Saturday, July 20, 2013

Routing Information Protocol (RIP) By :- Network-Facts

Routing Information Protocol (RIP)  By :- Network-Facts


Roting Information Protocol (RIP) is a standards-based, distance-vector, interior gateway protocol (IGP) used by routers to exchange routing information. RIP uses hop count to determine the best path between two locations. Hop count is the number of routers the packet must go through till it reaches the destination network. The maximum allowable number of hops a packet can traverse in an IP network implementing RIP is 15 hops.
it has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it's inefficient on large networks with slow WAN links or on networks with a large number of routers installed.
In a RIP network, each router broadcasts its entire RIP table to its neighboring routers every 30 seconds. When a router receives a neighbor's RIP table, it uses the information provided to update its own routing table and then sends the updated table to its neighbors.
Differences between RIPv1 or RIPv2
RIPv1
·         A classful protocol, broadcasts updates every 30 seconds, hold-down period 180 seconds. Hop count is metric (Maximum 15).
·         RIP supports up to six equal-cost paths to a single destination, where all six paths can be placed in the routing table and the router can load-balance across them. The default is actually four paths, but this can be increased up to a maximum of six. Remember that an equal-cost path is where the hop count value is the same. RIP will not load-balance across unequal-cost paths
RIPv2
·         RIPv2 uses multicasts, version 1 use broadcasts,
·         RIPv2 supports triggered updates—when a change occurs, a RIPv2 router will immediately propagate its routing information to its connected neighbors.
·         RIPv2 is a classless protocol. RIPv2 supports variable-length subnet masking (VLSM)
·         RIPv2 supports authentication. You can restrict what routers you want to participate in RIPv2. This is

accomplished using a hashed password value.
·         RIP uses four different kinds of timers to regulate its performance:

·         Route update timer

·         Sets the interval (typically 30 seconds) between periodic routing updates in which the router sends a complete copy of its routing table out to all neighbors.

·         Route invalid timer

·         Determines the length of time that must elapse (180 seconds) before a router determines that a route has become invalid. It will come to this conclusion if it hasn’t heard any updates about a particular route for that period. When that happens, the router will send out updates to all its neighbors letting them know that the route is invalid.

·         Holddown timer

·         This sets the amount of time during which routing information is suppressed. Routes will enter into the holddown state when an update packet is received that indicated the route is unreachable. This continues either until an update packet is received with a better metric or until the holddown timer expires. The default is 180 seconds.

·         Route flush timer


·         Sets the time between a route becoming invalid and its removal from the routing table (240 seconds). Before it's removed from the table, the router notifies its neighbors of that route's impending failure. The value of the route invalid timer must be less than that of the route flush timer. This gives the router enough time to tell its neighbors about the invalid route before the local routing table is updated.

Friday, July 19, 2013

Samsung launches Galaxy Tab 3 range in India- Network-Facts


South Korean smartphone manufacturer Samsung today launched three tablets in India today. While two of the new tablets have 8-inch screens, the other one has a 7-inch screen. The company is offering My Education Service on the three tablets, giving buyers access to 2,000 e-books and 1,000 learning videos as well as content. 

The new Galaxy Tab 3 7.0 features a TFT screen with 1024x600p resolution and 169ppi pixel density and runs on Android 4.2 (Jelly Bean). This device is powered by a 1.2GHz dual-core processor, offers 1GB RAM and offers microSD card support. Connectivity options include 2G, 3G, Wi-Fi, Bluetooth 3.0 and microUSB 2.0. On the back is a 3MP camera, while a 1.3MP unit is used in the front. This tablet measures 9.9mm along the waistline, has a 4,000mAh battery and costs Rs 17,745. 

Samsung Galaxy Tab 3 8.0 has an 8-inch TFT screen with 1280x800p resolution and 189ppi pixel density. It is powered by Android 4.2 and packs a 1.5GHz dual-core CPU under the hood, backed by 1.5GB RAM. On the back it has a 5MP camera, while a 1.3MP unit is located in the front. Powered by a 4,450mAh battery, the tablet has connectivity features like Wi-Fi, Bluetooth 4.0, microUSB 2.0. It is priced at Rs 21,945 in the Indian market.

Wednesday, July 10, 2013

How To Write A Great IT Resume


Resumes and CVs are usually documents that you write when you apply for a job, and don’t update until you move on from that job and are looking for another one. The IT industry can be competitive, but, if you’re reading this site, you’re interested in improving your IT career so you can stand out from the rest! Writing a great IT resume or IT CV is the best way of doing that to get a new job.
1.

Focus On Your Strengths

This may seem an obvious one, but your IT resume should focus only on your strengths. If you’re a great database administrator, include that on your resume. If you’re exceptional at dealing with customers or end users, put that down on the resume. The idea is to show your potential future employer all the things you’re good at, and why they should hire you.

2.

List Accomplishments Instead Of Responsibilities

In your past roles, you will have had certain tasks or things you had to do as part of your job. These should be listed on your resume, but the key is in how they are worded. They should be worded as though they are an achievement, rather than a responsibility.
A responsibility is something like “Developing code fixes to large systems for the company”. This may seem good, as it’s specific and was actually what you do. How about wording it as an achievement – “Supported and resolved issues in critical, large scale systems for the company that prevented significant financial losses and implemented cost savings.” Much better? I think so. It still includes your job description, but lists it as something you achieved and accomplished. It also includes a measurable statistic – “significant financial losses”. This kind of information stands out. If you know the actual numbers, such as “saving $500k in support costs per year”, that’s even better, but words like “significant” will still do.

3.

Include Testimonials From Past Employers

If you’re able to, ask your old employers to provide you with testimonials on your work. You don’t need to mention you’re going for a new job, you can just say you’d like it for future reference. Testimonials can generally be written by anyone you’ve worked with, but obviously only choose ones you think will write a favourable one! Customers, end users, managers, co-workers are all the kinds of people who are able to give you a review – which you can then use on your resume. It’s a great way to show your future employer that other people have high opinions of you and your work.

4.

Put Your Most Important Information Below Your Contact Details

Your contact details should always go at the top of the resume – name, phone number, email address. However, what should you put next? What is the next thing that you want your reader to see? The next thing down should be the most important information about your career or skills. This is because it stands out and is the first thing the employer sees (after your name, of course).
The most important thing would depend on your work history, but it should be whatever you think will help you get a job. If you’re going for a project management role in a large company, you could start with “PMP Certified with 10 Years PM Experience In Large and Small Companies”. Obviously, you should only put that if it’s true, but it highlights your strengths that are related to the role you’re going for or what your main skills are. These can, of course, be changed depending on your skills – whether it’s software development, system testing, business analysis, system architect, or whatever area you’re involved in!

5.

Use Language Both IT Staff and Non IT Staff Can Understand

Your IT resume is something that might be read by a few people. Recruitment would probably read it to begin with. There may be someone else in HR, senior management, the technical team or the team in which the role was advertised for – any of these roles might read your IT resume. The language used in the resume, therefore, should be understandable by both IT staff and non-IT staff.
This means, don’t use IT-speak that only fellow technology users can understand. Make sure people throughout the company in different roles can read and understand it. If they have any difficulty in understanding it, they won’t realise the full meaning of what you’re trying to say. Or worse, they may dismiss the resume and you won’t get the job!

6.

Don’t Refer to Old Technologies

Information technology is a fast-changing industry. Technologies and methods are improving and being created all the time. Companies need to stay up to date with these in order to try to get the edge in the market.
Depending on how long you’ve been in the IT industry, your skill set might be quite large. You might know ten or twenty different programming languages. You might have experience in configuring or using software that has been around for decades. This may be an important skill at the moment, but if it’s a technology or product that is no longer widely used, then it shouldn’t go on your resume. It doesn’t really serve any purpose or have any relevance.
Personally, I’ve got experience in Visual Basic from my high school days. I don’t put that on my resume – partly because I haven’t used much of it since, and partly because it’s not widely used. Sure, there is plenty of VBA or VB.Net around, but that wasn’t what my skill was.
Additionally, if you’re competent in older systems or languages, you may not need to include them on your resume.

7.

Spelling And Grammar Should Be Perfect

This is quite an important point, and is relevant not only to IT resumes, but to all kinds of resumes and even other documentation. Your spelling and grammar on your resume should be absolutely perfect. Don’t make mistakes when spelling things such as:
Technology names – especially acronyms 
Company names 
Certifications or qualifications you’ve received 
People’s names (e.g. references) 
Even if you know what you mean, it’s very unprofessional to misspell something on a resume. Make sure your spell checker is turned on. Give it a proof read once you’ve finished. If you can, get someone else to read it as well. This extra pair of eyes is useful in picking up spelling and grammar mistakes, and can also provide feedback on your IT resume overall.

Conclusion

I hope these tips have helped you prepare your resume for your next IT job!

Lenovo launches business class M93z all-in-one PC -- Network-Facts


Lenovo is looking to do the corporate job with a new all-in-one (AiO) PC and two additional desktop models that pack Intel's fourth generation Haswell i7 CPU.
The China-based company's ThinkCentre M93z features a 23-inch full HD LED IPS display in an AIO design with anti-glare glass on the models equipped with 10-point multi-touch.
It arrives with security features in the form of a Trusted Platform Module (TPM) that encrypts data and key information such a passwords and digital certificates, and USB ports that can be disabled to prevent data theft and unauthorised use of storage devices.
Lenovo has plumped for Intel's vPro and Active Management Technology in the M93z, which it claims speeds up data encryption and decryption and protectsunauthorised access and remote management, which could come in handy in the event of certain breaches.
AvailableAugust, prices for the model start at £500 for the base configuration and rise should you opt for an optional 1GB AMD Radeon HD discrete graphics card and Solid State Hybrid Drive (SSHD) for improved performance.

Tiny addition

Lenovo has also introduced a smaller desktop machine in the form of its ThinkCentre M93p, which packs Intel's i7 Haswell CPU into a small, box-like form factor that measures the width of a golf ball (34.5 mm, before you get the tape measure out).
Lenovo claims that the model is "the most energy-efficient ThinkCentre desktop ever".the M93z, it's offered with a 64GB SSD drive and an optional SSHD drive. It will be availableAugust starting at £550 (excluding VAT).
Finally, the company is also launching its ThinkCentre M83 Enterprise Desktop, which also features Intel's 4th-generation Haswell CPU, a 64GB SSD drive and optional SSHD. It's another model designed to save space, but Lenovo says there's plenty of room for expansion into an optional tower form factor. It will be availableDecember starting at £500 (excluding VAT).
The PC industry is currently faced with a gloomy outlook. In May, market watcher IDC revised its forecast to predict that worldwide PC shipments will decline by 7.8% in 2013 as users consider ing PC purchases or opt for alternative tablet and mobile devices.

Wednesday, July 3, 2013

11 ways to keep your emails safe hackers- - Network-Facts

11 ways to keep your emails safe hackers

 


WASHINGTON: Emails are the most common thing vulnerable to spying.

Adam Levin, founder of Credit.com and Identity Theft 911, has given 11 steps not to do with email and doing which will make us vulnerable to hackers, ABC News reported.

Firstly, he said that a person should never check their e-mail on an unsafe network, as a computer in an internet cafe, library or any other business may be infected with malware to steal your passwords.

Secondly, people should log off their e-mails as soon as their work is over, as by staying signed up a hacker can gain immediate access.

Thirdly, Levin said that email login name and password should not be repeated.

Fourthly, another problem is that people do not their old-emails properly, which could contain addresses, account usernames and passwords, contact information foryour pals, financial data and may other sensitive information.

Fifthly, if an email comes to you that promises a loan or credit card that is worth a guaranteed amount of money at a low interest rate, beware that it is a scam, as nobody will give you credit without checking your credit report.

Sixthly, people should not click on seemingly ambiguous emails their pals, as they could be vectors of attack. Cyber criminals often pose as pals stuck penniless in Europe or Asia and in need of an immediate wire transfer.

Seventhly, if you get a mail your bank or credit card company asking to verify your account information beware that it can be cyber criminals, as an institute that handles important thingsmoney or packages, don't use email for communication, and definitely not to confirm personal information.

Eighthly, many scams involve sending money to people that you have never met for e.g there is the "Wall Street insider" with the hot investment tip or the foreign company, which needs you to cash a check or process transactions. Beware.

Ninthly, people should not fall for the trick that makes them think that their credit card has been stolen.

Tenthly, after Hurricane Sandy and the giant tornado in Oklahoma, cyber criminals sent emails requesting donations for relief efforts.

Lastly, do not click on emails that show too good to be true travel deals.

Govt releases National Cyber Security Policy 2013 - Network-Facts


Govt releases National Cyber Security Policy 2013

NEW DELHI: With an aim to protect information and build capabilities to prevent cyber attacks, the government released the National Cyber Security Policy 2013 to safeguard both physical and business assets of the country. 

"...policy is a framework document and it gives you a broad outline of what our vision is...the real task or the challenge is the operationalisation of this policy," Minister of Communications and IT Kapil Sibal said while releasing the policy here. 

Sibal said the critical infrastructure such as air defence system, power infrastructure, nuclear plants, telecommunications system have to be protected otherwise it may create economic instability. 

"...air defence system, power infrastructure, nuclear plants, telecommunications system willhave to be protected to ensure there is no disruption of the kind that will destabilise the economy...instability in cyber space means economic instability no nation can afford economic instability, therefore it is essential not just to have a policy but to operationalise it," Sibal said. 

The cyber policy was necessary in the wake of possible attacks state and non-state actors, corporates and terrorists as the internet world has no geographical barriers and was anonymous in nature. 

The Minister said there will be multiple places cyberwar could take place, it will involve individuals, sections of society, businesses, terrorists, drug dealers and those who want to generate violence. 

He added it will not be able to point out to a particular country to say the source of the attack because it will difficult in the cyberspace to figure it out. 

"In the ultimate analysis, we have to develop global standards because there is no way that we can have a policy within the context of India which is not connected with the rest of the world because information knows no territorial boundaries," Sibal added. 

He said everything today is cross border, we have to corroborate to find what is that meeting ground which allows the citizens to be empowered and at the same time ensures that nation is safe. 

"We don't know who attack our systems, so we have to ourselves secure our systems," Sibal added. 

In order to create a secure cyber ecosystem, the policy plans to set up a national nodal agency to coordinatematters related to cyber security in the country with clearly defined roles and responsibilities. 

It plans to establish a mechanism for sharing information, identifying and responding to cybersecurity incidents and for cooperation in restoration efforts.