Wednesday, 29 May 2013

Format USB Pen Drive in NTFS file system in window XP



To enable NTFS on your USB Flash Drive drive (USB Flash Memory):
  1. Right click My Computer and select Manage.
  2. Open the Device Manager and find your USB drive under the Disk Drives heading.



3. Right click the drive and select Properties.
4. Choose Policies tab and select the "Optimize for performance" option.
5. Click OK.
6. Open My Computer
7. Select Format on the flash drive.
8. Choose NTFS in the File System dropdown box.
9. Device Formatting is completed.






Comparison Of FAT, FAT32, And NTFS File Systems


Windows® 2000 Server or Windows Server 2003 allow you to choose between NTFS, FAT, and FAT32 file systems. IBM® iSeries™ Integration for Windows Server installs your system drives using an appropriate file system that depends on the hardware resource capabilities, Windows version and intended use. The installation command gives you the option of converting FAT or FAT32 drives to NTFS. In some cases, the conversion to NTFS is automatically performed based on the intended use of the server (for example, a domain role of *DMNCTL).
Note:
Do not convert the D drive to NTFS. It must remain FAT.
You do have the option of converting the C drive. Here are some comparisons that might help you decide: 

FATFAT32NTFS
Volume from floppy diskette size up to 4 GBVolumes from 512 MB to 2 terabytes (TB) (Size limited to 32 GB by Windows)Volume 10 MB to 2 TB
Maximum file size 2 GBMaximum file size 4 GBFile size limited by size of volume
Does not support Windows 2000 or Windows 2003 Active DirectoryDoes not support Windows 2000 or Windows 2003 Active DirectoryRequired to use Windows 2000 or Windows 2003 Active Directory or shared cluster drives
Allows access to files on the hard disk with MS-DOS.Does not allow access to files on the hard disk with MS-DOS.Does not allow access to files on the hard disk with MS-DOS.
Allows you to customize your server with NWSD configuration filesAllows you to customize your server with NWSD configuration files.Cannot use NWSD configuration files.
Allows you to use the NWSD dump tool (QFPDMPLS) to retrieve files from the disk for serviceAllows you to use the NWSD dump tool to retrieve files from the disk for serviceCannot use the dump tool to retrieve files from the disk

Tuesday, 28 May 2013

Units Of Computer Memory Measurements


GUID Partition Table



Short for GUID Partition Table, GPT is a part of the EFI standard that defines the layout of the partition table on a hard drive. GPT is meant as a replacement to hard drives using a MBR partition table, which have a 2.20TB size limitation and extends upon UEFI. Using GPT a drive could support between 8 and 9.4 ZB depending on the sector size.
If you're using a version of Windows that supports GPT while setting up a drive in Disk Management you will receive a prompt similar to the below example. Selecting GPT and clicking Ok will initialize the disk as a GPT partition style.
The GUID Partition Table disk architecture was introduced as part of the Extensible Firmware Interface initiative. GUID Partition Table is a new disk architecture that expands on the older Master Boot Record (MBR) partitioning scheme that has been common to Intel-based computers.
A partition is a contiguous space of storage on a physical or logical disk that functions as though it were a physically separate disk. Partitions are visible to the system firmware and the installed operating systems. Access to a partition is controlled by the system firmware and the operating system that is currently active
GUID Partition Table disks can grow to a very large size. As of July 2001, the Microsoft implementation supports a hard disk of up to 18 EB (512 KB LBAs).
The number of partitions on a GUID Partition Table disk is not constrained by temporary schemes such as container partitions as defined by the MBR Extended Boot Record. The Microsoft implementation of GUID Partition Table is limited to 128 partitions. However, it is important to note that one partition is used for the EFI System Partition, one for the Microsoft Reserved and two more are used if you use dynamic disks. This leaves 124 partitions for data use.
The GUID Partition Table disk partition format is well defined and fully self-identifying. Data that is critical to the operating system is located in partitions and not in unpartitioned or "hidden" sectors. GUID Partition Table does not allow for hidden sectors or partitions. GUID Partition Table disks use primary and backup partition tables for redundancy and CRC32 fields for improved partition data structure integrity. The GUID Partition Table partition format uses version number and size fields for future expansion.
Each GUID Partition Table partition has a unique identification GUID and a partition content type, so no coordination is necessary to prevent partition identifier collision. Each GUID Partition Table partition has a 36-character Unicode name, which means that any software can present an easily readable name for the partition without any additional understanding of the partition.

MBR (Master Boot Record)


A Master Boot Record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond. The MBR holds the information on how the logical partitions, containing file systems, are organized on that medium. Besides that, the MBR functions as an operating system-independent chain boot loader in conjunction with each partition's Volume Boot Record (VBR).
MBRs are not present on non-partitioned media like floppies, superfloppies or other storage devices configured to behave as such.
The concept of MBRs was introduced in 1983. With storage volumes now commonly exceeding 2 TB, it has become a limiting factor in the 2010s. The MBR partitioning scheme is therefore in the process of being superseded by the GUID Partition Table (GPT) scheme in new computers. A GPT can coexist with a MBR in order to provide some limited form of backward compatibility for older systems.

Wednesday, 22 May 2013

Rollover Cable

Rollover cable (also known as Cisco console cable or a Yost cable) is a type of null-modem cable that is often used to connect a computer terminal to a router's console port. 
A console port uses a rollover cable and a special connector. The rollover cable is just a 8 wire cable in which pin 1 on one end goes to pin 8 on the other, pin 2 to pin 7, etc. The special connector is just a DB 9 (serial) female that has a RJ45 connector on the back where the rollover cable is inserted. It uses special wiring and tends to be specific to Cisco gear although there might be some exceptions. I suspect you might hear 'console cable' and it would refer to both the rollover cable and the connector as a whole. 

Cisco Redundant Power System 2300


Increases network availability
Seamlessly provides backup power to network devices
Modular power supplies and fan for flexibility and increased availability
Management and configuration capabilities allow users to define and implement the failover policy



The Cisco Redundant Power System (RPS) 2300 increases availability for converged data, voice, and video networks.


The RPS 2300:


Delivers power supply redundancy and resiliency for a variety of power requirements, including Power over Ethernet (PoE).


Helps ensure uninterrupted operation and protection against device power supply failures by providing seamless failover for Cisco switches including the Cisco Catalyst 3750-E Series Switches and routers such as Cisco Integrated Services Routers.
Uses modular power supplies and fan for flexibility
Allows users to define and implement the fail over policy
Is backward compatible with switches and routers previously supported by the Cisco Redundant Power System 675 Has six RPS connectors and can simultaneously back up as many as two switches or routers.




Tuesday, 21 May 2013

Managed Leased Line Network (MLLN)


The MLLN is a Managed Leased Line Network system which is proposed to provide Leased line connectivity. With the State-of-the-art technology equipment,MLLN is designed mainly for having effective control and monitor on the leased line so that the down time is very much minimised and the circuit efficiency is increased thus achieving more customer satisfaction. This mainly deals with data circuits ranging from 64 KBPs to 2048 KBPs.
In MLLN network conventional PCM primary MUX and subscriber Modems are replaced by versatile MUX and network terminating units respectively. MLLN mainly consists of Digital Cross Connect (DXC), versatile MUX (V MUX), Network Terminating Units (NTU) and Network Management System(NMS). DXC's and VMUX's are inter connected via optical fibre links with alternate routing facility in case of any route failure. VMUX is in turn connected to NTU's placed at customer premises through 2 wire copper pair. At the top of it NMS is suitably placed at the Central location for effective control & monitor. NTUs are fully managed from NMS. They are programmable for different data speeds ranging from 64 KBPs (nx64 KBPs: nx1 to 32) depending upon the customer demand, thus having bandwidth control without changing Modem at his premises. NTUs operate on 230V AC.

Features of MLLN
Control, Manage the leased line network
Bandwidth management as per the customer demand
Pro-active maintenance, without waiting for customer to book a complaint.
Self Diagnostic/software loops to check E1 connectivity to DXC, VMUX/software
loops for checking copper pair at NTU point for immediately identifying the faulty
section for trouble shooting .
Alternate routing in case of any route failure.
Generation of the periodic performance reports for self-analysis/customer.



Monday, 20 May 2013

VPN (Virtual Private Network)


VPN utilizes public telecommunications networks to conduct private data communications. Most VPN implementations use the Internet as the public infrastructure and a variety of specialized protocols to support private communications through the Internet.
VPN follows a client and server approach. VPN clients authenticate users, encrypt data, and otherwise manage sessions with VPN servers utilizing a technique called tunneling.
VPN clients and VPN servers are typically used in these three scenarios:
1. To support remote access to an intranet,
2. To support connections between multiple intranets within the same organization
3. To join networks between two organizations, forming an extranet.
The main benefit of a VPN is the lower cost needed to support this technology compared to alternatives like traditional leased lines or remote access servers.
VPN users typically interact with simple graphical client programs. These applications support creating tunnels, setting configuration parameters, and connecting to and disconnecting from the VPN server. VPN solutions utilize several different network protocols including PPTP, L2TP, IPsec, and SOCKS.
VPN servers can also connect directly to other VPN servers. A VPN server-to-server connection extends the intranet or extranet to span multiple networks.
Many vendors have developed VPN hardware and software products. Some of these do not interoperate due to the immaturity of some VPN standards.

Sunday, 19 May 2013

Two Kinds of Leased Lines


Managed Leased Line Network (MLLN) Network Modem will be provided by BSNL.
Conventional Leased Line Network (CLLN), Network Modem will be provided by the customer.

Leased Lines

A leased line connects two locations for private voice and data telecommunication service. Not a dedicated cable, a leased line is actually a reserved circuit between two points. Leased lines can span short or long distances. They maintain a single open circuit at all times, as opposed to traditional telephone services that reuse the same lines for many different conversations through a process called "switching."  Leased lines most commonly are rented by businesses to connect branch offices, because these lines guarantee bandwidth for network traffic.