Posts

Windows Server 2008

Abstract The Windows Server 2008 Foundation Network Guide provides instructions on how to plan and deploy the core components required for a fully functioning network and a new Active Directory domain in a new forest. Using this guide, you can deploy computers configured with the following Windows server components: ·          The Active Directory Domain Services (AD DS) server role ·          The Domain Name System (DNS) server role ·          The Dynamic Host Configuration Protocol (DHCP) server role ·          The Network Policy Server (NPS) role service of the Network Policy and Access Services server role ·          The Windows Internet Name Service (WINS) feature ·          Transmission Control Protocol/Internet Protocol ver...

SAP Stands For

SAP - System Application & Products SAP is basically designed to create a common centralized database for all the applications running in all the departments in an organization. The kind of application you can manage includes - ·          Logistics ·          Finances ·          Reporting ·          HR etc. The original name for SAP was : Systeme, Anwendungen, Produkte (In German). The system comprises of a number of fully integrated modules, which covers virtually every aspect of the business management. The Key benefits of SAP are :- ·          It Eliminates the duplication and redundancy in data. ·          Increases productivity, efficiency and better management of resources. ·        ...

How to remove shortcut virus from PC

HOW TO REMOVE SHORTCUT VIRUS FROM PC/LAPTOP OR PEN DRIVE ? Method#1 1.        Open CMD. (Go to Run > type CMD > hit enter) 2.        Now you need to write one simple command. Just write the command which is shown below.  attrib -h -s -r -a /s /d DRIVENAME:*.* press ENTER Now replace the “Drive-Name” with your drive name. Lets assume you want to remove the shortcut virus from the drive C then your command will be   attrib -h -s -r -a /s /d C:*.* 3. Now hit the enter button. And your all the shortcut virus will be removed. And now you can simply go back and delete the shortcut folder normally. METHOD#2 .Bat file is nothing but its an execution of any file. You can make a .bat file easily using notepad and you have to write the same command which I mentioned above. In case if the above CMD method don’t work try this. And also using this method you can   remove the shortcut vir...

Technical Part of a Full STM 1890 Port

Technical part - ASR (Answer-Seize Rtaio) will be minimum 40%+ Answer-Seizur e Ratio (ASR) It is the ratio between the successful calls and the attempted calls that cannot be  answered for any reason. In case of lower ASR, it is expected that the route provided  to the call is choked-up for the subscribers to make phone calls. - ACD (Average Call Duration) will be minimum 8.5 minute Average Call Duration (ACD) It is the total amount of time taken by the call. In case of lower ACD, it is expected  that the quality of the connection is not good enough for the subscriber to continue  the call.   - PDD (Post Dial Delay) will be maximum 1 sec Post Dial Delay (PDD) On dialing phone number, either there is a ring or busy tone that tells us that whether  the called party is available or not. The time elapsed between dialing a number and  hearing a tone is referred to as Post Dial Delay (PDD). In case of higher PDD, it i...

Hide Your Computer Drive

Image
Now-a-days computer end users have faced most common problems that how can they hide computer drive with a easiest way and also recover it again and they don't know how to solved it. I must said that this article wrote for those end users who really don't know how to solved it. Just stay tune with me, keep patience and follow my following instructions with the real scenario. Hopefully you can easily understood my instructions. Step 1: Click start button go Accessories click run command button, then type cmd in run command dialog box. Step 2: You can show your desired command prompt window. Step 3: Type diskpart and press enter key. Step 4: Type list volume and press enter key. You can easily show your harddrive list with index number in detail. Step 5: Here you can show all drive letters with detail. Now you can hide your desired drive just select your hard drive letter and type DISKPART> select volume 5 (suppose you want to hide driv...

OSI Model

Image
OSI Model ( O pen  S ystems  I nterconnection model) The International Standards Organization's OSI model serves as a standard template for describing a network protocol stack. The Protocol Stack Using TCP/IP as a model, the sending application hands data to the transport layer, which breaks it up into the packets required by the network. It stores the sequence number and other data in its header. The network layer adds source and destination data in its header, and the data link layer adds station data in its header. On the other side, the corresponding layer reads and processes the headers and discards them. Upper Layers Layers 7 through 4 comprise the upper layers of the OSI protocol stack. They are more geared to the type of application than the lower layers, which are designed to move packets, no matter what they contain, from one place to another. Application Layer 7 This top layer defines the language and syntax that p...

IP ADDRESS

IP address classes Class 1 st  Octet Decimal Range 1 st  Octet High Order Bits Network/Host ID (N=Network, H=Host) Default Subnet Mask Number of Networks Hosts per Network (Usable Addresses) A 1 – 126* 0 N.H.H.H 255.0.0.0 126 (2 7  – 2) 16,777,214 (2 24  – 2) B 128 – 191 10 N.N.H.H 255.255.0.0 16,382 (2 14  – 2) 65,534 (2 16  – 2) C 192 – 223 110 N.N.N.H 255.255.255.0 2,097,150 (2 21  – 2) 254 (2 8  – 2) D 224 – 239 1110 Reserved for Multicasting E 240 – 254 1111 Experimental; used for research Note:  Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback and diagnostic functions. Private IP Addresses Class Private Networks Subnet M...