Wednesday, March 26, 2014

Creating PPPoE Dialer In Windows XP

Click on Start  OR Press "Windows Sign "  from Keyboard and click on Control panel. Click on "Network and Internet Connections"


Click on "Network Connections"



Click on "Create a new connection"


Click on "Next" button


Select "Connect to the Internet" option from the selection and then click on "Next" button


Select "Set up my Connection Manually" option from the selection and then click on "Next" button

Select "Connect using a broadband connection that requires a user name and password" option from the selection and then click on "Next" button


Type the "ISP name" then click on next


Enter the username and password and then click on "Next" button


Select "Add a shortcut to this connection to my desktop" option  and then click on "Finish" button


Double click on dialer shortcut on desktop and click on connect button.






Saturday, March 22, 2014

Configration of Siemens Gigaset modem (SE568)

In web browser enter the modem IP address "192.168.254.254" and press Enter Key. Then enter the Username "admin"and Password "admin" then click on login button.


Click on "ISP Connection" Then click on "Advanced Settings" button.



Then click on "Configure the ATM Virtual Circuit" option


Then Click on "Add a New VC" button


Enter  the VPI and VCI according to your Internet Service Provider then click on "Next" button.


Select "PPPOE" radio button from the selection then click on "Next" button


Select "Client only" radio button from the selection then click on "Next" button




Enter the Username and Password provided by your ISP (Internet service provider) then click on "Next" button



Select 1st radio button "1" and click on "Next"



Select "Auto Connect on Disconnect" then click on "Next" button

Click on "Reboot" button to save changes.










Wednesday, March 19, 2014

Access the modem Remotely (Access from WAN )

After login click on "Management" then click on "Access Control" then click on "Services Control" Select the Access control services on WAN side then click on "Apply/Save" button.


Friday, March 14, 2014

Changing Default Username and Password of AN1020-25, KW5815

After login click on "Management" then click on "Access Control" then click on "Passwords"
In "Username" enter "admin" and in "New Username" enter any other name if you want to change username otherwise enter the new username "admin". In "Old password" field enter the admin password and in "New Password" field enter any password which you want then at last click on "Apply/Save" button to save changes.


Wednesday, March 12, 2014

Difference Between ADSL Modem and Router

An ADSL modem is a device that transmits and receives data over the plain old telephone system's (POTS). It allows your PC to connect to your ISP using the Internet Protocol. The modem acts as a "bridge" between your PC and your ISP. The dynamic or static public IP address which your modem obtains from your ISP is passed on to your PC. Your ADSL modem forwards packets based on hardware level MAC addresses between your ISP's router (the Internet) and your PC.

A router is a device which acts as an interface between two networks. It forwards packets based on network level addresses between your ISP's router and either your LAN network or your single PC. A router learns more about the networks to which it is connected and can be more selective about the packets it passes on. A router rejects packets unless they match predefined attributes (eg specific protocols or destination network addresses). A router can also select the best route for packets to take in large interconnected networks.

Sunday, March 9, 2014

Creating Dial-Up Connection For Using Free Internet Service in all over the Pakistan

Click on Start and select "Run" Option OR Press "Windows Sign + R" together from Keyboard. Type "rasphone" and click on "Ok"


Click on "New" button

Click on "Dial-up"


Enter the Telephone number "13177777" then Enter the Destination name and then click on "Next" button.



Enter "User name" and "Password" as "ptcl" and Click on "Remember this password" check box and then click on "Create" button




Saturday, March 8, 2014

Speed Touch 330 Modem configuration and Installation

Step 1: After entering CD it will automatically or from CD drive click setup, prompt for  
            language, choose English (Most Case)

Step 2:  After choosing language it will open following windows, click Reinstall my
              speed Touch

Step 3:  After That Well come windows appear, click NEXT

Step 4: Select Your Product, from the list and click next.
Step 5:   Check at safety instruction, some scroll from left side then click option appears 
              and click Next
Step 6:   Check your BOX accessories and Click NEXT.


Step 7: Plug DSL line in your Modem and Click NEXT.


Step 8: Keep in mind your VPI/VCI, Connection Type (PPPOE ) , User Name And Password provided by your ISP.


Step 9:  Click at Set Up My Speed Touch on startup window.


Step 10:  Click Next on well come to install wizard.


Step 11:  Choose PPPOE OR Bridging  and Click Next
Note: When choose bridging you have to make PPPOE dialer and if you choose PPPOE then wizard will make dialer automatically.


Step 12:  Give VPI.VCI (According to your ISP) and click Next.


Step 13: Installation wizard will start installing modem


Step 14: Connecting hardware windows will search your modem (Please exit your 
              Firewall if any, you have ,in case of problem).when it detect modem will give 
              Next option ,so Click Next.


Step 15:  Give your username and password which is provided by ISP,click Next.(In Case of PPPOE)



Step 16: At internet connection setup, click yes 


Step 17:  It will Check DSL synch ,if its ,then will create dialer and connect to internet





Step 18:  After successful login it will ask for Finish, So click Finish.



Friday, March 7, 2014

Difference between an Ethernet hub and Ethernet switch

A switch is more expensive and a network built with switches is generally considered faster than one built with hubs.

When a hub receives a packet of data at one of its ports from a PC on the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on the network.  If two or more PCs on the network try to send packets at the same time a collision is occurs.  When that happens all of the PCs have to go though a routine to resolve the conflict. Each Ethernet Adapter has both a receiver and a transmitter.  If the adapters didn't have to listen with their receivers for collisions they would be able to send data at the same time they are receiving it (full duplex).   Because they have to operate at half duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs, the maximum bandwidth is 100 Mhz and that bandwidth is shared by all of the PC's connected to the hub. The result is when a person using a computer on a hub downloads a large file or group of files from another computer the network becomes congested.  In a 10 Mhz 10Base-T network the affect is to slow the network to nearly a crawl.

An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers which don't compete with other pairs of computers for network bandwidth.  It accomplishes this by maintaining a table of each destination address and its port.  When the switch receives a packet, it reads the destination address from the header information in the packet, establishes a temporary connection between the source and destination ports, sends the packet on its way, and then terminates the connection.an Ethernet switch do not share the transmission media, do not experience collisions or have to listen for them, can operate in a full-duplex mode, have bandwidth as high as 200 Mbps, 100 Mbps each way, and do not share this bandwidth with other PCs on the switch.  In short, a switch is more better.

Thursday, March 6, 2014

Enable or Disable DHCP in AN1020-25

Dynamic Host Configuration Protocol (DHCP)

When a DHCP-configured client connects to a network, the DHCP client sends a broadcast query requesting necessary information from a DHCP server. The DHCP server manages a pool of IP addresses and information about client configuration parameters such as default gateway, the DNS servers, other servers such as time servers etc. On receiving a valid request, the server assigns an IP address, a lease (length of time the allocation is valid), and other IP configuration parameters, such as the subnet mask and the default gateway.
Depending on implementation, the DHCP server may have three methods of allocating IP-addresses.

Dynamic allocation: A network administrator assigns a range of IP addresses to DHCP, and each client computer on the LAN has requested an IP address from the DHCP server during network initialization. The request-and-grant process uses a lease concept with a controllable time period, allowing the DHCP server to reclaim (and then reallocate) IP addresses that are not renewed (dynamic re-use of IP addresses).

Automatic allocation: The DHCP server permanently assigns a free IP address to a requesting client from the range defined by the administrator. This is like dynamic allocation, but the DHCP server keeps a table of past IP address assignments, so that it can preferentially assign to a client the same IP address that the client previously had.

Static allocation: The DHCP server allocates an IP address based on a table with MAC address/IP address pairs, which are manually filled by a network administrator. Only requesting clients with a MAC address listed in this table will be allocated an IP address. This feature is not supported by all routers.



Enable or Disable DHCP in AN1020-25

Click on "Advanced Setup" then click on "LAN"
Click on "enable DHCP Server" Radio button to enable DHCP Server.
By clicking on "Enable LAN side firewall" check box the firewall will be enable for LAN users.
If you want to access the router with any other IP address then click on "Configure the second IP address and Subnet Mask for LAN Interface" option check box then enter an IP address and subnet Mask then click on Apply/Save button. Now router can be access with both addresses.

Wednesday, March 5, 2014

Change DNS Setting in AN1020-25u router


After Login Click on "Advanced Setup" Then click on "DNS" and then click on "DNS Server".
Select the option "Use the following static DNS IP address" and enter the public DNS then click on "Apply/Save" button.


Difference between Antivirus and Firewall

Antivirus software

Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.
A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. To counter such so called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses for looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened or run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.
However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), the success of it is going to depend on whether it achieves the right balance between false positives and false negatives. False positives can be as destructive as false negatives. In one case, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack
In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period.

Firewall

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques

Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.

Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.

Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.

Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Tuesday, March 4, 2014

Standard Telephone Rosette Installation

Telephone rosette installation is not as simple as sometimes we think about it. Here are some most common mistakes for rosette installation.

a)     Remove extra wire coating/shielding and don’t leave extra cable within the rosette.
b) Make sure that cable is not connecting with some other connector or screw of rosette.

c) Always tie the cable within the screws of rosette. Don’t directly join the cables with each other in the rosette as shown in the figure.



d) Don’t put extra cable within the rosette.


Here is ideal and Standard Rosette installation given below.