Powered by Blogger.

Linux Kernel Part II

Some notes from my study sessions. Below notes describe the procedure to Configure, compile and install Linux Kernel ( this process is also called building Linux Kernel) download the new kernel source from the redhatmake mrproper : execute a script make file .config file, in usr/linux-2.4take .config file and save it somewhere elsemake mrproper...

Linux Kernel Part 1: Study Notes

Monolithic and modular kernal updatesource rpm and binary rpm ( for our basic needs binary rpms are great, source rpms are good if we want to tinker with the system changes) smp : symetric multiprocessor Kernal update and installationwe need to go to the redhad website, to download the kernel, once the kernel is downloadedcat /proc/cpuinfomd5sum...

Resetting root password on Linux

Suppose, if you have forgotten your linux root password. You seems to be in a little trouble, but dont worry, use below steps to recover your linux password with a few clicks: 1. During boot, highlight the installation for which you want to change the root password. Once the installation...

VoIP Bandwidth Calculator and Erlang

Different protocols consume different amount of bandwidth. In most of the cases the bandwidth consumed by VoIP codec is not that much, the extra burden is caused by different protocol headers. VoIP bandwidth calculation and planning is one of the most important part in designing a VoIP Network. To make this task easy, i cam across a very interesting...

Some Random Notes about EIGRP, OSPF, DV Protocols and Linkstate Protocols

Some Random notes, that are still very useful :)  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ EIGRP = Enhance Interior Gateway Routing Protocol Ok, what are the most common words that I hear about EIGRP? Neighbor table, Topology table, Routing table, successor (primary route), feasible successor(secondary route),...

GENERAL: The Art of reading Technical stuff

Today I want to share a very useful technique with you, which I learned during my University times. Most of the time, when we read some new technical stuff, we are not able to understand it in the first go. Suppose if you are reading some great article in Scientific American or...

General: From world first Router to Quantum Internet

It's really amazing, how technology improves with the passage of time. It seems Moors law will be in action for a long time to come. The things are improving very fast from a processing perspective as well as improvements in design. Have you ever imagined how did the first packet...

CCNA- How to configure Cisco IOS Banners

Cisco IOS devices support a number of banners that are presented to users when they use the console line or when they connect remotely using telnet or SSH. They are often used to inform users about their legal rights. It might be a good idea to present a banner to users who are trying to connect to your device, here are some items you might want to...

General: An off-Networking Post

I came across this interesting snapshot while studying some Linux slides. This snapshot contains the best advice anyone can give to you! CSE 265: System and Network Administration ©2004-2012 Brian D. Davi...

General: Understanding Ethernet Jumbo Frames

Today i am posting an awesome post link from www.routerfreak.com it related to Understanding Ethernet Jumbo Frames. Here is the link to the article: http://www.routerfreak.com/understanding-ethernet-jumbo-frames/ Some of the things discussed in this article...

CCNA- VLAN Trunking Protocol (VTP) – The Good VS the Bad Part 2

VLAN Trunking Protocol (VTP) – The Good VS the Bad Part 2: Taking after are the parameters needed for the VTP gadgets to impart: 1-VTP Domain name 2-VTP Password: VTP uphold confirmation utilizing passed which is hashed as MD5 and utilized within VTP commercials over the...

CCNA- VLAN Trunking Protocol (VTP) – The Good VS the Bad Part 1

VTP is an absolutely fascinating thought however meanwhile quite hazardous if not took care of with delicacy. I know you may be suspecting WHY? For your response and to perceive the notion wouldn't it be great if we could start then and I welcome you to the universe of VTP. VTP in true is an update methodology. It gives an intend to make VLANs...

CCNA Advance- STP (Spanning Tree Protocol) : Part 3

BackboneFast: In order to detect indirect link failure and to optimize network convergence time, Backbone Fast feature of STP is used. Backbone fast (BF, in short) is a CISCO proprietary feature. The term indirect link failure needs a little explanation. The link which is not...

CCNA Advance- STP (Spanning Tree Protocol) : Part 2

STP- Enhancements PortFast: As for now we are well equipped with STP, now we turn to STP optimization techniques. STP optimization is necessary for fast convergence times in the network, as the standard 4 step convergence of STP can cause a lot of havoc in the real time...

CCNA- STP (Spanning Tree Protocol) : Part 1

Today we are going to arm ourselves with an amazing protocol, STP! STP (Spanning tree Protocol) is an amazing protocol to create a loop free topology in a redundant bridge network. STP was created by Dr Radia Perlman of Sun Microsystems for a loop free bridge (“bridge” can be...

Syslogs Part III

Now we are going to configure our SYSLOG server and will enable the router to send logs, upto severity level 7, to our SYSLOG server: Great, now we can see the log messages coming to our SYSLOG server: Isn't it interesting, that all the changes, critical warnings...

General: IOS Routing Protocols Poster

I came across an amazing poster on one of the brilliant computer networking blog (www.packetlife.com). A little intro about Jeremy Stretch: Jeremy Stretch is a networking engineer and the maintainer of PacketLife.net. He currently lives in the Raleigh-Durham area of North Carolina....

General: The Importance of Watching the Wire - Packet Life

I came across an interesting problem today that I think serves as an excellent example of why packet analysis is such a critical skill for network engineers. A few days ago, the internal network belonging to one of my employer's customers was compromised by a malicious party. Since...