see why we type this. HTTP is the name of the protocol we want to use. Since web browsers are primarily for the web, we almost always type http:// (Oooooooh!!) Ocaisionally you will use a web browser to use another protocol, so you sometimes see other things there (like news:// or gopher://) These things are just other protocols. </p> <h4>You've got mail</h4> <p> <img src="http://wally.cs.iupui.edu/n241-new/webMag/email.jpg" align="left" />Email is familiar. It actually uses a number of protocols. It is an acceptable simplification to say that email primarily uses smtp (simple mail transfer protocol) as a protocol to send email messages and pop3 to recieve them. (Don't worry, there won't be a quiz. I'm only telling you this because you may run across the terms some time). Email clients (like Eudora or the email clients built into Netscape and IE) already know how to read and write the appropriate protocols, but sometimes you need to set them up so they know where your server is. </p> <h4>Don't forget newsgroups</h4> <p> Newsgroups are an important part of the Internet that are often overlooked. These are special communication forums that are widely distributed across the web. Most of the browsers have built-in capability to work with these newsgroups, but you might want to investigate a special program to do so. Newsgroups are especially wonderful for connecting to people with similar interests as you. If you are interested in something, there is probably a global discussion going on about the subject that you can participate in. </p> <div> <h4>Sometimes you want to send stuff</h4> <p> <img src="http://wally.cs.iupui.edu/n241-new/webMag/ftp.jpg" align="right" />The File Transfer Protocol (FTP) is a protocol designed for transferring files between machines on the Internet. If will not be doing much of this, the FTP capability of your web browser will probably be enough. Some people like to use Internet accounts as a place to back up important documents, and an FTP client is a good way to handle the transfers between two accounts you own. </p> </div> <div> <h4>A classic protocol</h4> <p> <img src="http://wally.cs.iupui.edu/n241-new/webMag/telnet.jpg" align="left" /> Telnet is one of the oldest protocols on the Internet. What it does is allow one computer to act as a 'dumb terminal' to another. In the pre-web days of the Internet, telnet was the most common way to use the Internet. It was not for the faint-of heart, though, because you had to be able to use whatever machine you were connected to, which often had arcane operating systems such as unix or VMS. It is still common to use telnet if you are operating a web site, particularly if you are doing some web programming, but most beginners do not need to worry too much about the telnet protocol. </p> </div> <h4>Summing it up</h4> <p>The Internet is by any account an exceptional thing. It is a complex, dynamic organism with no real head that still manages to work together pretty well. The core technology that makes the Internet possible is the TCP/IP protocol. This provides an underlying framework that can be packaged together in complex ways to form other protocols. The Internet contains two main classes of computers and software: clients and servers. Servers are the machines and programs that are on all the time and are run by professionals. Clients are the machines and programs that mere mortals use to connect to servers. Hooking up to the Internet entails enlisting the services of a server, establishing the basic TCP/IP connection, and running one or more client programs. There is still plenty of magic left, when we consider how exactly the protocols work, how the communications happen, and how all the various programs are written, but it is possible to understand the basic workings of the Internet. One of the most exciting things about technology is that when you understand the magic, it doesn't go away. The new insight and ability that you earn make you appear to be much more effective as a user of the technology. Maybe we could say that when we take some of the magic out of the Internet, we transfer that magic to the people who have learned the concepts.</p><div style="text-align: center; font-weight: bold;"><span class="art_title" style="font-size:130%;"><span style="font-size:180%;">Connect PC to TV</span> <br /> <br /></span><div style="text-align: left;"><div id="body"><p>How do you connect pc to TV? What are the tools that you need or is there any software necessary to accomplish this?</p><p>To have a connection between your pc and TV you would need a cable which would serve as a converter. The cable is a cord which connects to the pc and outputs the image coming from the monitor to the television which the other cable end is connected. This would allow you to watch internet TV or DVD in your pc DVD drive but the viewing would be seen on the TV. It's like making your TV a huge monitor for your pc where you can actually surf the Net, view pictures and many more. If you enjoy home entertainment, or love to watch movies at home, this is the initial move to making a Home Theatre PC.</p><p>There are various kinds of PC to TV cables, each function in somewhat dissimilar ways. One of the known differences between cables is the way it is connected to the pc. This can be done on the outputs of the computers video card wherein the monitor is connected. Another cause of differences between cables is the way it is connected to the television; they have types of input connections. The third reason is because some cables serves as converters. A regular PC/TV cable simply directs what's on the pc to the television. But if you have a modernized TV with several enhancement options and your pc is well upgraded, then you might be able to manipulate on how to make the images appear better on the TV screen. If the cable is a converter then the images will automatically be adjusted, meaning you don't need to change any settings on your pc or tv. You simply need to plug the cable and watch the videos. These types of cables usually necessitate a power source like USB port from your pc.</p><p>What must you do to connect pc to TV? What you need to do is connect the USB cord of the PC to TV cable into its matching port on your computer. Next is to link the VGA Y-cord's blue connector marked as "PC" to the monitor or VGA port that can be found at the back of your computer. You could either link the composite video which is indicated through a yellow RCA jack or an S-Video which is a pure black 4-pin connection output to an S-Video cable or composite video cable. Not to worry if you lack a video cable as this is easily available at any hardware or electronics store. You must link the VGA monitor cord with the VGA Y-cord's blue connector marked as "monitor". If you are using a laptop then the end connector which is marked as "monitor" cannot be used. You must connect the video cable end with the video input of the TV or projector or any other equipment that you will utilize. You can toggle the input display to match with the input video that you're going to use. With the toggle option you can control the input to display whatever you prefer the tv to display. Each TV differs from the other so you could refer the TV user guide for further instructions. Finally you could turn on the pc and let it boot up for you to see the result.</p>John Sugarman is an internet marketer and a <a id="link_82" href="http://satellitetvonpcsite.blogspot.com/" target="_new">Satellite TV</a> enthusiast, for more information about Connect Pc to TV Visit <a id="link_83" href="http://satellitetvonpcsite.blogspot.com/" target="_new">http://satellitetvonpcsite.blogspot.com</a></div></div></div> <br /><p> <br /></p><p style="text-align: center; font-weight: bold;"><span class="art_title" style="font-size:130%;">What is FTTP, FTTH, FTTB, and FTTD? Fiber </span><span class="art_title" style="font-size:130%;">Optic Tutorial Series Four?</span></p><div id="body"><p>FTTP stands for Fiber To The Premises which is one type of fiber optic communication delivery in which a optical fiber connection is directly run to the customers' premises. The P(premises)can be business, commercial, institutional and other applications where fiber network connections are distributed to a campus, set of structures, or high density building with a centrally located network operations center. Some other FTTx such as FTTN(fiber to the node), FTTC(fiber to the curb) still depend on copper wires for "last mile" (final connection) to the customers' premises which contrasts with FTTP. FTTP can be further categorized into FTTH(fiber to the home), FTTB(fiber to the building), etc.</p><p><b>Network construction of FTTP</b></p><p>FTTP network can be divided into two major parts: optical portion and electrical portion.</p><p><b>1. Optical portion</b></p><p>Optical portion of the FTTP network is responsible for carrying optical signal to the electrical portion (electrical portion is located in the customer's telecom room). Two fiber configurations exist for the FTTP optical portion. These are direct fiber link and shared fiber link.</p><p>Direct fiber link is the simplest form. One fiber is used for directly connecting the central office to one customer. This type of connection provides the customer the biggest bandwidth but is also the most expensive configuration. Shared fiber link means a single fiber leaving the service providers central office is shared by many customers. Only at the final moment, the fiber is split into many individual fiber to each customer.</p><p>There are two major competing technologies for the shared fiber link configuration: active optical network (AON) and passive optical network (PON).</p><p>Active Optical Network (AON) is much more like traditional Ethernet computer networks. It needs electrically powered equipment to buffer and distribute the signal such as switches or routers. Each signal leaving the central office is routed only to the customer intended by the router or switch. On the other hand, signals from the customers are buffered by the router at the intersection avoiding colliding.</p><p>Passive Optical Network (PON) does not use any electrically powered equipment to buffer and route the signals. Instead, the light signal from central office is divided and distributed to all customers, even those who are not intended to. Once the light signal arrives at the electrical portion, where it is converted to electrical signal by the ONT(see below), the ONT decides whether to keep or discard the signal depending on its intended destination.</p><p><b>2. Electrical portion</b></p><p>Electrical portion of the FTTP network receives optical signal and converts it to traditional electrical signal which is then distributed to desktop computers via a LAN copper wire network. This converting device is called an optical network termination(ONT). The building's phone systems, LAN and cable TV system are then connected to the ONT.</p><p><b>Other FTTx</b></p><p><b>FTTB</b>: Fiber To The Building. This is in reference to fiber optic cable, carrying network data, connected all the way from an Internet service provider to a customer's physical building.</p><p><b>FTTD</b>: Fiber To The Desk.. FTTD indicates applications where fiber optic connections are distributed from the central office to individual work stations or computers inside a structure, dwelling, or building.</p><p><b>FTTH</b>: Fiber To The Home. FTTH indicates fiber network connections running from the central office to a residence, or very small multi-unit dwelling.</p><p><b>FTTN</b>: Fiber to the node. FTTN is also called fiber to the neighborhood or fiber to the cabinet (FTTCab). It is a telecommunication architecture based on fiber-optic cables run to a cabinet serving a neighborhood.</p><p><b>FTTC</b>: Fiber To The Curb. This is also called fibre to the kerb (FTTK). It is a telecommunications system based on fiber-optic cables run to a platform that serves several customers. Each of these customers has a connection to this platform via coaxial cable or twisted pair.</p></div><div id="sig" class="sig"><p>Colin Yao is an expert on fiber optic technologies and products. Learn even more about <a id="link_82" target="_new" href="http://www.fiberoptics4sale.com/page/FOFS/CTGY/Fiber_Optic_Simplex_Multimode_Patch_Cords">LC SC fiber</a>, <a id="link_83" target="_new" href="http://www.fiberoptics4sale.com/page/FOFS/CTGY/Fiber_Optic_Simplex_Multimode_Patch_Cords">LC to LC fiber</a> and <a id="link_84" target="_new" href="http://www.fiberoptics4sale.com/page/FOFS/CTGY/Fiber_Optic_Simplex_Multimode_Patch_Cords">LC to SC fiber</a> on Fiber Optics For Sale Co. web site.</p><div><p>Article Source: <a id="link_85" href="http://ezinearticles.com/?expert=Colin_Yao">http://EzineArticles.com/?expert=Colin_Yao</a></p><p> <br /></p><p><a id="link_85" href="http://ezinearticles.com/?expert=Colin_Yao"><span style="font-family:Arial, Helvetica;font-size:+1;"> <b>One Step Closer to the Wireless Enterprise</b></span> <br /><b>By </b></a><b><a href="http://www.wi-fiplanet.com/feedback.php/http://www.wi-fiplanet.com/news/article.php/3734341">Naomi Graychase</a></b> </p><p> </p><p> <span style="font-family:Arial, Helvetica;font-size:-1;"> March 14, 2008</span> </p><p> <!--content_start--></p><p class="MsoNormal" style="margin: 0in 0in 0pt;"><span style="">This week, at its Wireless Innovations Day event in Boston, <a href="http://www.motorola.com/">Motorola</a> introduced a new 802.11n wireless LAN switch that it says will enable “the all-wireless enterprise.” </span></p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"><span style=""></span> </p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"><span style="">The Motorola RFS6000 is a multi-core processor-based wireless LAN (WLAN) switch targeted at mid-sized enterprises. According to Motorola, “It supports an all-wireless enterprise vision, enabling businesses to build an enterprise WLAN that serves the entire organization from workers in corporate headquarters to manufacturing and distribution plants to remote branch offices.” <br /> <br />Coupled with mesh-enabled adaptive 802.11a/b/g/n access points, the RFS6000 is being positioned as a complete indoor and outdoor WLAN enterprise solution.<o:p></o:p></span></p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"><span style=""> <br />“We expect more than 75 percent of enterprise end-point devices to be wirelessly connected to the company network within four to five years,” said Jack Gold, President, <a href="http://www.jgoldassociates.com/">J.Gold Associates</a> in a Motorola press release Wednesday. “This will include not only data-centric devices, but voice and collaboration-centric devices as well, many with multiple wireless communication options seamlessly available to the user.” <br /> <br />Based on the Wireless Next Generation (Wi-NG) architecture, this “network-in-a-box solution” includes: eight high-power PoE ports for 802.11n; a PCI express slot for wireless WAN backhaul 3G/4G services, such as EVDO, HSDPA, and WiMAX; and a PCI expansion slot for services such as IP PBX. The RFS6000 supports up to 48 802.11a/b/g/n APs and is capable of providing Wi-Fi coverage for up to 2,000 users. <o:p></o:p></span></p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"><span style=""> <br />The new switch offers enterprise-class security with integrated 802.1x, WPA/WPA2, stateful inspection firewall, VPN, AAA server, and NAC support. IT is also PCI and HIPAA compliance-capable out-of-the-box. <br /> <br />According to Motorola, the RFS6000 also supports toll-quality VoWi-Fi with Quality of Service (QoS) and Wi-Fi Multimedia Extensions and seamless roaming across Layer 3 boundaries, both inside and outside.<o:p></o:p></span></p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"> <br />Motorola also announced on Wednesday a unique tri-radio 802.11n AP, the AP-7131. The tri-radio design integrates three 802.11n radios that simultaneously support high-speed client access, mesh backhaul, and dedicated dual-band intrusion protection. Using an expansion slot, the third radio can be field-upgraded to enable next-generation 3G/4G technologies, such as WiMAX for primary or redundant WAN connectivity.</p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"> </p> <p class="MsoNormal" style="margin: 0in 0in 0pt;"><em>Naomi Graychase is Managing Editor at Wi-FiPlanet.</em></p><!--content_stop--> <br /></div></div><p> <br /></p><p> </p></p> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'><span class='post-author vcard'> Posted by <span class='fn'>Star Group</span> </span> <span class='post-timestamp'> at <a class='timestamp-link' href='https://ccna-secrets.blogspot.com/2008/03/types-of-networks.html' rel='bookmark' title='permanent link'><abbr class='published' title='2008-03-12T00:00:00-07:00'>12:00 AM</abbr></a> </span> <span class='post-comment-link'> <a class='comment-link' href='https://www.blogger.com/comment/fullpage/post/7598415047756206354/8533648868717033466' onclick=''>0 comments</a> </span> <span class='post-icons'> <span class='item-action'> <a href='https://www.blogger.com/email-post.g?blogID=7598415047756206354&postID=8533648868717033466' title='Email Post'> <img alt='' class='icon-action' src='http://www.blogger.com/img/icon18_email.gif'/> </a> </span> <span class='item-control blog-admin pid-1752056021'> <a href='https://www.blogger.com/post-edit.g?blogID=7598415047756206354&postID=8533648868717033466&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='https://resources.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> </div> <div class='post-footer-line post-footer-line-2'><span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'></div> </div> </div> </div> </div></div> <div class="date-outer"> <h2 class='date-header'><span>Thursday, February 21, 2008</span></h2> <div class="date-posts"> <div class='post-outer'> <div class='post hentry'> <a name='4365588820267211407'></a> <h3 class='post-title entry-title'> <a href='https://ccna-secrets.blogspot.com/2008/02/networking-technical-game.html'>Networking - A technical game</a> </h3> <div class='post-header-line-1'></div> <div class='post-body entry-content'> <p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.blogger.com/www.ciscopress.com"><img alt="" border="0" src="http://www.blogger.com/www.ciscopress.com" style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px;" /></a><br /><br /><br /><br /><div style="text-align: center; color: rgb(51, 51, 255);"><span style="font-size:180%;"><span style="font-weight: bold;">Basic Part 1:How to build CompNetworking Base?</span></span><br /></div><br /><p class="MsoNormal"><a href="http://compnetworking.about.com/od/basicnetworkingfaqs/l/blfaq003.htm">What is Client/Server Networking?</a></p> <p class="MsoNormal"><br />The term client/server refers to any network design utilizing "clients" and "servers." Client/server networks can be built on the Internet, on intranets, or in homes.</p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><a href="http://compnetworking.about.com/od/basicnetworkingfaqs/l/blfaq005.htm">What is Peer-to-Peer Networking?</a></p> <p class="MsoNormal">In contrast to client/server networking, peer-to-peer is a type of network design where all devices support roughly equivalent capabilities.</p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><a href="http://compnetworking.about.com/od/basicnetworkingfaqs/f/bandwidthunits.htm">How is Network Performance Measured?</a></p> <p class="MsoNormal"><br />The performance or "speed" of a computer network is normally measured in units of bits per second (bps). This quantity can represent either an actual data rate or a theoretical limit to available network bandwidth. The related units of Kbps, Mbps, Gbps represent increasingly larger multiples of bps.</p> <p class="MsoNormal"><br /><a href="http://compnetworking.about.com/cs/worldwideweb/g/bldef_www.htm">What Is the WWW?</a></p> <p class="MsoNormal"><br />The term "WWW" refers to the open development phase of the Internet in the 1990s. The WWW comprises a global network of Web sites accessible on the Internet.</p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><a href="http://compnetworking.about.com/od/internetaccessbestuses/l/bldef_url.htm">What Is a URL?</a></p> <p class="MsoNormal"><br />URLs (Uniform Resource Locators) identify by name Web servers and individual Web pages stored on those servers, anywhere on the Internet.</p> <p class="MsoNormal"><o:p> </o:p><br /><a href="http://compnetworking.about.com/library/glossary/bldef-uri.htm">What Is a URI?</a></p> <p class="MsoNormal"><br />A URI (Uniform Resource Identifier) names both local and remote Internet resources similar to URLs.<o:p></o:p></p> <p class="MsoNormal"><o:p> </o:p></p><div style="text-align: center;"><span style="font-weight: bold; color: rgb(51, 102, 255);font-size:180%;" >What is LAN?<br />Connecting Two Computers Directly With Cable </span><br /></div><br />The traditional method to network two computers involves making a dedicated link by plugging one cable into the two systems. Several alternatives exist for networking two computers in this manner: <ul><li> <a href="http://compnetworking.about.com/cs/ethernet1/g/bldef_ethernet.htm">Ethernet</a> crossover cable </li><li> <a href="http://compnetworking.about.com/od/networkcables/g/bldefnullmodem.htm">Null modem serial cable</a> or parallel peripheral cable </li><li> Special-purpose <a href="http://compnetworking.about.com/cs/cabling/g/bldef_usb.htm">USB</a> cables</li></ul><br /><b>Ethernet</b> - Of the above choices, the Ethernet method is preferred as it supports a reliable, high-speed connection with minimal configuration required(100Mbps).<div><script>zSB(3,3)</script> </div> Additionally, Ethernet technology offers the most general-purpose solution, allowing networks with more than two computers to be built fairly easily later. If one of your computers possesses an Ethernet adapter but the other has USB, an Ethernet crossover cable can still be used by first plugging a <i>USB-to-Ethernet converter</i> unit into the computer's USB port.<br /><br /><p><b>Serial and parallel</b> - This type of cabling, called <i>Direct Cable Connection (DCC)</i> when using Microsoft Windows, offers lower performance but offers the same basic functionality as Ethernet cables. You may prefer this option if you have such cables readily available and network speed is not a concern. Serial and parallel cables are never used to network more than two computers. </p><p><b>USB</b> - Ordinary USB cables must not be used to connect two computers directly to each other. Attempting to do so can electrically damage the computers! However, special USB cables designed for direct connection exist that can be used safely. You may prefer this option over others if your computers l</p><p>ack functional Ethernet network adapters. </p><p>To make dedicated connections with Ethernet, USB, serial or parallel cables requires </p><ol><li> each computer have a functioning network interface with an external jack for the cable, and<br /></li><li> the network settings on each computer appropriately configured </li></ol> One <b>phone line</b> or <b>power cord</b> cannot be used to directly connect two computers to each other for networking.<br /><br /><br /><p:colorscheme colors="#ffffff,#000000,#000000,#000000,#306774,#b92b38,#9999cc,#eeb30e"> </p:colorscheme><div shape="_x0000_s1026" class="O" style=""> <div style="text-align: center;"><span style="font-size:180%;"><b>10.10.10.10 </b></span></div> </div> <span style="font-size:180%;"><br /><p:colorscheme colors="#ffffff,#000000,#000000,#000000,#306774,#b92b38,#9999cc,#eeb30e"></p:colorscheme></span><span style="font-size:180%;"><b> What is this ?<br /><br /></b></span><div shape="_x0000_s1026" class="O" style=""> <div style="text-align: center;"><span style="font-size:180%;"><b> </b></span></div> <div style="text-align: center;"><div style="text-align: center;"><span style="font-size:180%;"><b>Just Set of numbers;<br />IP a</b></span> <span style="font-size:180%;"><b>ddress without </b></span><span style="font-size:32;"><b><span style="font-size:180%;">network mask is<br />just set of numbers.<br /></span></b></span><br /><span style="font-size:32;"><b><span style="font-size:180%;"><br /><br /></span></b></span><div style="text-align: left;"> <div style="text-align: left;"> <h1><span style="font-size:85%;"><a href="http://www.ciscopress.com/bookstore/product.asp?isbn=1587055422">CCNA Video Mentor: (CCNA Exam 640-802) (Video Learning), 2nd Edition</a></span></h1><h1><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj98jjE7gRpr9F_zU6Xk2U4a48Y0JQodcULuC6Fuo565NfQL93LiiuWrAfyA8nGi2xEO1hbyYFvxUGBM2vho7el74eRUWp7bD2IkPAWR-Cuc0XhAylTI1tq3C6fOsHA6xVfZp2sffJVx70/s1600-h/ShowCover.jpg"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5173906467362662082" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj98jjE7gRpr9F_zU6Xk2U4a48Y0JQodcULuC6Fuo565NfQL93LiiuWrAfyA8nGi2xEO1hbyYFvxUGBM2vho7el74eRUWp7bD2IkPAWR-Cuc0XhAylTI1tq3C6fOsHA6xVfZp2sffJVx70/s320/ShowCover.jpg" style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" /></a></h1><br /><br /><div style="text-align: center;" id="prodInfo"><ul><li>By <a href="http://www.ciscopress.com/authors/bio.asp?a=4eae296b-d6f0-44a3-869c-42126efebcf3">Wendell Odom</a>.</li><li>Published by <a href="http://www.ciscopress.com/">Cisco Press</a>.</li><li>Series: <a href="http://www.ciscopress.com/series/series.asp?ser=335014">Practical Studies</a>.</li></ul></div><div style="text-align: center;" id="biblio"><p>ISBN-10: 1-58720-168-2; ISBN-13: 978-1-58720-168-4; Published: Aug 23, 2006; Copyright 2007; Dimensions 7-1/16x9-1/8; Pages: 80; Edition: 1st. </p></div><div style="text-align: center;" id="requestReview"><p><a href="http://www.ciscopress.com/bookstore/sales.asp">Corporate, Academic, and Employee Purchases</a></p><p><a href="http://www.ciscopress.com/bookstore/sales.asp">International Buying Options</a></p></div></div><div> </div></div><br /><div style="text-align: center;"><br /><br /><br /><div style="text-align: center;"> </div><br /><div style="text-align: center;"> <div style="text-align: left;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://memberservices.informit.com/my_account/login.aspx?partner=7"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5173908636321146578" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAQ8SiWWPUTyhAr8SdaEYn1B-Af5tjxGinjYjgPpo854oXeMHJCJyjFxYERkcedoTdqI89uJxvlKIN8AvbmXyVFsi-O5783LJuftqbkcMvYfakQb9dY7l8Ug0hYYq9QQGVab67fOgvJg4/s320/cisco_sky.gif" style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 104px; height: 320px;" /></a></div> </div> <div style="text-align: center;"><br /></div><div style="text-align: center;"> </div><br /><div style="text-align: center;"> </div><br /><div style="text-align: left;"><br /></div><br /><div style="text-align: center;"> </div> </div></div><div style="text-align: left;"><h1><span style="font-size:130%;"><br /></span></h1></div></div> </div><br /><br /><br /><br /><br /><div style="text-align: center;"> </div><br /><br /><br /><div style="text-align: center;"> </div><br /><br /><br /><br /><br /><br /><br /><span style="font-size:130%;"><span style="font-weight: bold;"><a href="http://www.ciscopress.com/bookstore/product.asp?isbn=1587055422">CCNA SNPA QUICK REFERENCE</a><br /><br /><br /></span></span><!-- Start of StatCounter Code --><br /><script type="text/javascript"><br />var sc_project=3484808; <br />var sc_invisible=0; <br />var sc_partition=33; <br />var sc_security="90ed3eb9"; <br /></script><br /><div id="gB3" class="gB"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.ciscopress.com/bookstore/product.asp?isbn=1587055422"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5173911483884463842" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf1vXAE-3zksLosqi4fkqWmbNKEvQA25_ucpQqZsW4Mp_1Hf5fQCYoTvrqynqnvG7Igd3iKVHrBfixZe_HSw0yTQDvGgh4YNNkMJrxBOU_Gsp96BNXYOq4O8HCx3wQb7LDrhb0YrwQUvg/s320/CISCO1.JPG" style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" /></a></div><br /><script type="text/javascript" src="http://www.statcounter.com/counter/counter_xhtml.js"></script><noscript><br /><br /> </noscript><div id="buy"><div class="rowFirst"><div id="cartButton">ISBN-10: 1-58705-542-2; ISBN-13: 978-1-58705-542-3; Published: Feb 25, 2008; Copyright 2008; Dimensions 10-1/2x7-3/4; Pages: 140; Edition: 1st. </div></div></div><div id="requestReview"><p><a href="http://www.ciscopress.com/bookstore/sales.asp">Corporate, Academic, and Employee Purchases</a></p><p><a href="http://www.ciscopress.com/bookstore/sales.asp">International Buying Options</a></p></div><br /><noscript><br /><br /></noscript><div id="hepm"><div style="visibility: visible; display: block;" id="bss1"><h3>Product Description</h3><p style="margin: 0px;"><b>CCSP SNPA Quick Reference<br /></b></p><p style="margin: 0px;"><b><br /></b></p> <p style="margin: 0px;">Brandon James Carroll</p> <p style="margin: 0px;">ISBN-10: 1-58705-542-2</p> <p style="margin: 0px;">ISBN-13: 978-1-58705-542-3</p> <p style="margin: 0px;">As a final exam preparation tool, the <i>CCSP SNPA Quick Reference</i> provides a concise review of all objectives on the new CCSP SNPA exam (642-523). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style format. </p> <p style="margin: 0px;">With this document as your guide, you will review topics on securing networks using routers and switches. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you focus your study on areas of weakness and enhance memory retention of essential exam concepts.</p> <p style="margin: 0px;"><b><br /></b></p><p style="margin: 0px;"><b>TOC</b></p> <p style="margin: 0px;">1. Cisco Security Appliance Technology and Features and Families</p> <p style="margin: 0px;">2. Getting Started with Cisco Security Appliances Configurations </p> <p style="margin: 0px;">3. Inbound Traffic, ACLs, Object Grouping</p> <p style="margin: 0px;">4. AAA Configurations</p> <p style="margin: 0px;">5. Switching and Routing on ASA</p> <p style="margin: 0px;">6. Protocol Inspections</p> <p style="margin: 0px;">7. PIX and ASA VPNs </p> <p style="margin: 0px;">8. Understanding Transparent Firewall Mode</p> <p style="margin: 0px;">9. Virtual Firewalls</p> <p style="margin: 0px;">10. Failover</p><p style="margin: 0px;"><br /></p> <p style="margin: 0px;"><b>About the Author:</b></p> <p style="margin: 0px;"><b>Brandon James Carroll</b> is one of the country’s leading instructors for Cisco security technologies, teaching classes that include the CCNA, CCNP, and CCSP courses; a number of the CCVP courses’ and custom developed courseware. In his six years with Ascolta, Brandon has developed and taught many private Cisco courses for companies such as Boeing, Intel, and Cisco itself. He is a CCNA, CCNP, and CCSP and a certified Cisco instructor. Brandon is the author of <i>Cisco Access Control Security</i>.</p> <p style="margin: 0px;">Before becoming a technical instructor for Ascolta, Mr. Carroll was a technician and an ADSL specialist for GTE Network Services and Verizon Communications. His duties involved ISP router support and network design. As a lead engineer, he tested and maintained Frame Relay connections between Lucent B-STDX and Cisco routers. His team was in charge of troubleshooting ISP Frame Relay to ATM cutovers for ADSL customers. Brandon trained new employees at Verizon to the EPG in ADSL testing and troubleshooting procedures and managed a “Tekwizard” database for technical information and troubleshooting techniques. Mr. Carroll majored in information technology at <st2:sn st="on">St.</st2:sn> <st2:middlename st="on">Leo</st2:middlename> <st2:sn st="on">University</st2:sn>.<br /></p><p style="margin: 0px;"><br /></p> <p style="margin: 0px;"><b>About the Technical Editor:</b></p> <p style="margin: 0px;"><b>Murtaza Bhaiji</b>, <b>CCIE No. 14445 (Security)</b>, is a solution-oriented IT security specialist with notable success directing a broad range of corporate IT initiatives over his seven-year career. Murtaza holds a number of certifications in different fields, notably CCIE in Security. He has also been an avid speaker in forums such as Network Society of Pakistan and Ethink-Tank Tanzania. Murtaza’s specialty is in design aspects of solutions using best-fit technologies and products in line with business needs. Currently he is positioned as manager of networking and security for Mideast Data Systems.</p> <p style="margin: 0px;"> </p></div></div><br /><br /><table border="0" cellpadding="0" cellspacing="0" width="458"><tbody><tr><td rowspan="4" align="left" valign="top" width="214"><a href="http://scores.sify.com/"><img alt="India" border="0" height="200" src="http://im.sify.com/sifycmsimg/mar2008/Sports/14616757_indteam_205x200.jpg" width="205" /></a></td> <td class="arial12boldblack" align="left" height="30" valign="middle" width="244"><a href="http://scores.sify.com/" target=""><b>India create history, win CB Series </b></a></td> </tr> <tr> <td class="arial12normalblack" style="padding-right: 5px;" align="left" height="82" valign="top"><div align="justify"> <p>India created history by notching up their first-ever cricket tri-series title on Australian soil by pipping the World Champions by nine runs in a nail-biting second final, which saw fortune fluctuating from one team to the other till the very end. </p></div></td></tr></tbody></table><br /><br /><br /><br /><h2>Zvents releases open-source cluster database to beat Google!</h2><br /><div class="entry"> <p>Moving the project from in-house to <a id="KonaLink7" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >open </span><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >source</span></span></a> is a way for a relatively small company to get the infrastructure software it needs, Judd says. “We aren’t in the <a id="KonaLink8" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">database</span></span></a> business. this is the kind of infrastructure that should be in open source. This is not company proprietary stuff,” he says.</p> <p>The current Hypertable version is a 0.9 alpha release, and has been tested on about 10 nodes so far, Judd says. But Yahoo <a id="KonaLink9" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >developers</span></span></a> have expressed in interest in “kicking the tires” and testing on more nodes. Yahoo developers are already involved in another way: Hypertable stores its data on a distributed filesystem, and the database developers are currently using the Apache <a id="KonaLink10" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >Software</span></span></a> Foundation’s Hadoop, which Yahoo supports by employing lead Hadoop developer Doug Cutting and his team and with infrastructure.</p> <p>The <a id="KonaLink11" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">Google</span></span></a> database design on which Hypertable is based, Bigtable, attracted a lot of developer buzz and a “Best Paper” award from the USENIX Association for “Bigtable: A Distributed <a id="KonaLink12" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >Storage </span><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >System</span></span></a> for Structured Data” a 2006 publication from nine Google researchers including Fay Chang, Jeffrey Dean, and Sanjay Ghemawat. Google’s Bigtable uses the company’s in-house Google <a id="KonaLink13" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">File </span><span class="kLink" style="font-family:Georgia;">System</span></span></a> for storage.</p> <p>The API for Hypertable is slightly different from Bigtable’s, Judd says. Although it is not a full <a id="KonaLink14" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">SQL </span><span class="kLink" style="font-family:Georgia;">database</span></span></a>, it is more featureful than a simple key/value store such as Brad Fitzpatrick’s memcached. Memcached is widely used along with a conventional SQL database in high-traffic web sites, to cache chunks of HTML and XML and save an <a id="KonaLink15" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">application</span></span></a> from having to query the main database.</p> <p>Brian Aker, director of architecture for open source database supplier MySQL AB, says that he can see a development path that would bridge the gap from the Hypertable API to a full SQL database. In an email interview, he wrote, “Someone could turn this into a backend for <a id="KonaLink16" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">MySQL</span></span></a> without a lot of effort. You would gain an SQL interface by doing this.” For Hypertable as is, Aker says he can see several applications. Besides log data, Hypertable could be useful for image and object <a id="KonaLink17" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="font-family:Georgia;">servers</span></span></a>, and for pre-rendering responses to Representational State Transfer (REST) queries produced by web applications. By Don Marti, LinuxWorld.com,</p> <p>EST, explained in one of last year’s hot <a id="KonaLink18" target="_top" class="kLink" style="text-decoration: underline ! important; position: static;" href="http://xlphp.net/hosting-blog/?p=141#"><span style="font-family:Georgia;"><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >web </span><span class="kLink" style="border-bottom: 1px solid red;font-family:Georgia;color:#0e0000;" >development</span></span></a> books, RESTful Web Services, is a design philosophy for web applications that exposes a web application as a large tree of URLs. Since a client could potentially request or post data to one of many URLs, each responsible for a small piece of information, Hypertable could be a useful way to scale the REST server to handle more traffic.</p> </div><br /><br /><h2><a href="http://xlphp.net/hosting-blog/?p=140" rel="bookmark" title="Permanent Link to Google uses Code Jam as job interview">Google uses Code Jam as job interview</a></h2><br /><div class="entry"> <p>Polish university student Marek Cygan has won this year’s Google Code Jam, the annual programming contest held last Friday at the California headquarters of the search firm.</p> <p>Dutch student Erik-Jan Krijgsman finished second, followed by Petr Mitrichev from Moscow’s State University.</p> <p>Cygan beat 99 fellow programmers from 32 countries to the first price of $10,000. The contestants were selected from a group of 14,500 hopefuls from around the world who entered the contest through the internet.</p> <p>The programmers had 75 minutes to create a solution for three problems, followed by a 10-minute final round. Contestants were allowed to use the Java, C++, C# or VB.NET programming languages.</p> <p>During an interview at the event, Google declined to provide details about the tasks as the competition was still running.</p> <p>Previous contests involved contestants creating an application to calculate the shortest route through a maze, and to devise an application that would determine the largest group of people that know each other in a social network.</p> <p>Another provided the coder with the weight of several children and asked them to create an application that would spread them on a seesaw so that the device would balance.</p> <p>The tasks are not picked randomly, but are linked to problems that Google itself is facing with its applications.</p> <p>“Things like finding the fastest way out of a maze is not that different from computing directions in Google Maps,” Jeff Huber, vice president of engineering at Google, told vnunet.com.</p> <p>The competition helps the company identify programmers who are good at solving such problems and thereby acts as a recruiting tool. About a third of the 100 finalists also had a job interview scheduled.</p> <p>Huber stressed, however, that winning the competition did not guarantee a job and that Google still followed its regular recruiting procedures. “This is a nice introduction, but not a shortcut,” he said.</p> <p>This year’s competition marked the first time that a woman made it to the final round. Although Google declined to comment on Stefanie Leitzka’s performance, Huber hoped that the German student’s participation would encourage other women to start a career in computer sciences.</p> <p>“We have a long way to go to improving the diversity that we should have in the field and the industry,” he acknowledged.</p> <p>Huber could not provide a percentage of women software engineers in Google’s workforce, but said that the company is “healthy” relative to the industry.</p> </div> <p class="tagged"><span class="add_comment"></span><strong></strong><br /></p><br /><h2>Necessary skills to improve your earnings</h2><br /><p> </p><div class="entry"> Anyone looking for <a href="http://www.combinedresults.com/">work at home opportunity</a> can easily make handsome earning through <a href="http://www.theaffiliatereport.net/">pay per click program</a>. For this all they need is basic IT knowledge in the form of <a href="http://www.microsoft-braindumps.com/">Microsoft certification</a> and the latest <a href="http://www.highsiteranking.com/Search-Engine-Optimization/SEO-Tips.html">seo tips</a>. Nowadays some quality <a href="http://www.sharphosts.com/web-hosting-companies/">web hosting companies</a> are offering free tips to their clients. While making the selection of <a href="http://www.envisionwebhosting.com/">web site hosting</a>, webmasters should focus on this feature as well. Another basic requirement for success in this field is high speed internet connection. In this regard <a href="http://www.voipforisp.com/">IP phones</a> are considered the best. </div><br /><br /><h2>Google to bid for 700MHz spectrum</h2><br /><div class="entry"> <p>Google intends to bid on wireless spectrum in the 700MHz band when the U.S. Federal Communications Commission begins auctioning that resource in late January, the company announced Friday.<br />On this topic</p> <p>FCC awards spectrum to public safety group<br />Google needs telco partner for 700MHz bid, say analysts<br />E.U. releases telecom review, proposes spectrum shakeup</p> <p>Wireless# Certification Official Study Guide</p> <p>Get practical tips, IT news, how-tos, and the best in tech humor.</p> <p>Google has previously expressed interest in the spectrum, which is being made available as U.S. television stations move to all-digital broadcasts by February 2009. Earlier this year, Google joined consumer and public-interest groups in calling for the FCC to impose open-access rules on part of the 62MHz of spectrum to be auctioned. In July, the FCC voted to require open-access rules, which would require the winning bidder to allow outside devices and applications on the network.</p> <p>“We believe it’s important to put our money where our principles are,” Eric Schmidt, Google’s chairman and CEO, said in a statement. “Consumers deserve more competition and innovation than they have in today’s wireless world. No matter which bidder ultimately prevails, the real winners of this auction are American consumers who likely will see more choices than ever before in how they access the Internet.”</p> <p>Google’s recently acquired interest in wireless spectrum has led it in several directions. The company launched the Open Handset Alliance, an open-development platform for mobile phones, earlier this month.</p> <p>Google has also supported efforts to push Congress to pass net neutrality requirements, which would prohibit broadband providers from blocking or slowing Web content not approved by them. Google’s interest in the spectrum came after AT&T and other large broadband providers expressed interest in recent years in getting Web-based businesses to pay more for their customers’ use of the broadband networks.</p> <p>Google will file an application to participate in the 700MHz auction on Monday, the company said in a news release. Google’s application will not include any partners.</p> <p>In July, Google promised the FCC that it would bid at least US$4.6 billion for a block of spectrum. The FCC later set a reserve price of $4.6 billion on the so-called C Block of spectrum, the 22MHz block where the commission required open access. If the reserve price isn’t met, the FCC would re-auction the spectrum, presumably without the open-access rule.</p><p style="text-align: center; font-weight: bold;"><span style="font-size:130%;"><br /></span></p><p style="text-align: center; font-weight: bold;"><span style="font-size:130%;">Test your knowledge in networking</span></p><p style="text-align: center; font-weight: bold;"><span style="font-size:130%;">Security Quiz</span></p><p style="text-align: left; font-weight: bold;"><span><b>. Which of the following will NOT help secure your desktop PCs?</b><br /></span><input id="ctl07_q1_A" name="ctl07$q1" value="q1_A" type="radio"><label for="ctl07_q1_A"><span style="font-size: 10pt;">A</span>) Turn on Automatic Updates<br /></label><input id="ctl07_q1_B" name="ctl07$q1" value="q1_B" type="radio"><label for="ctl07_q1_B"><span style="font-size: 10pt;">B</span>) Turn on Windows Firewall<br /></label><input id="ctl07_q1_C" name="ctl07$q1" value="q1_C" type="radio"><label for="ctl07_q1_C"><span style="font-size: 10pt;">C</span>) Install antivirus software<br /></label><input id="ctl07_q1_D" name="ctl07$q1" value="q1_D" type="radio"><label for="ctl07_q1_D"><span style="font-size: 10pt;">D</span>) Open email attachments from an unknown sender<br /></label><br /><span><b>2. Which of the following is an example of a strong password?</b><br /></span><input id="ctl07_q2_A" name="ctl07$q2" value="q2_A" type="radio"><label for="ctl07_q2_A"><span style="font-size: 10pt;">A</span>) Password<br /></label><input id="ctl07_q2_B" name="ctl07$q2" value="q2_B" type="radio"><label for="ctl07_q2_B"><span style="font-size: 10pt;">B</span>) J*p2le04>F<br /></label><input id="ctl07_q2_C" name="ctl07$q2" value="q2_C" type="radio"><label for="ctl07_q2_C"><span style="font-size: 10pt;">C</span>) Your real name, user name, or company name<br /></label><br /><span><b>3. True or false: If you have a firewall on your network you don't need to turn on Windows Firewall.</b><br /></span><input id="ctl07_q3_A" name="ctl07$q3" value="q3_A" type="radio"><label for="ctl07_q3_A"><span style="font-size: 10pt;">A</span>) True<br /></label><input id="ctl07_q3_B" name="ctl07$q3" value="q3_B" type="radio"><label for="ctl07_q3_B"><span style="font-size: 10pt;">B</span>) False<br /></label><br /><span><b>4. How can you prevent intruders from accessing your wireless network?</b><br /></span><input id="ctl07_q4_A" name="ctl07$q4" value="q4_A" type="radio"><label for="ctl07_q4_A"><span style="font-size: 10pt;">A</span>) Encrypt network traffic with WPA or WEP<br /></label><input id="ctl07_q4_B" name="ctl07$q4" value="q4_B" type="radio"><label for="ctl07_q4_B"><span style="font-size: 10pt;">B</span>) Restrict access to trusted MAC addresses<br /></label><input id="ctl07_q4_C" name="ctl07$q4" value="q4_C" type="radio"><label for="ctl07_q4_C"><span style="font-size: 10pt;">C</span>) Both<br /></label><br /><span><b>5. True or false: If you set your antivirus software to auto-update then you don't need Windows Automatic Updates.</b><br /></span><input id="ctl07_q5_A" name="ctl07$q5" value="q5_A" type="radio"><label for="ctl07_q5_A"><span style="font-size: 10pt;">A</span>) True<br /></label><input id="ctl07_q5_B" name="ctl07$q5" value="q5_B" type="radio"><label for="ctl07_q5_B"><span style="font-size: 10pt;">B</span>) False<br /></label><br /><span><b>6. True or false: Small businesses are not targets for hackers.</b><br /></span><input id="ctl07_q6_A" name="ctl07$q6" value="q6_A" type="radio"><label for="ctl07_q6_A"><span style="font-size: 10pt;">A</span>) True<br /></label><input id="ctl07_q6_B" name="ctl07$q6" value="q6_B" type="radio"><label for="ctl07_q6_B"><span style="font-size: 10pt;">B</span>) False<br /></label><br /><span><b>7. What is "phishing?"</b><br /></span><input id="ctl07_q7_A" name="ctl07$q7" value="q7_A" type="radio"><label for="ctl07_q7_A"><span style="font-size: 10pt;">A</span>) "Spoofed" e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords<br /></label><input id="ctl07_q7_B" name="ctl07$q7" value="q7_B" type="radio"><label for="ctl07_q7_B"><span style="font-size: 10pt;">B</span>) A type of computer virus<br /></label><input id="ctl07_q7_C" name="ctl07$q7" value="q7_C" type="radio"><label for="ctl07_q7_C"><span style="font-size: 10pt;">C</span>) An example of a strong password<br /></label><input id="ctl07_q7_D" name="ctl07$q7" value="q7_D" type="radio"><label for="ctl07_q7_D"><span style="font-size: 10pt;">D</span>) None of the above<br /></label><br /><span><b>8. What product can be used to update all PCs on your network?</b><br /></span><input id="ctl07_q8_A" name="ctl07$q8" value="q8_A" type="radio"><label for="ctl07_q8_A"><span style="font-size: 10pt;">A</span>) Software Update Services<br /></label><input id="ctl07_q8_B" name="ctl07$q8" value="q8_B" type="radio"><label for="ctl07_q8_B"><span style="font-size: 10pt;">B</span>) Internet Information Server<br /></label><input id="ctl07_q8_C" name="ctl07$q8" value="q8_C" type="radio"><label for="ctl07_q8_C"><span style="font-size: 10pt;">C</span>) Bluetooth Networking<br /></label><input id="ctl07_q8_D" name="ctl07$q8" value="q8_D" type="radio"><label for="ctl07_q8_D"><span style="font-size: 10pt;">D</span>) Microsoft Baseline Security Analyzer<br /></label><br /><span><b>9. What method(s) can be used to protect sensitive data from prying eyes?</b><br /></span><input id="ctl07_q9_A" name="ctl07$q9" value="q9_A" type="radio"><label for="ctl07_q9_A"><span style="font-size: 10pt;">A</span>) Passwords<br /></label><input id="ctl07_q9_B" name="ctl07$q9" value="q9_B" type="radio"><label for="ctl07_q9_B"><span style="font-size: 10pt;">B</span>) File permissions<br /></label><input id="ctl07_q9_C" name="ctl07$q9" value="q9_C" type="radio"><label for="ctl07_q9_C"><span style="font-size: 10pt;">C</span>) Encryption<br /></label><input id="ctl07_q9_D" name="ctl07$q9" value="q9_D" type="radio"><label for="ctl07_q9_D"><span style="font-size: 10pt;">D</span>) All of the above<br /></label><br /><span><b>10. How often should you perform an incremental backup?</b><br /></span><input id="ctl07_q10_A" name="ctl07$q10" value="q10_A" type="radio"><label for="ctl07_q10_A"><span style="font-size: 10pt;">A</span>) Daily<br /></label><input id="ctl07_q10_B" name="ctl07$q10" value="q10_B" type="radio"><label for="ctl07_q10_B"><span style="font-size: 10pt;">B</span>) Every other day<br /></label><input id="ctl07_q10_C" name="ctl07$q10" value="q10_C" type="radio"><label for="ctl07_q10_C"><span style="font-size: 10pt;">C</span>) Weekly<br /></label><input id="ctl07_q10_D" name="ctl07$q10" value="q10_D" type="radio"><label for="ctl07_q10_D"><span style="font-size: 10pt;">D</span>) Monthly</label></p><br /><p style="text-align: left; font-weight: bold;">Correct answers are below</p><p style="text-align: left; font-weight: bold;">1 -> D</p><p style="text-align: left; font-weight: bold;">2-> B<br /></p><p style="text-align: left; font-weight: bold;">3-> B</p><p style="text-align: left; font-weight: bold;">4-> C</p><p style="text-align: left; font-weight: bold;">5-> B</p><p style="text-align: left; font-weight: bold;">6-> B</p><p style="text-align: left; font-weight: bold;">7-> A</p><p style="text-align: left; font-weight: bold;">8-> B<br /></p> </div><span style="font-weight: bold;">9-> D<br /><br />10-> A</span><br /><table bgcolor="#ffffff" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td style="vertical-align: top;"><br /></td></tr></tbody></table><br /><br /><noscript><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><div class="statcounter"><a href="http://www.statcounter.com/" target="_blank"><img alt="web stats" class="statcounter" src="http://c34.statcounter.com/3484808/0/90ed3eb9/0/" /></a></div></noscript><br /><!-- End of StatCounter Code --><br /><br /><script src="http://widgets.technorati.com/t.js" type="text/javascript"> </script><br /><a href="http://technorati.com/?sub=tr_searches-horizontal-ticker_t_js" class="tr_searches-horizontal-ticker_t_js" style="color: rgb(66, 97, 223);"><br /></a></p> <div style='clear: both;'></div> </div> <div class='post-footer'> <div class='post-footer-line post-footer-line-1'><span class='post-author vcard'> Posted by <span class='fn'>Star Group</span> </span> <span class='post-timestamp'> at <a class='timestamp-link' href='https://ccna-secrets.blogspot.com/2008/02/networking-technical-game.html' rel='bookmark' title='permanent link'><abbr class='published' title='2008-02-21T04:38:00-08:00'>4:38 AM</abbr></a> </span> <span class='post-comment-link'> <a class='comment-link' href='https://www.blogger.com/comment/fullpage/post/7598415047756206354/4365588820267211407' onclick=''>0 comments</a> </span> <span class='post-icons'> <span class='item-action'> <a href='https://www.blogger.com/email-post.g?blogID=7598415047756206354&postID=4365588820267211407' title='Email Post'> <img alt='' class='icon-action' src='http://www.blogger.com/img/icon18_email.gif'/> </a> </span> <span class='item-control blog-admin pid-1752056021'> <a href='https://www.blogger.com/post-edit.g?blogID=7598415047756206354&postID=4365588820267211407&from=pencil' title='Edit Post'> <img alt='' class='icon-action' height='18' src='https://resources.blogblog.com/img/icon18_edit_allbkg.gif' width='18'/> </a> </span> </span> </div> <div class='post-footer-line post-footer-line-2'><span class='post-labels'> </span> </div> <div class='post-footer-line post-footer-line-3'></div> </div> </div> </div> </div></div> </div> <div class='blog-pager' id='blog-pager'> <a class='home-link' href='https://ccna-secrets.blogspot.com/'>Home</a> </div> <div class='clear'></div> <div class='blog-feeds'> <div class='feed-links'> Subscribe to: <a class='feed-link' href='https://ccna-secrets.blogspot.com/feeds/posts/default' target='_blank' type='application/atom+xml'>Posts (Atom)</a> </div> </div> </div></div> </div> <div id='ads-wrapper'> <div class='sidebar section' id='ads'><div class='widget HTML' data-version='1' id='HTML4'> <div class='widget-content'> <form id="cse-search-box" action="http://www.google.com/cse" target="_blank"> <div> <input value="partner-pub-6459936282003542:9hqudp-tbtk" name="cx" type="hidden"/> <input value="ISO-8859-1" name="ie" type="hidden"/> <input name="q" size="31" type="text"/> <input value="Search" name="sa" type="submit"/> </div> </form> <script src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en" type="text/javascript"></script> </div> <div class='clear'></div> </div> <div class='widget HTML' data-version='1' id='HTML1'> <h2 class='title'>Text-Ads</h2> <div class='widget-content'> <!-- Start of StatCounter Code --> <script type="text/javascript"> var sc_project=3484808; var sc_invisible=0; var sc_partition=33; var sc_security="90ed3eb9"; </script> <script src="http://www.statcounter.com/counter/counter_xhtml.js" type="text/javascript"></script><noscript><div class="statcounter"><a href="http://www.statcounter.com/" target="_blank"><img alt="web stats" src="http://c34.statcounter.com/3484808/0/90ed3eb9/0/" class="statcounter"/></a></div></noscript> <!-- End of StatCounter Code --> </div> <div class='clear'></div> </div><div class='widget HTML' data-version='1' id='HTML2'> <h2 class='title'>Links</h2> <div class='widget-content'> <script type="text/javascript"><!-- google_ad_client = "pub-6459936282003542"; google_ad_host = "pub-1556223355139109"; google_ad_host_channel="00000"; /* 468x60, created 4/13/08 */ google_ad_slot = "1707580037"; google_ad_width = 468; google_ad_height = 60; google_cpa_choice = ""; // on file //--> </script> <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript"> </script> </div> <div class='clear'></div> </div><div class='widget HTML' data-version='1' id='HTML3'> <h2 class='title'>Feeds</h2> <div class='widget-content'> </div> <div class='clear'></div> </div></div> </div> <!-- spacer for skins that want sidebar and main to be the same height --> <div class='clear'> </div> </div> <!-- end content-wrapper --> </div> <div id='footer-wrapper'> <div class='footer no-items section' id='footer'></div> </div> </div> </div> <!-- end outer-wrapper --> <script type="text/javascript" src="https://www.blogger.com/static/v1/widgets/3576124627-widgets.js"></script> <script type='text/javascript'> window['__wavt'] = 'AOuZoY6PG1_H78ARrnoUyrBL7-_9MKU3Xg:1726795600755';_WidgetManager._Init('//www.blogger.com/rearrange?blogID\x3d7598415047756206354','//ccna-secrets.blogspot.com/','7598415047756206354'); _WidgetManager._SetDataContext([{'name': 'blog', 'data': {'blogId': '7598415047756206354', 'title': 'Mastering Networks', 'url': 'https://ccna-secrets.blogspot.com/', 'canonicalUrl': 'http://ccna-secrets.blogspot.com/', 'homepageUrl': 'https://ccna-secrets.blogspot.com/', 'searchUrl': 'https://ccna-secrets.blogspot.com/search', 'canonicalHomepageUrl': 'http://ccna-secrets.blogspot.com/', 'blogspotFaviconUrl': 'https://ccna-secrets.blogspot.com/favicon.ico', 'bloggerUrl': 'https://www.blogger.com', 'hasCustomDomain': false, 'httpsEnabled': true, 'enabledCommentProfileImages': true, 'gPlusViewType': 'FILTERED_POSTMOD', 'adultContent': false, 'analyticsAccountNumber': '', 'encoding': 'UTF-8', 'locale': 'en', 'localeUnderscoreDelimited': 'en', 'languageDirection': 'ltr', 'isPrivate': false, 'isMobile': false, 'isMobileRequest': false, 'mobileClass': '', 'isPrivateBlog': false, 'isDynamicViewsAvailable': true, 'feedLinks': '\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Mastering Networks - Atom\x22 href\x3d\x22https://ccna-secrets.blogspot.com/feeds/posts/default\x22 /\x3e\n\x3clink rel\x3d\x22alternate\x22 type\x3d\x22application/rss+xml\x22 title\x3d\x22Mastering Networks - RSS\x22 href\x3d\x22https://ccna-secrets.blogspot.com/feeds/posts/default?alt\x3drss\x22 /\x3e\n\x3clink rel\x3d\x22service.post\x22 type\x3d\x22application/atom+xml\x22 title\x3d\x22Mastering Networks - Atom\x22 href\x3d\x22https://www.blogger.com/feeds/7598415047756206354/posts/default\x22 /\x3e\n', 'meTag': '\x3clink rel\x3d\x22me\x22 href\x3d\x22https://www.blogger.com/profile/00831695462290251859\x22 /\x3e\n', 'adsenseClientId': 'ca-pub-6459936282003542', 'adsenseHostId': 'ca-host-pub-1556223355139109', 'adsenseHasAds': true, 'adsenseAutoAds': false, 'boqCommentIframeForm': true, 'loginRedirectParam': '', 'view': '', 'dynamicViewsCommentsSrc': '//www.blogblog.com/dynamicviews/4224c15c4e7c9321/js/comments.js', 'dynamicViewsScriptSrc': '//www.blogblog.com/dynamicviews/bea942728df245a5', 'plusOneApiSrc': 'https://apis.google.com/js/platform.js', 'disableGComments': true, 'interstitialAccepted': false, 'sharing': {'platforms': [{'name': 'Get link', 'key': 'link', 'shareMessage': 'Get link', 'target': ''}, {'name': 'Facebook', 'key': 'facebook', 'shareMessage': 'Share to Facebook', 'target': 'facebook'}, {'name': 'BlogThis!', 'key': 'blogThis', 'shareMessage': 'BlogThis!', 'target': 'blog'}, {'name': 'Twitter', 'key': 'twitter', 'shareMessage': 'Share to Twitter', 'target': 'twitter'}, {'name': 'Pinterest', 'key': 'pinterest', 'shareMessage': 'Share to Pinterest', 'target': 'pinterest'}, {'name': 'Email', 'key': 'email', 'shareMessage': 'Email', 'target': 'email'}], 'disableGooglePlus': true, 'googlePlusShareButtonWidth': 0, 'googlePlusBootstrap': '\x3cscript type\x3d\x22text/javascript\x22\x3ewindow.___gcfg \x3d {\x27lang\x27: \x27en\x27};\x3c/script\x3e'}, 'hasCustomJumpLinkMessage': false, 'jumpLinkMessage': 'Read more', 'pageType': 'index', 'pageName': '', 'pageTitle': 'Mastering Networks'}}, {'name': 'features', 'data': {}}, {'name': 'messages', 'data': {'edit': 'Edit', 'linkCopiedToClipboard': 'Link copied to clipboard!', 'ok': 'Ok', 'postLink': 'Post Link'}}, {'name': 'template', 'data': {'name': 'custom', 'localizedName': 'Custom', 'isResponsive': false, 'isAlternateRendering': false, 'isCustom': true}}, {'name': 'view', 'data': {'classic': {'name': 'classic', 'url': '?view\x3dclassic'}, 'flipcard': {'name': 'flipcard', 'url': '?view\x3dflipcard'}, 'magazine': {'name': 'magazine', 'url': '?view\x3dmagazine'}, 'mosaic': {'name': 'mosaic', 'url': '?view\x3dmosaic'}, 'sidebar': {'name': 'sidebar', 'url': '?view\x3dsidebar'}, 'snapshot': {'name': 'snapshot', 'url': '?view\x3dsnapshot'}, 'timeslide': {'name': 'timeslide', 'url': '?view\x3dtimeslide'}, 'isMobile': false, 'title': 'Mastering Networks', 'description': '', 'url': 'https://ccna-secrets.blogspot.com/', 'type': 'feed', 'isSingleItem': false, 'isMultipleItems': true, 'isError': false, 'isPage': false, 'isPost': false, 'isHomepage': true, 'isArchive': false, 'isLabelSearch': false}}]); _WidgetManager._RegisterWidget('_NavbarView', new _WidgetInfo('Navbar1', 'navbar', document.getElementById('Navbar1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HeaderView', new _WidgetInfo('Header1', 'header', document.getElementById('Header1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_ProfileView', new _WidgetInfo('Profile1', 'sidebar', document.getElementById('Profile1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogArchiveView', new _WidgetInfo('BlogArchive1', 'sidebar', document.getElementById('BlogArchive1'), {'languageDirection': 'ltr', 'loadingMessage': 'Loading\x26hellip;'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_AdSenseView', new _WidgetInfo('AdSense1', 'main', document.getElementById('AdSense1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_BlogView', new _WidgetInfo('Blog1', 'main', document.getElementById('Blog1'), {'cmtInteractionsEnabled': false, 'lightboxEnabled': true, 'lightboxModuleUrl': 'https://www.blogger.com/static/v1/jsbin/128363787-lbx.js', 'lightboxCssUrl': 'https://www.blogger.com/static/v1/v-css/13464135-lightbox_bundle.css'}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML4', 'ads', document.getElementById('HTML4'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML1', 'ads', document.getElementById('HTML1'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML2', 'ads', document.getElementById('HTML2'), {}, 'displayModeFull')); _WidgetManager._RegisterWidget('_HTMLView', new _WidgetInfo('HTML3', 'ads', document.getElementById('HTML3'), {}, 'displayModeFull')); </script> </body> </html>