Thursday, August 24, 2017

Virtualization

What is Virtualization?


Virtualization is the process of creating a software-based (or virtual) representation of something rather than a physical one. Virtualization can apply to applications, servers, storage, and networks and is the single most effective way to reduce IT expenses while boosting efficiency and agility for all size businesses.

Virtualization uses software to simulate the existence of hardware and create a virtual computer system. Doing this allows businesses to run more than one virtual system – and multiple operating systems and applications -- on a single server. This can provide economies of scale and greater efficiency.

Benefits of Virtualization

Virtualization can increase IT agility, flexibility, and scalability while creating significant cost savings. Workloads get deployed faster, performance and availability increases and operations become automated, resulting in IT that's simpler to manage and less costly to own and operate. Additional benefits include:
  • Reduce capital and operating costs.
  • Minimize or eliminate downtime.
  • Increase IT productivity, efficiency, agility and responsiveness.
  • Provision applications and resources faster.
  • Enable business continuity and disaster recovery.
  • Simplify data center management.
  • Build a true Software-Defined Data Center
We can use few Virtual Application like Oracle-Virtual Box, Mircosoft Virtul PC & VMWare etc for establish Virtual Network between multiple Virtul Windows in a single physical Machine /Operating System.


Microsoft could not ignore the virtualization trend. Microsoft introduced Hyper-V as a virtualization platform in 2008, and it continued to release new Hyper-V versions with new Windows server versions. So far, there are a total of four versions, including Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 and Windows Server 2008. 

Tuesday, May 2, 2017

Virtual LANs






VLAN is a logical grouping of networking devices. It ( Allows us to split switches into Seperate (Virtual ) Networks


  •  When we create VLAN, we actually break large broadcast domain in smaller broadcast domains. Consider VLAN as a subnet. 

  • Same as two different subnets cannot communicate with each other without router, different VLANs also requires router to communicate.

  • Only members of a VLAN can see that VLAN’s traffic

  • Inter-VLAN traffic must be routed (i.e. go through a router) because they are separate subnets.


Advantage of VLAN

VLAN provides following advantages:-
  • Solve broadcast problem
  • Reduce the size of broadcast domains
  • Allow us to add additional layer of security
  • Make device management easier
  • Allow us to implement the logical grouping of devices by function instead of location.
  • Solve broadcast problem

    When we connect devices into the switch ports, switch creates separate collision domain for each port and single broadcast domain for all ports. Switch forwards a broadcast frame from all possible ports. In a large network having hundreds of computers, it could create performance issue. Of course we could use routers to solve broadcast problem, but that would be costly solution since each broadcast domain requires its own port on router. Switch has a unique solution to broadcast issue known as VLAN. In practical environment we use VLAN to solve broadcast issue instead of router.
    Each VLAN has a separate broadcast domain. Logically VLANs are also subnets. Each VLAN requires a unique network number known as VLAN ID. Devices with same VLAN ID are the members of same broadcast domain and receive all broadcasts. These broadcasts are filtered from all ports on a switch that aren’t members of the same VLAN.
  • Reduce the size of broadcast domains

    VLAN increase the numbers of broadcast domain while reducing their size. For example we have a network of 100 devices. Without any VLAN implementation we have single broadcast domain that contain 100 devices. We create 2 VLANs and assign 50 devices in each VLAN. Now we have two broadcast domains with fifty devices in each. Thus more VLAN means more broadcast domain with less devices.
  • Allow us to add additional layer of security

  • VLANs enhance the network security. In a typical layer 2 network, all users can see all devices by default. Properly configured VLANs gives us total control over each port and users. With VLANs, you can control the users from gaining unwanted access over the resources. We can put the group of users that need high level security into their own VLAN so that users outside from VLAN can’t communicate with them.
  • Make device management easier

    Device management is easier with VLANs. Since VLANs are a logical approach, a device can be located anywhere in the switched network and still belong to the same broadcast domain. We can move a user from one switch to another switch in same network while keeping his original VLAN. For example our company has a five story building and a single layer two network. In this scenario, VLAN allows us to move the users from one floor to another floor while keeping his original VLAN ID. The only limitation we have is that device when moved, must still be connected to the same layer 2 network.

Tuesday, May 3, 2016




                     All my icons change to internet Icon in Windows

Solutions


1.go to start menu. 
2.run command & Type 
4.HKEY_CURRENT_USER\\software\microsoft\windows\currentvershion\explorer\flexts\ 
5.search for .lnk ext. 
6.delete hole .lnk key or delete the user choice key on that. 
7 just restart

Friday, August 2, 2013

COMFIGURE OUTLOOK 2007 WITH GMAIL ACCOUNT

To configure Outlook 2007 for your Gmail address:
  1. Enable POP in your email account. Don't forget to click Save Changes when you're done.
  2. Open Outlook.
  3. Click the Tools menu, and select Account Settings...
  4. On the E-mail tab, click New...
  5. If you are prompted to Choose E-mail Service, select Microsoft Exchange, POP3, IMAP, or HTTP, and click Next.
  6. Fill in all necessary fields to include the following information:
  7. Your Name: Enter your name as you would like it to appear in the From: field of outgoing messages.
    Email Address: Enter your full Gmail email address (username@gmail.com). Google Apps users, enter your full address in the formatusername@your_domain.com.
    Password: Enter your email password.

    Manually configure server settings or additional server types: Leave this option unchecked if you want to automatically configure Outlook 2007. If you want to manually configure Outlook 2007, check this box now. Google Apps users should configure manually as follows.
    Enter name, email address, and password
  8. Click Next. If you are configuring Outlook 2007 automatically, you're done! Just click Finish.
  9. Successful Configuration
  10. If you are configuring Outlook 2007 manually, select Internet E-mail and click Next.
  11. Verify your User Information, and enter the following additional information:
  12. Server Information
    Account Type: POP3
    Incoming mail server: pop.gmail.com (Google Apps users, enter the server names provided, don't add your domain name in these steps)
    Outgoing mail server (SMTP): smtp.gmail.com
    Logon Information
    User Name: Enter your Gmail username (including @gmail.com). Google Apps users, enter your full address in the format username@your_domain.com
    Password: Enter your email password.
    Require logon using Secure Password Authentication (SPA): Leave this option unchecked.
    Account Settings
  13. Click the More Settings... button, and select the Outgoing Server tab.
  14. Check the box next to My outgoing server (SMTP) requires authentication and select Use same settings as my incoming mail server.
  15. Outgoing Server Tab
  16. Click the Advanced tab, and check the box next to This server requires an encrypted connection (SSL) under Incoming Server (POP3).
  17. In the Outgoing server (SMTP) box, enter 587, and select TLS from the drop-down menu next to Use the following type of encrypted connection:.
  18. Advanced Tab
  19. Click OK.
  20. Click Test Account Settings... After receiving 'Congratulations! All tests completed successfully', click Close.
  21. Click Next, and then click Finish.

Sunday, May 20, 2012

Routing And Remote Access

Routing and Remote Access is essentially a software router that can be configured to connect separate network segments.


What is Routing?????

Routing is a process of transferring data accros an interconnected network from one LAN to another.

In IP networks, routing is performed according to IP routing tables. All IP host use routing table to forward IP traffic.

Routing and Remote Access services can be configured for LAN to LAN, LAN to WAN, VPN & NAT routing through IP networks.
Hardware routers include many built-in ports, each of which typically connects to a distinct network segment. The hardware router can route traffic from any one port to another. For Routing And Remote Access, however, the number of network segments among which traffic can be routed is limited by the number of network interfaces installed on the Windows Server 2003 computer running the service. For example, if you have configured your Windows Server 2003 computer with two network cards and a modem, the Routing And Remote Access service can route traffic among three networks.
For an example of a Windows Server 2003 computer running the Routing And Remote Access service and configured with four network adapters. In this scenario, the Routing And Remote Access service is routing IP traffic among four LANs.
 
Windows 2003 server  configured with four NIC card:
 
Enabling Routing And Remote Access
The Routing And Remote Access service is installed by Windows Server 2003 Setup in a disabled state. You can enable and configure the service by running the Routing And Remote Access Server Setup Wizard. Note that if the server on which you want to configure the Routing And Remote Access service is a member server of an Active Directory domain.

Friday, November 18, 2011

What are the system recovery options in Windows 7?

The System Recovery Options menu contains several tools, such as Startup Repair, that can help you recover Windows from a serious error. This set of tools is on your computer's hard disk and on the Windows installation disc.

Notes
You can also create a system repair disc that contains the System Recovery Options menu.

If you use a Tablet PC or other computer with a touchscreen, you might need to connect a keyboard and mouse in order to use Startup Repair and the other tools in the System Recovery Options menu.

The 'System Recovery Options' are a set of 5 tools, listed below, which can be used to repair or recover a damaged operating system:

Startup Repair - can be used to scan your computer and fix missing or damaged system files that prevent Windows from starting correctly.

System Restore - can be used to restore Windows system files to the state of an earlier point in time, while leaving all your user files untouched. You can use System Restore when you want to revert to an earlier configuration which you know it worked properly. For example, if you installed multiple applications and you are suddenly experiencing random restarts, boot failures and Startup Repair failed to fix anything, the quickest way to solve the problem is to use System Restore.
NOTE: In order to use System Restore you must have at least one system restore point previously created.

System Image Recovery - can be used to restore a system image. When everything else fails, this can be the solution to your problems. When Startup Repair and System Restore are not helping.
NOTE: In order to use this tool you must have a previously created system image file..


Windows Memory Diagnostic - scans your computer's memory for errors.

Command Prompt - can be used by advanced users to perform recovery-related operations. These operations should only be used by advanced users. If you are not sure on what you are doing, you can end-up with your Windows 7 in a state which is a lot worse than before.

 There are two ways of accessing the 'System Recovery Options': from the Windows 7 installation DVD or directly from your hard-disk




Tuesday, August 2, 2011

Make Windows Bootable USB Drive without any Software





Note-OS required Windows,Window 7 DVD & 4 GB Pendrive.

Step1- Login as Administrator
Step2- Format Pendrive in NTFS & make it Active 

Step3-Open cmd prompt & Type  the following command now:
F:\>CD BOOT and hit enter.Where “F” is your DVD drive letter & G: for USB drive
CD BOOT and hit enter to see the below message.
7. Type another command given below to update the USB drive with BOOTMGR compatible code.
BOOTSECT.EXE /NT60 G:

Step4- Copy All Contents from windows 7 DVD to pendrive & install win7 in Mini laptop,notebook from pen drive.

Virtualization

What is Virtualization? Virtualization is the process of creating a software-based (or virtual) representation of something rather than a...