Windows Server 2008

Abstract The Windows Server 2008 Foundation Network Guide provides instructions on how to plan and deploy the core components required for a fully functioning network and a new Active Directory domain in a new forest. Using this guide, you can deploy computers configured with the following Windows server components: ·The Active Directory Domain Services (AD DS) server role ·The Domain Name System (DNS) server role ·The Dynamic Host Configuration Protocol (DHCP) server role ·The Network Policy Server (NPS) role service of the Network Policy and Access Services server role ·The Windows Internet Name Service (WINS) feature ·Transmission Control Protocol/Internet Protocol version 4 (TCP/IP) connections on individual servers
This guide also serves as a foundation for companion guides that show you how to deploy additional network technologies in Windows Server 2008.
Network hardware requirements To successfully deploy a foundation network, you must deploy network hardware, including the following…

SAP Stands For

SAP - System Application & Products SAP is basically designed to create a common centralized database for all the applications running in all the departments in an organization. The kind of application you can manage includes - ·Logistics ·Finances ·Reporting ·HR etc. The original name for SAP was : Systeme, Anwendungen, Produkte (In German). The system comprises of a number of fully integrated modules, which covers virtually every aspect of the business management. The Key benefits of SAP are :- ·It Eliminates the duplication and redundancy in data. ·Increases productivity, efficiency and better management of resources. ·Improves Customer Service through better Customer Interaction.

How to remove shortcut virus from PC

HOW TO REMOVE SHORTCUT VIRUS FROM PC/LAPTOP OR PEN DRIVE ? Method#1 1.Open CMD. (Go to Run > type CMD > hit enter) 2.Now you need to write one simple command. Just write the command which is shown below.
 attrib -h -s -r -a /s /d DRIVENAME:*.* press ENTER
Now replace the “Drive-Name” with your drive name. Lets assume you want to remove the shortcut virus from the drive C then your command
will beattrib -h -s -r -a /s /d C:*.*
3. Now hit the enter button. And your all the shortcut virus will be removed. And now you can simply go back and delete the shortcut folder normally. METHOD#2 .Bat file is nothing but its an execution of any file. You can make a .bat file easily using notepad and you have to write the same command which I mentioned above. In case if the above CMD method don’t work try this. And also using this method you canremove the shortcut virusfrom all of your drive in just one single step while in CMD method you’ll have to do it separately one by one.
1.Open Notepad. (Run >…

Technical Part of a Full STM 1890 Port

Technical part

- ASR (Answer-Seize Rtaio) will be minimum 40%+

Answer-Seizure Ratio (ASR)
It is the ratio between the successful calls and the attempted calls that cannot be answered for any reason. In case of lower ASR, it is expected that the route provided to the call is choked-up for the subscribers to make phone calls.
- ACD (Average Call Duration) will be minimum 8.5 minute
Average Call Duration (ACD)
It is the total amount of time taken by the call. In case of lower ACD, it is expected that the quality of the connection is not good enough for the subscriber to continue the call.
- PDD (Post Dial Delay) will be maximum 1 sec
Post Dial Delay (PDD)
On dialing phone number, either there is a ring or busy tone that tells us that whether the called party is available or not. The time elapsed between dialing a number and hearing a tone is referred to as Post Dial Delay (PDD). In case of higher PDD, it is expected that there is no dial tone for the subscriber to initiate a call.

Proper CLI…

Hide Your Computer Drive

Now-a-days computer end users have faced most common problems that how can they hide computer drive with a easiest way and also recover it again and they don't know how to solved it. I must said that this article wrote for those end users who really don't know how to solved it. Just stay tune with me, keep patience and follow my following instructions with the real scenario. Hopefully you can easily understood my instructions.
Step 1: Click start button go Accessories click run command button, then type cmd in run command dialog box.

Step 2: You can show your desired command prompt window.

Step 3: Type diskpart and press enter key.

Step 4: Type list volume and press enter key. You can easily show your harddrive list with index number in detail.

Step 5: Here you can show all drive letters with detail. Now you can hide your desired drive just select your hard drive letter and type DISKPART> select volume 5 (suppose you want to hide drive letter I:, 5 is the index number of this drive l…

OSI Model

OSI Model

(Open Systems Interconnection model) The International Standards Organization's OSI model serves as a standard template for describing a network protocol stack.

The Protocol Stack
Using TCP/IP as a model, the sending application hands data to the transport layer, which breaks it up into the packets required by the network. It stores the sequence number and other data in its header. The network layer adds source and destination data in its header, and the data link layer adds station data in its header. On the other side, the corresponding layer reads and processes the headers and discards them.

Upper Layers

Layers 7 through 4 comprise the upper layers of the OSI protocol stack. They are more geared to the type of application than the lower layers, which are designed to move packets, no matter what they contain, from one place to another.
Application Layer 7 This top layer defines the language and syntax that programs use to communicate with other programs. The application laye…


IP address classes
Class 1st Octet Decimal Range 1st Octet High Order Bits Network/Host ID (N=Network, H=Host) Default Subnet Mask Number of Networks Hosts per Network (Usable Addresses) A 1 – 126* 0 N.H.H.H 126 (27 – 2) 16,777,214 (224 – 2) B 128 – 191 10 N.N.H.H 16,382 (214 – 2) 65,534 (216 – 2) C 192 – 223 110 N.N.N.H 2,097,150 (221 – 2) 254 (28 – 2) D 224 – 239 1110 Reserved for Multicasting E 240 – 254 1111 Experimental; used for research
Note: Class A addresses to cannot be used and is reserved for loopback and diagnostic functions.
Private IP Addresses