<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Kingsmich LLC. &#187; Uncategorized</title>
	<atom:link href="http://www.kingsmich.com/WhoWeSupport/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.kingsmich.com</link>
	<description>The real tech business you can trust...</description>
	<lastBuildDate>Tue, 13 Aug 2013 20:15:35 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.8.41</generator>
	<item>
		<title>CCNA NOTE</title>
		<link>http://www.kingsmich.com/2013/07/09/ccna-note/</link>
		<comments>http://www.kingsmich.com/2013/07/09/ccna-note/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 09:40:44 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.kingsmich.com/?p=132</guid>
		<description><![CDATA[CCNA NOTE   The CCNA covers the subject below which candidate must know before the exam, Let go over them briefly. &#160; OSI Layer modals Subnetting Supernetting and VLSM Cisco devices administration and configuration Switching VLAN STP VTP DTP Ether<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/07/09/ccna-note/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p><b>CCNA NOTE</b></p>
<p><b> </b></p>
<p><b>The CCNA covers the subject below which candidate must know before the exam, Let go over them briefly.</b></p>
<p>&nbsp;</p>
<ul>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/osi-layer-modals/">OSI Layer modals</a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/subnetting-supernetting-and-vlsm/">Subnetting Supernetting and VLSM </a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/cisco-devices-administration-and-configuration/">Cisco devices administration and configuration </a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/switching-vlan-stp-vtp-dtp-ether-channels/">Switching VLAN STP VTP DTP Ether Channels </a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/routing-static-dynamics-rip-ospf-igrp-eigrp/">Routing Static Dynamics RIP OSPF IGRP EIGRP</a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/network-security-access-lists-standards-and-extended/">Network Security access lists standards and extended </a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/wan-protocols-hdlc-ppp-frame-really-nat-pat/">WAN protocols HDLC PPP Frame Really NAT PAT</a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/wireless-networking-on-cisco-router/">Wireless networking on Cisco Router</a></span></li>
<li><span style="text-decoration: underline;"><a href="http://computernetworkingnotes.com/ccna-study-guide/ipv6-features-concepts-and-configurations/">IPv6 features concepts and configurations</a></span></li>
</ul>
<p>Go get your <a href="http://computernetworkingnotes.com/ccna-study-guide/ccna-certification/">Certification</a></p>
<p>&nbsp;</p>
<p><strong><span style="color: #0000ff;"><a href="http://computernetworkingnotes.com/osi-layer-modals/osi-model.html"><span style="color: #0000ff;">OSI Reference Model and Cisco Three Layer Model</span></a></span></strong></p>
<p><a href="http://www.kingsmich.com/wp-content/uploads/2013/07/osi-model.jpg"><img class="alignnone  wp-image-133" title="The OSI Reference Model" alt="osi-model" src="http://www.kingsmich.com/wp-content/uploads/2013/07/osi-model-187x300.jpg" width="287" height="388" /></a></p>
<p>Each OSI layer contain a set of functions performed by programs to enable data to travel from a source to a destination on a network.</p>
<p>In this article I will provide brief descriptions of each layer in the OSI reference model.</p>
<p>Application Layer</p>
<p>The<b> application layer</b> is the OSI layer that is closest to the user. This layer provides network services to the user&#8217;s applications. It differs from the other layers in that it does not provide services to any other OSI layer, but only to applications outside the OSI reference model. Applications layer provide a platform to access the data of remote computer.</p>
<p>The application layer protocols that you should know are as follows:</p>
<ul>
<li><b>SNMP (Simple Network Management Protocol) — </b>Communicates status and allows control of networked devices.</li>
<li><b>TFTP (Trivial File Transfer Protocol) — </b>Simple, lightweight file transfer.</li>
<li><b>DNS (Domain Naming System) —</b> Translates a website name (easy for people) to an IP address (easy for computers).</li>
<li><b>DHCP (Dynamic Host Configuration Protocol) —</b> Assigns IP, mask, and DNS server (plus a bunch of other stuff) to hosts.</li>
<li><b>Telnet— </b>Provides a remote terminal connection to manage devices to which you are not close enough to use a console cable.</li>
<li><b>HTTP (Hypertext Transfer Protocol) — </b>Browses web pages.</li>
<li><b>FTP (File Transfer Protocol) —</b> Reliably sends/retrieves all file types.</li>
<li><b>SMTP (Simple Mail Transfer Protocol) — </b>Sends email.</li>
<li><b>POP3 (Post Office Protocol v.3) — </b>Retrieves email.</li>
<li><b>NTP (Network Time Protocol) —</b> Synchronizes networked device clocks.</li>
</ul>
<p>Presentation layer</p>
<p>The <b>presentation layer</b> is responsible for formatting data so that application-layer protocols (and then the users) can recognize and work with it. Presentation layer format the file extensions—such as .doc, .jpg, .txt, .avi, and so on. you realize that each of these file types is formatted for use by a particular type of application. The presentation layer taking the application layer data and marking it with the formatting codes so that it can be viewed reliably when accessed later. If necessary, the presentation layer might be able to translate between multiple data formats by using a common format.</p>
<p>The Session Layer</p>
<p>The <b>session layer</b> establishes, manages, and terminates sessions between two communicating hosts. It provides its services to the presentation layer. The session layer also synchronizes dialogue between the presentation layers of the two hosts and manages their data exchange. For example, web servers have many users, so many communication processes are open at a given time. Therefore, keeping track of which user communicates on which path is important.</p>
<p>Transport Layer</p>
<p>The transport layer is possibly the most important layer for exam study purposes. A lot is going on here, and it is heavily tested.</p>
<p>The transport layer&#8217;s main jobs</p>
<ul>
<li>It sets up and maintains a session connection between two devices.</li>
<li>It can provide for the reliable or unreliable delivery of data across this connection.</li>
<li>It multiplexes connections, allowing multiple applications to simultaneously send and receive data. When</li>
<li>Implementing a reliable connection, sequence numbers and acknowledgments (ACKs) are used.</li>
<li>Flow control (through the use of windowing or acknowledgements)</li>
<li>Reliable connections (through the use of sequence numbers and Acknowledgement )</li>
</ul>
<p>Transport layer use two protocols for sending data TCP and UDP.</p>
<p><b>TCP</b><br />
TCP is connection oriented protocols. Connection-oriented transmission is said to be reliable. Thinks TCP as registry AD facility available in Indian post office. For this level of service, you have to buy extra ticket and put a bunch of extra labels on it to track where it is going and where it has been. But, you get a receipt when it is delivered, you are guaranteed delivery, and you can keep track of whether your shipment got to its destination. All of this costs you more—but it is reliable!</p>
<p><b>UDP</b><br />
UDP is connection less protocols. Connection-less transmission is said to be unreliable. Now, don&#8217;t get too wrapped up in the term &#8220;unreliable&#8221; this doesn&#8217;t mean that the data isn&#8217;t going to get there; it only means that it isn&#8217;t guaranteed to get there. Think of your options when you are sending a postcard, put it in the mailbox, and chances are good that it will get where it&#8217;s supposed to go—but there is no guarantee, and stuff does go missing once in a while. On the other hand, it&#8217;s cheap.</p>
<p><b>The transport layer can use two basic flow control methods:</b></p>
<ul>
<li>Ready/not ready signals</li>
<li>Windowing</li>
</ul>
<p>There are two problems with the use of ready/not ready signals to implement flow control.<br />
First, the destination may respond to the source with a not ready signal when its buffer fills up. While this message is on its way to the source, the source is still sending information to the destination, which the destination will probably have to drop because its buffer space is full.<br />
The second problem with the use of these signals is that once the destination is ready to receive more information, it must first send a ready signal to the source, which must receive it before more information can be sent. In many implementations, the window size is dynamically negotiated up front and can be renegotiated during the lifetime of the connection.</p>
<p>In windowing a window size is defined between two host engaged in data transmission. And sender host will wait for an acknowledgement signal after sending the segments equal to window size. If any packet lost in way receiver will respond with acknowledgement for lost packet. And sender will send lost packet again.</p>
<p>Reliability</p>
<p>When reliability is necessary, it should cover these four items:</p>
<ul>
<li>recognizing lost packets and having them re-sent</li>
<li>recognizing packets that arrive out of order and reordering them</li>
<li>detecting duplicate packets and dropping the extra ones</li>
<li>Avoiding congestion</li>
</ul>
<p>Connection Multiplexing/Application Mapping</p>
<p>Transport layer assigns a unique set of numbers for each connection. These numbers are called port or socket numbers. TCP, and UDP, provide a multiplexing function for a device: This allows multiple applications to simultaneously send and receive data.<br />
Imagine a server that performs a number of functions—for example email, web pages, FTP, and DNS. The server has a single IP address, but can perform all these different functions for all the hosts that want to connect to it. The transport layer (layer 4) uses port numbers to distinguish between different types of traffic that might be headed for the same IP address.</p>
<p><b>Port numbers are divided into ranges by the IANA. Following are the current port ranges:</b></p>
<table width="60%" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="20%"><b>Port number</b></td>
<td width="80%"><b>descriptions</b></td>
</tr>
<tr>
<td>0–1023</td>
<td>Well-Known—For   common TCP/IP functions and applications</td>
</tr>
<tr>
<td>1024–49151</td>
<td>Registered—For   applications built by companies</td>
</tr>
<tr>
<td>49152–65535</td>
<td>Dynamic/Private—For   dynamic connections or unregistered applications</td>
</tr>
</tbody>
</table>
<p>Common TCP and UDP Port Numbers</p>
<table width="70%" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td colspan="2"><b>TCP </b></td>
<td colspan="2"><b>UDP</b></td>
</tr>
<tr>
<td width="25%">FTP</td>
<td width="25%">20, 21</td>
<td width="25%">DNS</td>
<td width="25%">53</td>
</tr>
<tr>
<td>Telnet</td>
<td>23</td>
<td>DHCP</td>
<td>67,68</td>
</tr>
<tr>
<td>SMTP</td>
<td>25</td>
<td>TFTP</td>
<td>69</td>
</tr>
<tr>
<td>DNS</td>
<td>53</td>
<td>NTP</td>
<td>123</td>
</tr>
<tr>
<td>HTTP</td>
<td>80</td>
<td>SNMP</td>
<td>161</td>
</tr>
<tr>
<td>POP</td>
<td>110</td>
<td></td>
<td></td>
</tr>
<tr>
<td>NNTP</td>
<td>119</td>
<td></td>
<td></td>
</tr>
<tr>
<td>HTTPS</td>
<td>443</td>
<td></td>
<td></td>
</tr>
</tbody>
</table>
<p>Network Layer</p>
<p>The network layer provides a logical topology and layer-3 addresses. Routers function at the network layer. This layer is responsible for three main functions:</p>
<ul>
<li>Defines logical addresses used at layer-3</li>
<li>Finds paths, based on the network numbers of logical addresses, to reach destination devices</li>
<li>Connects different data link types together, such as Ethernet, FDDI, Serial, and Token Ring</li>
</ul>
<p><b>IP packet</b><br />
Where the transport layer uses segments to transfer information between machines, the Internet layer uses datagram&#8217;s. Datagram is just another word for packet.</p>
<p>The IP protocol is mainly responsible for these functions:</p>
<ul>
<li>Connectionless data delivery: best effort delivery with no data recovery capabilities</li>
<li>Hierarchical logical addressing to provide for highly scalable internetworks</li>
</ul>
<p><b>IP addresses are broken into two components:</b></p>
<ul>
<li>Network component Defines on what segment, in the network, a device is located</li>
<li>Host component defines the specific device on a particular network segment</li>
</ul>
<p>Two types of packets are used at the Network layer: data and route updates.</p>
<p><b>Data packets</b><br />
Used to transport user data through the internetwork. Protocols used to support data traffic are called routed protocols; examples of routed protocols are IP and IPv6.</p>
<p><b>Route update packets</b><br />
Used to update neighboring routers about the networks connected to all routers within the internetwork. Protocols that send route update packets are called routing protocols; examples of some common ones are RIP, RIPv2, EIGRP, and OSPF. Route update packets are used to help build and maintain routing tables on each router.</p>
<p>IP Classes</p>
<ul>
<li>Class A addresses range from 1-126: 00000001-01111111.</li>
<li>Class B addresses range from 128-191: 10000000-10111111.</li>
<li>Class C addresses range from 192-223: 11000000-11011111.</li>
<li>Class D addresses range from 224-239: 11100000-11101111.</li>
<li>Class E addresses range from 240-254:</li>
</ul>
<ol>
<li>0 is reserved and represents all IP addresses;</li>
<li>127 is a reserved address and is used for testing, like a loop back on an interface:</li>
<li>255 is a reserved address and is used for broadcasting purposes.</li>
</ol>
<p>Public addresses are Class A, B, and C addresses that can be used to access devices in other public networks, such as the Internet. Public IP address assign authority The Internet Assigned Numbers Authority (IANA) is ultimately responsible for handing out and managing public addresses. Normally you get public addresses directly from your ISP, which, in turn, requests them from one of five upstream address registries:</p>
<ul>
<li>American Registry for Internet Numbers (ARIN)</li>
<li>Reseaux IP Europeans Network Coordination Center (RIPE NCC)</li>
<li>Asia Pacific Registry for Internet Numbers (APNIC)</li>
<li>Latin American and Caribbean Internet Address Registry (LACNIC)</li>
<li>African Network Information Centre (AfriNIC)</li>
</ul>
<p>Private IP and ISP</p>
<p>Private ip address can be used to configure private network. You can use private ip to build your network without paying a single rupees. But one biggest problem with private ip is that with private you can not access the internet. This is the point where ISP comes from. ISP purchase a bulk of public ip address and provide them on rent. Whatever you pay to ISP for accessing internet is actually the charge of using public ip address.</p>
<p><b><i>Private ip address:- Not route able in public network</i></b></p>
<ul>
<li>Class A: 10.0.0.0-10.255.255.255 (1 Class A network)</li>
<li>Class B: 172.16.0.0-172.31.255.255 (16 Class B networks)</li>
<li>Class C: 192.168.0.0-192.168.255.255 (256 Class C networks)</li>
</ul>
<table width="80%" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="25%"><b>Protocol</b></td>
<td width="75%"><b>Description</b></td>
</tr>
<tr>
<td><b>IP</b></td>
<td>IP of TCP/IP,   featuring routable 32-bit addressing.</td>
</tr>
<tr>
<td><b>IPX</b></td>
<td>The equivalent of IP   in Novell Netware.</td>
</tr>
<tr>
<td><b>ICMP</b></td>
<td>Internet Connection   Management Protocol. Incorporates Ping and Traceroute, which are layer 3   link-testing utilities.</td>
</tr>
<tr>
<td><b>OSPF, IGRP, EIGRP, RIP, ISIS</b></td>
<td>Dynamic routing   protocols that learn about remote networks and the best paths to them from   other routers running the same protocol.</td>
</tr>
<tr>
<td><b>ARP, RARP</b></td>
<td>Address Resolution   Protocol (and Reverse ARP). ARP learns what MAC address is associated with a   given IP address. Reverse ARP learns an IP address given a MAC address.</td>
</tr>
</tbody>
</table>
<p>Data link layer</p>
<p>Main functions of data link layer is</p>
<ul>
<li>Defining the Media Access Control (MAC) or hardware addresses</li>
<li>Defining the physical or hardware topology for connections</li>
<li>Defining how the network layer protocol is encapsulated in the data link layer frame</li>
<li>Providing both connectionless and connection-oriented services</li>
<li>Defines hardware (MAC) addresses as well as the communication process that occurs within a media.</li>
<li>The first six hexadecimal digits of a MAC address form the OUI.</li>
<li>MAC addresses only need to be unique in a broadcast domain,</li>
<li>You can have the same MAC address in different broadcast domains (virtual LANs).</li>
</ul>
<p><b><i>There are two specifications of Ethernet frame Ethernet II and 802</i></b></p>
<p>802.2 use a SAP or SNAP field to differentiate between encapsulatedlayer-3 payloads.</p>
<p>With a SNAP frame, the SAP fields are set to 0xAA and the type field is used to indicate the layer-3 protocol. One of the issues of the original SAP field in the 802.2 SAP frame is that even though it is eight bits (one byte) in length, only the first six bits are used for identifying upper-layer protocols, which allows up to 64 protocols.</p>
<p>802.2 SNAP frame support of up to 65,536 protocols</p>
<p>Ethernet II&#8217;s Version of Ethernet</p>
<ul>
<li>Ethernet II does not have any sub layers, while IEEE 802.2/3 has two: LLC and MAC.</li>
<li>Ethernet II has a type field instead of a length field (used in 802.3). IEEE 802.2 defines the type for IEEE Ethernet</li>
</ul>
<p>Physical Layer</p>
<p>The Physical layer communicates directly with the various types of actual communication media. Different kinds of media represent these bit values in different ways. Some use audio tones, while others utilize state transitions—changes in voltage from high to low and low to high. Specific protocols are needed for each type of media to explain the proper bit patterns to be used, how data is encoded into media signals, and the various qualities of the physical media’s attachment interface.</p>
<p>Fiber Cabling</p>
<p>Two types of fiber are used for connections: multimode and single-mode.</p>
<p><b>Multimode fiber</b><br />
has a fiber thickness of either 850 or 1300 nanometers (nm), and the light signal is typically provided by an LED. When transmitting a signal, the light source is bounced off of the inner cladding (shielding) surrounding the fiber. Multimode fiber can achieve speeds in the hundreds of Mbps range, and many signals can be generated per fiber.</p>
<p><b>Single-mode fiber</b><br />
has a fiber thickness of 1300 or 1550 nm and uses a laser as the light source. Because lasers provide a higher output than LEDs, single-mode fiber can span over 10 kilometers and have speeds up to 100Gbps. With single-mode fiber, only one signal is used per fiber.</p>
<ul>
<li>Loss factor is used to describe any signal loss in the fiber before the light source gets to the end of the fiber.</li>
<li>Connector loss is a loss that occurs when a connector joins two pieces of fibers: a slight signal loss is expected.</li>
<li>Attenuation describe the signal loose due to distance</li>
<li>Microbending is when a wrinkle in the fiber, typically where the cable is slightly bent, causes a distortion in the light source.</li>
<li>Macrobending is when there is leakage of the light source from the fiber, typically from a bend in the fiber cable. to overcome this problem over long distances, optical amplifiers can be used.</li>
</ul>
<p>Two main standards are used to describe the transmission of signals across a fiber:</p>
<p><b>SONET</b> is defined by the Exchange Carriers Standards Association (ECSA) and American National Standards Institute (ANSI) and is typically used in North America.</p>
<p><b>SDH</b> is an international standard used throughout most of the world (with the exception of North America). Both of these standards define the physical layer framing used to transmit light sources, which also includes overhead for the transmission.</p>
<p><b><span style="text-decoration: underline;">Cisco&#8217;s three-layer hierarchical model</span></b></p>
<p>&nbsp;</p>
<ol>
<li>Core Layer</li>
</ol>
<p>The core provides a high-speed layer-2 switching infrastructure and typically does not manipulate packet contents.</p>
<ol>
<li>Distribution Layer</li>
</ol>
<p>The distribution layer provides a boundary between the access and core layers. It contains routers and switches. Routers are used to provide the logical boundary&#8211;broadcasts are contained within the access layer and Filtering policies can be implemented to restrict traffic flows.</p>
<ol>
<li>Access Layer</li>
<li>The access layer provides the user&#8217;s initial access to the network, which is typically via switches or hubs.</li>
</ol>
<p><b><span style="text-decoration: underline;">TCP/IP protocol</span></b></p>
<p>The TCP/IP protocol stack has four layers. Note that although some of the layers in the TCP/IP protocol stack have the same names as layers in the OSI reference model, the layers have different functions in each model, as is described in the following list:</p>
<p>Application layer:</p>
<p>The application layer handles high-level protocols, including issues of representation, encoding, and dialog control. The TCP/IP model combines all application-related issues into one layer and ensures that this data is properly packaged for the next layer.</p>
<p>Transport layer:</p>
<p>The transport layer deals with QoS issues of reliability, flow control, and error correction. One of its protocols, TCP, provides for reliable network communications.</p>
<p>Internet layer:</p>
<p>The purpose of the Internet layer is to send source datagrams from any network on the internetwork and have them arrive at the destination, regardless of the path they took to get there.</p>
<p>Network access layer:</p>
<p>The name of this layer is broad and somewhat confusing. It is also called the host-to-network layer. It includes the LAN and WAN protocols and all the details in the OSI physical and data link layers.</p>
<p><b>•<span style="color: #0000ff;">Subnetting Supernetting and VLSM</span> </b></p>
<p>This section would introduce subnetting. You will be able to subnet a network in your head after going through this section. In addition, you will learn about Variable Length Subnet Masks (VLSMs) and how to design a network using VLSMs. This would finish with summarization techniques and configurations.</p>
<p><span style="color: #0000ff;">•<b>Cisco devices administration and configuration</b></span></p>
<p>This section introduces you to Cisco equipment. In this section you will learn how to connect to it and make initial configurations, as well as how to connect it to other devices to build a network. You will review the different types of network connections available, with particular emphasis on those that are tested in the CCNA exams. You will also look at where a Cisco device stores the various files it needs to operate, the files needed for the boot process, and the backup and restoration of system files</p>
<p>For our purposes, we use a Catalyst 2960 or 3560 switch and a 1600, 1700, or 2600 series router as example devices. Most of the commands you learn in this section also apply to more advanced models.</p>
<p>Cisco devices are very costly. For exam preparation you could use simulators. Several simulators are available choose one that best suites you. We would packet tracer for configuration.</p>
<p><b>•<span style="color: #0000ff;">Switching VLAN STP VTP DTP Ether Channels</span> </b></p>
<p>In this section we would cover following CCNA objectives</p>
<p>Use the CLI to discover neighbors on a network</p>
<p>Manage switch startup and configuration</p>
<p>Manage Cisco IOS images, configuration files, and devices on the network</p>
<p>Describe how and when to implement and verify VLANs and trunking, and then implement them on the network</p>
<p>Describe situations in which a spanning tree is used, and implement it on the network</p>
<p>Describe the application and configuration of inter-VLAN routing for a medium-sized routed network</p>
<p>Describe situations in which security is required at Layer 2, and implement it on the network</p>
<p>Identify an approach for troubleshooting and isolating common switched network problems, and offer solutions</p>
<p><b> </b></p>
<p>•<span style="color: #0000ff;"><b>WAN protocols HDLC PPP Frame Really NAT PAT</b></span></p>
<p>This section introduces the components of a VPN solution for WAN connectivity, explains how to configure a PPP connection, and describes Frame Relay operation, configuration, and troubleshooting.</p>
<p>&nbsp;</p>
<p>In this section we would cover following CCNA objectives</p>
<p>Describe the uses of VPNs for site-to-site and remote-user access</p>
<p>Connect to a service provider over a network and describe the operation and configuration of PPP</p>
<p>Connect to a service provider over a network and describe the operation and the basic configuration of Frame Relay</p>
<p>Identify an approach for troubleshooting common Frame Relay problems and offer solutions</p>
<p>&nbsp;</p>
<p><b>•<span style="color: #0000ff;">IPv6 features concepts and configurations</span></b></p>
<p>The most important drawbacks to IP version 4 (IPv4) is the limited number of unique network addresses; the Internet is running out of address space.</p>
<p>Two solutions to this dilemma are Network Address Translation (NAT) and IP version 6 (IPv6).</p>
<p>NAT provides a short-term solution to this problem by translating private IPv4 addresses into globally unique, routable IPv4 addresses.</p>
<p>IPv6 is the long-term solution. By increasing the size of an IP address to 128 bits, IPv6 increases the total number of addresses that are available. This section discusses both solutions.</p>
<p>No matter for which certification are you preparing IPv6 has become the essential part of all major certifications. In order to get IT certification you must be familiar with IPv6. With a complete series of article on ipv6 tutorials we have tried our level best to give you whatever universal certifications require from IT professionals.</p>
<p>Limitations of IPv4</p>
<p>Builtin Features of IPv6</p>
<p>Differences between IPv4 and IPv6</p>
<p>IPv6 Terms and Concepts</p>
<p>IPv6 address format</p>
<p>Special IPv6 Addresses</p>
<p>How to configure IPv6 Address</p>
<p>IPv6 Address Auto configuration Process</p>
<p>How to assign IPv6 address in Server 2008</p>
<p>IPv6 Enabled command line tools</p>
<p>IPv6 ICMP</p>
<p>IPv6 Neighbor Discovery Protocol</p>
<p>IPv6 Transition Method and Strategies</p>
<p>How to configure Cisco Router with IPv6</p>
<p>How to configure routing with IPv6 step by step guides</p>
<p><span style="color: #0000ff;"><b>Routing Static Dynamics RIP OSPF IGRP EIGRP</b></span></p>
<p>In this section we would cover following CCNA objectives</p>
<p>Describe the purpose and types of dynamic routing protocols</p>
<p>Describe the operation and implementation of distance vector routing protocols</p>
<p>Describe the operation and implementation of link-state routing protocols</p>
<p>Basic of routing distance vector protocol problems solutions</p>
<p>How to configure router step by step guide</p>
<p>How to configure Cisco router in CCNA step by step guide</p>
<p>Static Route configuration on Router</p>
<p>How to configure Static Route on router</p>
<p>RIP Routing information protocol</p>
<p>How to configure RIP routing information protocol</p>
<p>Enhanced Interior Gateway Routing Protocol Configurations</p>
<p>How to configure enhanced interior gateway routing protocol</p>
<p>OSPF Open Shortest Path First Routing protocol</p>
<p>How to configure open shortest path first routing protocol</p>
<p>How to configure EIGRP with RIP on same network</p>
<p>&nbsp;</p>
<p><b>•<span style="color: #0000ff;">Wireless networking on Cisco Router</span></b></p>
<p>&nbsp;</p>
<p>In this section we will introduces Wireless LAN (WLAN) technology. We will discuss the standards associated with WLANs, how WLANs are deployed and the basics of how they operate, security threats specific to WLANs and measures to mitigate them, and the essential steps to connect and configure an access point (AP) and a client.</p>
<p>Basic of Wireless Networking</p>
<p>Wireless networking Access Modes and security Factors</p>
<p>Wireless Networking Security and MAC Address Filtering</p>
<p>Types of Wireless Networks</p>
<p>How to Configure Wireless Network Step by Step guides</p>
<p>&nbsp;</p>
<p><b><span style="color: #0000ff;">. Network Security access lists standards and extended</span> </b></p>
<p>For this reason, Cisco expects you to have a general understanding of network security.</p>
<p>In section we would cover following topics</p>
<p>Describing the increase in security threats and the need for a security policy</p>
<p>Explaining general methods to mitigate threats</p>
<p>Describing the functions of common security appliances/applications</p>
<p>Describing the recommended practices of securing network device</p>
<p>Network Definitions Characteristics Components locations</p>
<p>Network Security Types of attacks</p>
<p>Network Security Mitigating Common Threats</p>
<p>Access Control List Standard and Extended</p>
<p>Network security Reconnaissance attack</p>
<p>How to configure standard access list on router</p>
<p>How to configure extended access list on router</p>
<p>&nbsp;</p>
<p><span style="color: #00ff00;">Go get your Certification</span></p>
<p>The CCNA program was created to provide a solid introduction to the Cisco Internetwork Operating System (IOS) and Cisco hardware. Cisco certification programs can help networking professionals succeed as they pursue their careers.</p>
<table width="96%" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="30%">Company</td>
<td>Cisco System</td>
</tr>
<tr>
<td>Exam Number</td>
<td>640-802</td>
</tr>
<tr>
<td>Associated   Certifications</td>
<td>CCNA</td>
</tr>
<tr>
<td>Duration</td>
<td>90 minutes (45-55   questions)</td>
</tr>
<tr>
<td>Available Languages</td>
<td>English, Japanese,   Chinese, Spanish, Russian, Korean, French, Portuguese</td>
</tr>
<tr>
<td>Authorize Exam   Organizer</td>
<td>Pearson VUE</td>
</tr>
<tr>
<td>Prerequisites</td>
<td>None ( Basic   Networking Knowledge recommended)</td>
</tr>
<tr>
<td>Substitute Exam</td>
<td>640-822 ICND1-   Interconnecting Cisco Networking Devices Part 1<br />
640-816 ICND2-Interconnecting Cisco Networking Devices Part 2</td>
</tr>
<tr>
<td>Validity period</td>
<td>Three years</td>
</tr>
<tr>
<td>Recertification</td>
<td>To recertify, pass   the ICND2 exam, or pass the current CCNA exam, or pass a CCNA Concentration   exam (wireless, security, voice), or pass the current CCDA exam, or pass any   642 &#8211; XXX professional level or Cisco Specialist exam (excluding Sales   Specialist exams), or pass a current CCIE or CCDE written exam.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/07/09/ccna-note/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Configuring  EIGRP Part 2, Practical.</title>
		<link>http://www.kingsmich.com/2013/07/09/what-do-you-need-to-know-about-eigrp-part-2-practical/</link>
		<comments>http://www.kingsmich.com/2013/07/09/what-do-you-need-to-know-about-eigrp-part-2-practical/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 07:23:50 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.kingsmich.com/?p=125</guid>
		<description><![CDATA[I have subnetted the 192.168.1.0 network using VLSM to cater or networks of the following sizes: 192.168.1.0 &#8211; 60 Hosts 192.168.1.64 &#8211; 40 Hosts 192.168.1.128 &#8211; 30 Hosts 192.168.1.160 &#8211; 25 Hosts First I configure EIGRP on R1 on just<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/07/09/what-do-you-need-to-know-about-eigrp-part-2-practical/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.kingsmich.com/wp-content/uploads/2013/07/VLSM-Lab-GNS3-Layout.png"><img alt="VLSM Lab - GNS3 Layout" src="http://www.kingsmich.com/wp-content/uploads/2013/07/VLSM-Lab-GNS3-Layout-300x214.png" width="462" height="192" /></a></p>
<p>I have subnetted the 192.168.1.0 network using VLSM to cater or networks of the following sizes:</p>
<p>192.168.1.0 &#8211; 60 Hosts<br />
192.168.1.64 &#8211; 40 Hosts<br />
192.168.1.128 &#8211; 30 Hosts<br />
192.168.1.160 &#8211; 25 Hosts</p>
<p>First I configure EIGRP on R1 on just one interface (linked to R2).</p>
<p><b>R1</b></p>
<p>R1#<b>conf t</b><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R1(config)#<b>router eigrp 10 </b><br />
R1(config-router)#<b>network 192.168.1.193 0.0.0.0</b><br />
R1(config-router)#<b>no auto-summary </b><br />
R1(config-router)#<b>end</b></p>
<p>I have used 10 as the AS for EIGRP, this must be the same for all the routers. I have turned off auto-summary so I can have better control of summarisation. I use some show commands to check its running on just the specified interface.</p>
<p>R1#<b>sh ip eigrp interfaces </b><br />
IP-EIGRP interfaces for process 10</p>
<p>Xmit Queue Mean Pacing Time Multicast Pending<br />
Interface Peers Un/Reliable SRTT Un/Reliable Flow Timer Routes<br />
Et0/0 0 0/0 0 0/1 0 0</p>
<p>I can also see that there are currently no neighbors.</p>
<p>R1#<b>sh ip eigrp neighbors</b><br />
IP-EIGRP neighbors for process 10</p>
<p>I now enable EIGRP on R2 and I see the adjacency form.</p>
<p><b>R2</b></p>
<p>R2#<b>conf t</b><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R2(config)#<b>router eigrp 10 </b><br />
R2(config-router)#<b>network 192.168.1.194 0.0.0.0</b><br />
R2(config-router)#<b>network 192.168.1.197 0.0.0.0</b><br />
R2(config-router)#<br />
*Mar 1 00:42:40.399: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 10: Neighbor 192.168.1.193 (Ethernet0/3) is up: new adjacency</p>
<p>Back on R1 i check the neighbor table.</p>
<p><b>R1</b></p>
<p>R1#<b>sh ip eigrp neighbors</b><br />
IP-EIGRP neighbors for process 10<br />
H Address Interface Hold Uptime SRTT RTO Q Seq<br />
(sec) (ms) Cnt Num<br />
0 192.168.1.194 Et0/0 12 00:00:39 13 200 0 3</p>
<p>Checking the route table on R1 i can also see the EIGRP route.</p>
<p>R1#<b>sh ip route</b><br />
Codes: C &#8211; connected, S &#8211; static, R &#8211; RIP, M &#8211; mobile, B &#8211; BGP<br />
D &#8211; EIGRP, EX &#8211; EIGRP external, O &#8211; OSPF, IA &#8211; OSPF inter area<br />
N1 &#8211; OSPF NSSA external type 1, N2 &#8211; OSPF NSSA external type 2<br />
E1 &#8211; OSPF external type 1, E2 &#8211; OSPF external type 2<br />
i &#8211; IS-IS, su &#8211; IS-IS summary, L1 &#8211; IS-IS level-1, L2 &#8211; IS-IS level-2<br />
ia &#8211; IS-IS inter area, * &#8211; candidate default, U &#8211; per-user static route<br />
o &#8211; ODR, P &#8211; periodic downloaded static route</p>
<p>Gateway of last resort is not set</p>
<p>192.168.1.0/30 is subnetted, 3 subnets<br />
C 192.168.1.204 is directly connected, Ethernet0/1<br />
C 192.168.1.192 is directly connected, Ethernet0/0<br />
D 192.168.1.196 [90/307200] via 192.168.1.194, 00:04:36, Ethernet0/0</p>
<p>On R4 I enable EIGRP.</p>
<p><b>R4</b></p>
<p>R4#<b>conf t</b><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R4(config)#<b>router eigrp 10 </b><br />
R4(config-router)#<b>network 192.168.1.198 0.0.0.0</b><br />
R4(config-router)#<b>network 192.168.1.202 0.0.0.0</b></p>
<p>And on R3 I enable EIGRP.</p>
<p>R3#<b>conf t</b><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R3(config)#<b>router eigrp 10 </b><br />
R3(config-router)#<b>network 192.168.1.201 0.0.0.0</b><br />
R3(config-router)#<b>network 192.168.1.206 0.0.0.0</b><br />
R3(config-router)#<b>network 192.168.1.161 0.0.0.0</b></p>
<p>From R3 I check the routing table and I can see routes to the all the other networks I have configured so far.</p>
<p>R3#<b>sh ip route</b><br />
Codes: C &#8211; connected, S &#8211; static, R &#8211; RIP, M &#8211; mobile, B &#8211; BGP<br />
D &#8211; EIGRP, EX &#8211; EIGRP external, O &#8211; OSPF, IA &#8211; OSPF inter area<br />
N1 &#8211; OSPF NSSA external type 1, N2 &#8211; OSPF NSSA external type 2<br />
E1 &#8211; OSPF external type 1, E2 &#8211; OSPF external type 2<br />
i &#8211; IS-IS, su &#8211; IS-IS summary, L1 &#8211; IS-IS level-1, L2 &#8211; IS-IS level-2<br />
ia &#8211; IS-IS inter area, * &#8211; candidate default, U &#8211; per-user static route<br />
o &#8211; ODR, P &#8211; periodic downloaded static route</p>
<p>Gateway of last resort is not set</p>
<p>192.168.1.0/24 is variably subnetted, 5 subnets, 2 masks<br />
C 192.168.1.200/30 is directly connected, Ethernet0/1<br />
C 192.168.1.204/30 is directly connected, Ethernet0/0<br />
D 192.168.1.192/30 [90/332800] via 192.168.1.202, 00:00:09, Ethernet0/1<br />
D 192.168.1.196/30 [90/307200] via 192.168.1.202, 00:00:09, Ethernet0/1<br />
C 192.168.1.160/27 is directly connected, Ethernet0/2</p>
<p>What is missing from my routing table is routes for all the networks hanging off R2. This is because I used the wildcard mask of 0.0.0.0 to specify that EIGRP only ran on certain interfaces. To enable EIGRP for all networks on R2 I will add a new network with no wildcard mask. This is similar to commands used when setting up RIP.</p>
<p><b>R2</b></p>
<p>R2#<b>conf t</b><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R2(config)#<b>router eigrp 10 </b><br />
R2(config-router)#<b>network 192.168.1.0</b></p>
<p>Now when I check the routing table on R3 i can see all the new networks attached to R2.</p>
<p><b>R3</b></p>
<p>R3#<b>sh ip route</b><br />
Codes: C &#8211; connected, S &#8211; static, R &#8211; RIP, M &#8211; mobile, B &#8211; BGP<br />
D &#8211; EIGRP, EX &#8211; EIGRP external, O &#8211; OSPF, IA &#8211; OSPF inter area<br />
N1 &#8211; OSPF NSSA external type 1, N2 &#8211; OSPF NSSA external type 2<br />
E1 &#8211; OSPF external type 1, E2 &#8211; OSPF external type 2<br />
i &#8211; IS-IS, su &#8211; IS-IS summary, L1 &#8211; IS-IS level-1, L2 &#8211; IS-IS level-2<br />
ia &#8211; IS-IS inter area, * &#8211; candidate default, U &#8211; per-user static route<br />
o &#8211; ODR, P &#8211; periodic downloaded static route</p>
<p>Gateway of last resort is not set</p>
<p>192.168.1.0/24 is variably subnetted, 8 subnets, 3 masks<br />
D 192.168.1.64/26 [90/332800] via 192.168.1.202, 00:02:14, Ethernet0/1<br />
D 192.168.1.0/26 [90/332800] via 192.168.1.202, 00:02:14, Ethernet0/1<br />
C 192.168.1.200/30 is directly connected, Ethernet0/1<br />
C 192.168.1.204/30 is directly connected, Ethernet0/0<br />
D 192.168.1.192/30 [90/332800] via 192.168.1.202, 00:04:25, Ethernet0/1<br />
D 192.168.1.196/30 [90/307200] via 192.168.1.202, 00:04:25, Ethernet0/1<br />
C 192.168.1.160/27 is directly connected, Ethernet0/2<br />
D 192.168.1.128/27 [90/332800] via 192.168.1.202, 00:02:14, Ethernet0/1</p>
<p>Now I can see all the networks.</p>
<p>I want to test my reliance between R3 and R2. To do this I will test connectivity and then shut down an interface on R4. Hopefully routing will continue.</p>
<p><b>R3</b></p>
<p>R3#<b>ping r2</b></p>
<p>Type escape sequence to abort.<br />
Sending 5, 100-byte ICMP Echos to 192.168.1.197, timeout is 2 seconds:<br />
!!!!!<br />
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/9/16 ms</p>
<p>R3 can ping R2 successfully. Now I shutdown R4&#8242;s interface.</p>
<p><b>R4</b></p>
<p>R4(config)#<b>int ethernet 0/0</b><br />
R4(config-if)#<b>shut</b></p>
<p><b>R3</b></p>
<p>R3#<b>ping r2</b><br />
Type escape sequence to abort.<br />
Sending 5, 100-byte ICMP Echos to 192.168.1.197, timeout is 2 seconds:<br />
..<br />
*Mar 1 01:16:28.347: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 10: Neighbor 192.168.1.202 (Ethernet0/1) is down: holding time expired&#8230;<br />
Success rate is 0 percent (0/5)</p>
<p>Pings fail! I check R1 and find that it is only routing for network 192.168.1.192 (on interface 192.168.1.193).</p>
<p><b>R1</b></p>
<p>R1#<b>sh ip protocols </b><br />
Routing Protocol is &#8220;eigrp 10&#8243;<br />
Outgoing update filter list for all interfaces is not set<br />
Incoming update filter list for all interfaces is not set<br />
Default networks flagged in outgoing updates<br />
Default networks accepted from incoming updates<br />
EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0<br />
EIGRP maximum hopcount 100<br />
EIGRP maximum metric variance 1<br />
Redistributing: eigrp 10<br />
EIGRP NSF-aware route hold timer is 240s<br />
Automatic network summarization is not in effect<br />
Maximum path: 4<br />
Routing for Networks:<br />
192.168.1.193/32<br />
Routing Information Sources:<br />
Gateway Distance Last Update<br />
192.168.1.194 90 00:01:37<br />
Distance: internal 90 external 170</p>
<p>I add the other interface into EIGRP for AS 10.</p>
<p>R1#<b>conf t</b><br />
Enter configuration commands, one per line. End with CNTL/Z.<br />
R1(config)#<b>router eigrp 10</b><br />
R1(config-router)#<b>network 192.168.1.205 0.0.0.0</b></p>
<p>Back on R3 I attempt to contact R2 again.</p>
<p>R3</p>
<p>R3#<b>ping r2</b><br />
Type escape sequence to abort.<br />
Sending 5, 100-byte ICMP Echos to 192.168.1.197, timeout is 2 seconds:<br />
!!!!!<br />
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/9/12 ms</p>
<p>And looking at my routing table I can see that the next hop to get to R2 is R1 whereas before it was R4</p>
<p>R3#<b>sh ip route</b><br />
Codes: C &#8211; connected, S &#8211; static, R &#8211; RIP, M &#8211; mobile, B &#8211; BGP<br />
D &#8211; EIGRP, EX &#8211; EIGRP external, O &#8211; OSPF, IA &#8211; OSPF inter area<br />
N1 &#8211; OSPF NSSA external type 1, N2 &#8211; OSPF NSSA external type 2<br />
E1 &#8211; OSPF external type 1, E2 &#8211; OSPF external type 2<br />
i &#8211; IS-IS, su &#8211; IS-IS summary, L1 &#8211; IS-IS level-1, L2 &#8211; IS-IS level-2<br />
ia &#8211; IS-IS inter area, * &#8211; candidate default, U &#8211; per-user static route<br />
o &#8211; ODR, P &#8211; periodic downloaded static route</p>
<p>Gateway of last resort is not set</p>
<p>192.168.1.0/24 is variably subnetted, 8 subnets, 3 masks<br />
D 192.168.1.64/26 [90/332800] via 192.168.1.205, 00:01:22, Ethernet0/0<br />
D 192.168.1.0/26 [90/332800] via 192.168.1.205, 00:01:22, Ethernet0/0<br />
C 192.168.1.200/30 is directly connected, Ethernet0/1<br />
C 192.168.1.204/30 is directly connected, Ethernet0/0<br />
D 192.168.1.192/30 [90/307200] via 192.168.1.205, 00:01:22, Ethernet0/0<br />
D 192.168.1.196/30 [90/332800] via 192.168.1.205, 00:01:22, Ethernet0/0<br />
C 192.168.1.160/27 is directly connected, Ethernet0/2<br />
D 192.168.1.128/27 [90/332800] via 192.168.1.205, 00:01:22,Ethernet0/0</p>
<p>&nbsp;</p>
<p>* Good Credit to SynJunkie for excellent work of this cause.</p>
<p>Thanks kingsmich</p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/07/09/what-do-you-need-to-know-about-eigrp-part-2-practical/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Step by step on how to configure router</title>
		<link>http://www.kingsmich.com/2013/07/09/step-by-step-on-how-you-configure-router/</link>
		<comments>http://www.kingsmich.com/2013/07/09/step-by-step-on-how-you-configure-router/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 06:44:04 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.kingsmich.com/?p=116</guid>
		<description><![CDATA[Step by step on how you configure router 1.Choose a convenient location to begin installing your router such as an open floor space or table. This does not need to be the permanent location of the device. Particularly for wireless<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/07/09/step-by-step-on-how-you-configure-router/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p>Step by step on how you configure router</p>
<p>1.Choose a convenient location to begin installing your router such as an open floor space or table. This does not need to be the permanent location of the device. Particularly for wireless routers, you may find it necessary to re-position the unit after installing it as the cables / signals may not reach all areas needed. At the beginning, its better to choose a location where it&#8217;s easiest to work with the router and worry about final placement later.</p>
<p>2.Plug in the router&#8217;s electrical power source, then turn on the router by pushing the power button.</p>
<p>3.(Optional) Connect your Internet modem to the router. Most network modems connect via an Ethernet cable but USB connections are becoming increasingly common. The cable plugs into the router jack named &#8220;WAN&#8221; or &#8220;uplink&#8221; or &#8220;Internet.&#8221; After connecting the cable, be sure to power cycle (turn off and turn back on) the modem to ensure the router recognizes it.</p>
<p>4.Connect one computer to the router. Even if the router is a wireless model, connect this first computer to the router via a network cable. Using a cable during router installation ensures the maximum reliability of the equipment. Once a wireless router installation is complete, the computer can be changed over to a wireless connection if desired.</p>
<p>5.Open the router&#8217;s administration tool. From the computer connected to the router, first open your Web browser. Then enter the router&#8217;s address for network administration in the Web address field and hit return to reach the router&#8217;s home page.</p>
<p>Many routers are reached by either the Web address &#8220;<a href="http://192.168.1.1">http://192.168.1.1</a>&#8221; or &#8220;<a href="http://192.168.0.1">http://192.168.0.1</a>&#8221; Consult your router&#8217;s documentation to determine the exact address for your model. Note that you do not need a working Internet connection for this step.</p>
<p>6.Log in to the router. The router&#8217;s home page will ask you for a username and password. Both are provided in the router&#8217;s documentation. You should change the router&#8217;s password for security reasons, but do this after the installation is complete to avoid unnecessary complications during the basic setup.</p>
<p>7.If you want your router to connect to the Internet, you must enter Internet connection information into that section of the router&#8217;s configuration (exact location varies). If using DSL Internet, you may need to enter the PPPoE username and password. Likewise, if you have been issued a static IP address by your provider (you would need to have requested it), the static IP fields (including network mask and gateway) given to you by the provider must also must be set in the router.</p>
<p>8.If you were using a primary computer or an older network router to connect to the Internet, your provider may require you to update the MAC address of the router with the MAC address of the device you were using previously. Read How to Change a MAC Address for a detailed description of this process.</p>
<p>9.If this is a wireless router, change the network name (often called SSID). While the router comes to you with a network name set at the factory, you will never want to use this name on your network. Read How to Change the Router SSID for detailed instructions.</p>
<p>10.Verify the network connection is working between your one computer and the router. To do this, you must confirmed that the computer has received IP address information from the router. See How to Find IP Addresses for a description of this process.</p>
<p>11.(If applicable) Verify your one computer can connect to the Internet properly. Open your Web browser and visit a few Internet sites such as <a href="http://compnetworking.about.com/">http://compnetworking.about.com/</a>.</p>
<p>12.Connect additional computers to the router as needed. If connecting wirelessly, ensure the network name (SSID) of each is computer matches that of the router.</p>
<p>13.Finally, configure additional network security features as desired to guard your systems against Internet attackers. These WiFi Home Network Security Tips offer a good checklist to follow.</p>
<p>Tips: 1.When connecting devices with network cables, be sure each end of the cable connects tightly. Loose cables are one of the most common sources of network setup problems.</p>
<p>What You Need •A network router (wireless or wired) •Network adapters installed on all devices to be connected to the router •A working Internet modem (optional) •A Web browser installed at least one computer in the network</p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/07/09/step-by-step-on-how-you-configure-router/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>RSA SECURITY ISSUE</title>
		<link>http://www.kingsmich.com/2013/04/30/rsa-security-issue/</link>
		<comments>http://www.kingsmich.com/2013/04/30/rsa-security-issue/#comments</comments>
		<pubDate>Tue, 30 Apr 2013 09:50:49 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://kingsmich.com/?p=77</guid>
		<description><![CDATA[Mobile Computing and Social NetworkingAggression and Social Norms EG351 w3 Analysis EG351 w3 assign 2 EG351 w3 assign1 EG351 w3-1 EG351 W10 asgn 2 EG351 wk 10 EG351_w1 assg 1 &#8211; Copy EG351_w1 assg 1 EG351_w1 assg 2doc &#8211; Copy<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/04/30/rsa-security-issue/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Mobile-Computing-and-Social-Networking.docx">Mobile Computing and Social Networking</a><a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Aggression-and-Social-Norms.docx">Aggression and Social Norms</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351-w3-Analysis.docx">EG351 w3 Analysis</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351-w3-assign-2.docx">EG351 w3 assign 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351-w3-assign1.docx">EG351 w3 assign1</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351-w3-1.docx">EG351 w3-1</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351-W10-asgn-2.doc">EG351 W10 asgn 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351-wk-10.doc">EG351 wk 10</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w1-assg-1-Copy.doc">EG351_w1 assg 1 &#8211; Copy</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w1-assg-1.doc">EG351_w1 assg 1</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w1-assg-2doc-Copy.docx">EG351_w1 assg 2doc &#8211; Copy</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w1-assg-2doc.doc">EG351_w1 assg 2doc</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w1-assg-2doc.docx">EG351_w1 assg 2doc</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w2-assg-2.doc">EG351_w2 assg 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG351_w2.doc">EG351_w2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG462-WK-9-Copy.docx">EG462 WK 9 &#8211; Copy</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG462-WK-9.docx">EG462 WK 9</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG481-PROJ-3-WK9-Copy.docx">EG481 PROJ 3 WK9 &#8211; Copy</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EG481-PROJ-3-WK9.docx">EG481 PROJ 3 WK9</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Project-2-wk-6.docx">Project 2 wk 6</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/wk-9-assign-3.docx">wk 9 assign 3</a><a href="http://www.kingsmich.com/wp-content/uploads/2013/04/eco-5500-week-2-DQs-Estimating-Demand.docx">eco 5500 week 2 DQs Estimating Demand</a>Analyze the APT Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. A new class of adversaries, appropriately dubbed the &#8220;Advanced Persistent Threat&#8221; (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive and valuable data in an attempt to gain a competitive edge, particularly in international business and law, or nation-state political and military affairs. These adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on n<a title="SOLUTIONS" href="http://www.kingsmich.com/solutions/">etworks over long periods of time. 3.  Greg Rattray, Chief Executive Officer,Delta Risk LLC (SANS Institute, 2013).</a></p>
<p>According to Mike Cloppert Cyber Threat Intelligence Summit Co-Chairs, network defense techniques which leverage knowledge about these adversaries &#8211; known as cyber threat intelligence &#8211; can enable defenders to establish a state of information superiority which decreases the adversary&#8217;s likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely and detailed information to continuously monitor new and evolving attacks, and methods to exploit this information in furtherance of an improved defensive posture. Make no mistake about it: contemporaneous computer network defense contains a strong element of intelligence and counterintelligence that analysts and managers alike must understand and leverage. 5. The goal of this summit will be to equip attendees with knowledge on the tools, methodologies and processes they need to move forward with cyber threat intelligence. The SANS What Works in Cyber Threat Intelligence Summit will bring attendees who are eager to hear this information and learn about tools, techniques, and solutions that can help address these needs.</p>
<p>The tokens, of which 40 million have been deployed, and 250 million mobile software versions, are the market leader for two-factor authentication. They are used in addition to a password, providing a randomly generated number that allows a user to access a network. The tokens are commonly used in financial transactions and government agencies; one source who asked to remain anonymous said SecurID users in those sensitive areas were scrambling to figure out what to do in light of the breach.</p>
<p>Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. The breach at RSA that could compromise the effectiveness of the firm&#8217;s two-factor authentication SecurID tokens was accomplished via phishing e-mails and an exploit for a previously unpatched Adobe Flash hole, RSA has revealed. According to, Elinor Mills The attacker sent two different phishing e-mails over a two-day period last month with a subject line of &#8220;2011 Recruitment Plan&#8221; to two small groups of employees who weren&#8217;t considered particularly high-profile or high-value targets, Uri Rivner, head of new technologies in consumer identity protection at RSA, wrote in a blog post. Attached to the e-mails was an Excel file that contained &#8220;The attacker in this case installed a customized remote administration tool known as Poison Ivy RAT (remote administration tool) variant,&#8221; Rivner wrote. &#8220;Often these remote administration tools, the purpose of which is simply to allow external control of the PC or server, are set up in a reverse-connect mode: this means they pull commands from the central command &amp; control servers, then execute the commands, rather than getting commands remotely. This connectivity method makes them more difficult to detect, as the PC reaches out to the command and control rather than the other way around.&#8221; The type of attack RSA was hit with is known as an &#8220;Advanced Persistent Threat&#8221; (APT). Such attacks are often used to target source code and other information useful in espionage, and they involve knowledge of the company&#8217;s operations, network, and employees and their roles. With APTs, attackers often have months to snoop around the network and gather information. But RSA stopped this attack early on, although the attacker still had time to &#8220;identify and gain access to more strategic users,&#8221; Rivner said. &#8220;Since RSA detected this attack in progress, it is likely the attacker had to move very quickly to accomplish anything in this phase,&#8221; he added. Advanced Persistent Attacks often target source code and other information useful in espionage and involve knowledge of the company&#8217;s network, key employees, and workings. Attackers use social engineering and exploits hidden in e-mail and other messages to sneak key loggers and other snooping tools onto employees&#8217; computers. Google announced last year that it and other companies had been targeted in such an attack and it later came out that attackers used an unpatched hole in Internet Explorer to get into the company computers. Google said at the time that intellectual property was stolen and that the attacks appeared to originate in China</p>
<p>According to CNET, RSA has sent security advisory notes to 60,000 customers, briefed 15,000 customers, and had one-on-one briefings with hundreds of customers in sensitive industries who have signed non-disclosure agreements to talk more specifically about how they can best protect themselves.</p>
<p>Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. simple defense strategies will go a long way to preparing businesses for APTs and reducing the risk, according to IT security professionals. Although some APTs, like Stuxnet, target zero-day vulnerabilities and most are highly targeted, what usually makes these threats &#8220;advanced&#8221; is that they combine a raft of infiltration techniques. But taken individually, these techniques are typically well-known and easy to defend against. Doing the basics properly will provide a level of security that will reduce the likelihood of opportunistic having a vulnerability management system in place, keeping security patches up to date, and continually testing the security posture of the IT infrastructure. Such best practice techniques should enable businesses to detect a fair number of APTs. c hacking or accidental compromise. Defense in depth, a detection capability, an APT incident response plan, a recovery plan, and security awareness and training. businesses to move from a perimeter-based mentality to one where &#8220;every component is taught karate&#8221;, with security controls asset-specific and live with that asset, rather than relying on another device upstream or downstream to protect that particular asset. As part of the re-assessment process, an organization must ensure it understands why it may be attacked. &#8220;Every organization should draw up a risk register that will allow the allocation of funds and resources to protect the assets that are most valuable to the organization, which may include business processes as well as information.</p>
<p>Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. It is essential to regularly test areas of the organization identified as having the highest risk ratings. &#8220;It is important to know when an attack is underway, and how to gather evidence to be able to understand the purpose and origin of the attack. If an organization has experienced an APT incident, it should define an approach to determine how to close down an attack or eavesdropping activity while preserving forensic evidence. &#8220;Senior executives and the corporate communications function should be engaged to ensure that PR messages are crafted and released so as to minimize brand damage. Whatever an individual&#8217;s role is within the business, from chief executives to secretaries, businesses must ensure that everyone is provided with an adequate level of security awareness training so they will be able to identify anything suspicious. Let&#8217;s stop talking down to people, let&#8217;s treat them as adults and explain the real risks and the potential consequences of a successful attack. Let&#8217;s provide guidance on protecting their personal information as well as the organization’s data and everyone will win &#8211; except the criminals. If all the common entry points are blocked, and additional security takes care of the zero-day threats, most organizations should be able to put up a reasonable defense. References Ashford, W. (2013).How to combat advanced persistent threats: APT strategies to protect your organization. <a href="http://www.computerweekly.com/feature/How-to-combat-advanced-persistent-threats-APT-strategies-to-protect-your-organisation">http://www.computerweekly.com/feature/How-to-combat-advanced-persistent-threats-APT-strategies-to-protect-your-organisation</a> Mills, E. (2011). Attack on RSA used zero-day Flash exploit in Excel; CNET. <a href="http://news.cnet.com/8301-27080_3-20051071-245.html">http://news.cnet.com/8301-27080_3-20051071-245.html</a>. SANS Institute, (2013). SANS Cyber Threat Intelligence Summit &#8211; 22 Mar 2013. <a href="http://computer-forensics.sans.org/blog/2013/02/11/sans-cyber-threat-intelligence-summit-22-mar-2013">http://computer-forensics.sans.org/blog/2013/02/11/sans-cyber-threat-intelligence-summit-22-mar-2013</a>.</p>
<p>8888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888</p>
<p>ECO 550 WORK SOLUTION</p>
<p><b>Estimating Demand</b></p>
<p><b>Provide an example when it would be appropriate to conduct a time-series or cross sectional data. Evaluate the potential problems that may arise with your example and identify strategies for minimizing the impact of the potential problems.</b></p>
<p>&nbsp;</p>
<p>Cross-sectional data talks about the data collected by observing many subjects at the same point of time, or without regard to differences in time. Analysis of cross-sectional data usually consists of comparing the differences among the subjects. Knowing that these tasks could not be done within existing range or imputation algorithms, so they cannot handle as many variables as needed even in the simpler cross-sectional data for which they were designed, then the need to also develop a new algorithm that substantially expands the range of computationally feasible data types and sizes for which multiple imputation can be used. Cross-sectional, time series, or especially “time-series cross-section” (TSCS) data sets (i.e., those with T units for each of N cross-sectional entities such as countries, where often T &lt; N), as is common in comparative politics and international relations; or for when qualitative knowledge exists about specific missing cell values. The new methods greatly increase the information researchers are able to extract from given amounts of data and are equivalent to having much larger numbers of observations available. Under normal circumstances, researchers can impute once and then analyze the imputed data sets as many times and for as many purposes as they wish (Honaker, 2010).</p>
<p><b>Discuss the meaning of the regression coefficient of the independent variable(s) and how it could be used to estimate the elasticitys of each of these variables. Discuss how managers use the elasticities measurements to make managerial decisions. </b></p>
<p><b> </b></p>
<p>It is important to take into account the uncertainty in the estimation of the regression coefficient. Regression analysis is used when you want to predict a continuous dependent variable from a number of independent variables. If the dependent variable is dichotomous, then logistic regression should be used. (If the split between the two levels of the dependent variable is close to 50-50, then both logistic and linear regression will end up giving you similar results.)in let the &#8220;X,&#8221; &#8220;Y,&#8221; &#8220;dependent,&#8221; &#8220;independent&#8221; be associated with the magnitude of the regression coefficient ( ) with the change in the dependent variable that results from the unit increase in the independent variable, X.  This magnitude does not tell you how much X changes.   X always increases by one unit to get Y to change by   units. The sign associated with   tells us whether Y increases or decreases by   units when X increases by one unit. (If you begin your interpretation with a unit decrease in X, then remember to reverse the direction indicated by the sign when you describe the change in Y.) . A positive coefficient means X and Y change in the same direction.  If X increases, then Y increases.  If X decreases, then Y decreases.  A negative coefficient means X and Y change in opposite directions.  If X increases, then Y decreases.  If X decreases, then Y increases.</p>
<p>&nbsp;</p>
<p>So when you think about it the regression coefficient is not what excel calls them both coefficients, but people should then be concerned and talk about the intercept or constant. Remember that we are talking about changes in X and changes in Y, not levels of either. This is like the idea of a marginal change. It can be stated that the regression line is linear (y = ax + b) the regression coefficient is the constant (a) that represents the rate of change of one variable (y) as a function of changes in the other (x); it is the slope of the regression line (Osgood, 2000).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Reference</p>
<p>Honaker, J. (2010). What to Do about Missing Values in Time-Series Cross-Section Data. American Journal of Political Science, Vol. 54, No. 2, Pp. 561–581 http://gking.harvard.edu/files/gking/files/pr.pdf</p>
<p>&nbsp;</p>
<p>Osgood, D.W. (2000). Poisson-Based Regression Analysis of Aggregate Crime Rates.Journal of Quantitative Criminology 16:21-43.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/04/30/rsa-security-issue/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Virtual Memory Manager CIS5XX (VMM)/ECONOMIC TUTORIAL CLASS Q/A ECO 5XX</title>
		<link>http://www.kingsmich.com/2013/04/30/the-virtual-memory-manager-vmm/</link>
		<comments>http://www.kingsmich.com/2013/04/30/the-virtual-memory-manager-vmm/#comments</comments>
		<pubDate>Tue, 30 Apr 2013 06:35:07 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://kingsmich.com/?p=71</guid>
		<description><![CDATA[The Virtual Memory Manager (VMM) The Difference between virtual memory and physical memory                Physical memories are the RAM chips purchased and placed in a slot on the computer motherboard. The RAM is the first memory used when the computer<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/04/30/the-virtual-memory-manager-vmm/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p align="center"><span style="color: #000000;"><strong>The Virtual Memory Manager (VMM)</strong></span></p>
<p><span style="color: #000000;"><strong>The Difference between virtual memory and physical memory</strong></span></p>
<p><span style="color: #000000; font-size: medium;"><span style="font-family: Times New Roman;">               </span>Physical memories are the RAM chips purchased and placed in a slot on the computer motherboard. The RAM is the first memory used when the computer requires memory usage, such as for loading an application or opening a document.</span></p>
<p><span style="color: #000000;"><span style="font-size: medium;"><span style="font-family: Times New Roman;">         </span>Virtual</span></span></p>
<p><span style="color: #000000;">Virtual memory is stored on the hard drive. Virtual memory is used when the RAM is filled. Virtual memory is slower than physical memory, so it can decrease the performance of applications. </span></p>
<p><span style="color: #000000;"><span style="font-size: medium;"><span style="font-family: Times New Roman;">         </span>Allocation</span></span></p>
<p><span style="color: #000000;">Physical memory allocates information in a &#8220;first in, last out&#8221; process. The information is placed on the stack. Virtual memory uses a process called paging. These pages are laid across the hard drive in fixed sizes.</span></p>
<p><span style="color: #000000;"><span style="font-size: medium;"><span style="font-family: Times New Roman;">         </span>Size</span></span></p>
<p><span style="color: #000000;">1.<span style="font-size: medium;"><span style="font-family: Times New Roman;">         </span>Physical memory is limited to the size of the RAM chips installed in the computer. Virtual memory is limited by the size of the hard drive, so virtual memory has the capability for more STORAGE.</span></span></p>
<p><span style="color: #000000;">2.<span style="font-size: medium;"><span style="font-family: Times New Roman;">         </span>Virtual memory is a memory management technique developed for multitasking kernels.</span></span></p>
<p><span style="color: #000000;">3.<span style="font-size: medium;"><span style="font-family: Times New Roman;">         </span>In virtual memory Operating systems have memory areas that are pinned (never swapped to secondary storage). For example, interrupt mechanisms rely on an array of pointers to their handlers, such as I/O completion and page fault. If the pages containing these pointers or the code that they invoke were pageable, interrupt-handling would become far more complex and time-consuming, particularly in the case of page fault interruptions. Hence, some part of the page table structures is not pageable (SPECTORA).</span></span></p>
<p><span style="color: #000000;">1) Physical Memory is the actual memory chips inside your computer. It&#8217;s a very fast type of memory that the computer can access very quickly and efficiently.</span></p>
<p><span style="color: #000000;">2) Virtual Memory is a space on your hard drive. The computer uses this from time to time instead of using the physical memory. As this is space on the hard drive accessing it is not as fast as normal memory.</span></p>
<p><span style="color: #000000;">3) Your computer uses Virtual Memory during normal operation, but if your computer begins to run out of physical memory then your computer will resort to using the virtual memory more often.</span></p>
<p><span style="color: #000000;">Virtual memory also allows the sharing of files and memory by multiple processes, with several benefits:</span></p>
<p><span style="color: #000000;">System libraries can be shared by mapping them into the virtual address space of more than one process.</span></p>
<p><span style="color: #000000;">Processes can also share virtual memory by mapping the same block of memory to more than one process. Process pages can be shared during a fork system call, eliminating the need to copy all of the pages of the original (parent) process.</span></p>
<p><span style="color: #000000;">Users can add more RAM to a computer to increase performance of a computer that uses virtual memory too often. Virtual memory settings can be controlled through the operating system</span></p>
<p><span style="color: #000000;"><strong>The benefits of running applications when the operating system uses a virtual memory manager.</strong></span></p>
<p><span style="color: #000000; font-size: medium;"><span style="font-family: Times New Roman;">                  </span>Most operating systems use a virtual memory manager (VMM) whose responsibility is to manage the relationship between the virtual organizations of memory as seen by an application with the physical organization of memory from the operating system’s point of view. Virtual memory addresses must be mapped to physical address and vice versa. Write a four to five (4-5) page paper in which you: The memory mapping manager views its local memory as a large cache of the shared virtual memory addresses space for its associated processor (SPECTORA).</span></p>
<p><span style="color: #000000;">How virtual memory addresses get translated into physical addresses step by step.</span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Each frame is associated with a register containing</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Residence bit: whether or not the frame is occupied, Occupier: page number of the page occupying frame Protection bits</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Page registers: an example Physical memory size: 16 MB Page size: 4096 bytes Number of frames: 4096</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Space used for page registers (assuming 8 bytes/register): 32</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>18 Kbytes</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Percentage overhead introduced by page registers: 0.2%</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Size of virtual memory: irrelevant</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>CPU generates virtual addresses, where is the Physical page?</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Hash the virtual address</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Must deal with conflicts</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>TLB caches recent translations, so page lookup can take several steps</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Hash the address</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Check the tag of the entry</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Possibly rehash/traverse list of conflicting entries 19</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>TLB is limited in size</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>Difficult to make large and accessible in a single cycle.</span></span></p>
<p><span style="color: #000000;">•<span style="font-size: medium;"><span style="font-family: Times New Roman;">           </span>They consume a lot of power 27% of on-chip for StrongARM .( TARJAN) </span></span></p>
<p><span style="color: #000000; font-size: medium;"><span style="font-family: Times New Roman;">         </span>Some physical addresses are decoded to select memory hardware. Physical memory includes ROM as well as RAM. Each block of physical memory has a range of physical addresses. The physical addresses where RAM or ROM can be found depend on the particular computer system (TANG).</span></p>
<p><span style="color: #000000; font-size: medium;"><span style="font-family: Times New Roman;">          </span>Physical memory does not necessarily occupy sequential addresses. There can be (and often are) gaps, ranges of physical addresses that do not relate to either memory or devices, between ROM addresses and RAM addresses. In most systems, all RAM is given a single sequential span of physical addresses. However, this is not a requirement. Blocks of RAM addresses can also be separated by gaps that are not populated with memory. Since all software uses virtual addresses, software always sees a sequential range of addresses without gaps (IBM). </span></p>
<p><span style="color: #000000;"><strong>A Modern operating system translates 32-bit and 64-bit virtual addresses to physical addresses on the same machine.</strong></span></p>
<p><span style="color: #000000;"><span style="font-size: medium;"><span style="font-family: Times New Roman;">          </span>The first processor to implement Intel 64 was the multi-socket processor Xeon code named Nocona in June 2004. In contrast, the initial Prescott chips (February 2004) did not enable this feature. Intel subsequently began selling Intel 64-enabled Pentium 4s using the E0 revision of the Prescott core, being sold on the OEM market as the Pentium 4, model F. The E0 revision also adds eXecute Disable (XD) (Intel&#8217;s name for the NX bit) to Intel 64, and has been included in the current Xeon code-named Irwindale. Intel&#8217;s official launch of Intel 64 (under the name EM64T at that time) in mainstream desktop processors was the N0 Stepping Prescott-2M. All 9xx, 8xx, 6xx, 5&#215;9, 5&#215;6, 5&#215;1, 3&#215;6, and 3&#215;1 series CPUs have Intel 64 enabled, as do the Core 2 CPUs, as will future Intel CPUs for workstations or servers. Intel 64 is also present in the last members of the Celeron D line. Although virtual addresses are 64 bits wide in 64-bit mode, current implementations (and all chips known to be in the planning stages) do not allow the entire virtual address space of 264 bytes (16 EB) to be used. Most operating systems and applications will not need such a large address space for the foreseeable future (for example, Windows implementations for AMD64 are only populating 16 TB, or 44 bits&#8217; worth), so implementing such wide virtual addresses would simply increase the complexity and cost of address translation with no real benefit. AMD therefore decided that, in the first implementations of the architecture, only the least significant 48 bits of a virtual address would actually be used in address translation (page table lookup).</span><span style="font-size: medium;"><span style="font-family: Times New Roman;">  </span>Further, bits 48 through 63 of any virtual address must be copies of bit 47 (in a manner akin to sign extension), or the processor will raise an exception. Addresses complying with this rule are referred to as &#8220;canonical form Canonical form addresses run from 0 through 00007FFF&#8217;FFFFFFFF, and from FFFF8000&#8217;00000000 through FFFFFFFF&#8217;FFFFFFFF, for a total of 256 TB of usable virtual address space (AMD).</span></span></p>
<p><span style="color: #000000;"><strong>Relationship diagram between virtual addresses to physical addresses.</strong></span></p>
<p><span style="color: #000000;"><a href="http://kingsmich.com/wp-content/uploads/2013/04/vwm.jpg"><span style="color: #000000;"><img alt="vwm" src="http://kingsmich.com/wp-content/uploads/2013/04/vwm-300x223.jpg" width="300" height="223" /></span></a></span></p>
<p><span style="color: #000000;"> </span></p>
<p><span style="color: #000000;"><strong>References</strong></span></p>
<p><span style="color: #000000;">AMD Corporation (May 2011).Volume2: System programming, AMD64 Architecture Programmer&#8217;s Manual. AMD Corporation. Retrieved December 7, 2012 from http://support.amd.com/us/Embedded_TechDocs/24593.pdf</span></p>
<p><span style="color: #000000;">IBM Corporation, (2007-09-06). IBM WebSphere Application Server 64-bit Performance Demystified. Retrieved from December 7, 2012 ftp://ftp.software.ibm.com/software/webserver/appserv/was/64bitPerf.pdf. </span></p>
<p><span style="color: #000000;">SPECTORA, Z. Performing remote operations efficiently on a local computer network, Common, ACM 25, 4 (Apr. 1982), 260-273</span></p>
<p><span style="color: #000000;">TANG, C. K. (1976). Cache system design in the tightly coupled multiprocessor system, In Proceedings of AFZPS National Computer Conference (New York, N.Y., June 7-10, 1976), AFIPS Press, and Montvale, N.J. 1976, pp. 749-753</span></p>
<p><span style="color: #000000;">TARJAN, R. E., AND VAN LEEUWEN, J. (Apr. 1984), Worst-case analysis of set union algorithms, J.ACM 32, 2 245-281 Retrieved from December 7, 2012. http://techpubs.sgi.com/library/dynaweb_docs/0630/SGI_Developer/books/DevDrvrO2_PG/sgi_html/ch01.html.</span></p>
<p><span style="color: #000000; font-family: Times New Roman; font-size: medium;">********************************************************************************************************************</span></p>
<p>ECONOMIC TUTORIAL Q/A FOLLOWING ME step by step</p>
<p>********************************************************************************************************************************************************</p>
<p>Eng. &#8211; Kingsley</p>
<p><b>Estimating Demand</b></p>
<p><b>Provide an example when it would be appropriate to conduct a time-series or cross sectional data. Evaluate the potential problems that may arise with your example and identify strategies for minimizing the impact of the potential problems.</b></p>
<p>&nbsp;</p>
<p>Cross-sectional data talks about the data collected by observing many subjects at the same point of time, or without regard to differences in time. Analysis of cross-sectional data usually consists of comparing the differences among the subjects. Knowing that these tasks could not be done within existing range or imputation algorithms, so they cannot handle as many variables as needed even in the simpler cross-sectional data for which they were designed, then the need to also develop a new algorithm that substantially expands the range of computationally feasible data types and sizes for which multiple imputation can be used. Cross-sectional, time series, or especially “time-series cross-section” (TSCS) data sets (i.e., those with T units for each of N cross-sectional entities such as countries, where often T &lt; N), as is common in comparative politics and international relations; or for when qualitative knowledge exists about specific missing cell values. The new methods greatly increase the information researchers are able to extract from given amounts of data and are equivalent to having much larger numbers of observations available. Under normal circumstances, researchers can impute once and then analyze the imputed data sets as many times and for as many purposes as they wish (Honaker, 2010).</p>
<p><b>Discuss the meaning of the regression coefficient of the independent variable(s) and how it could be used to estimate the elasticitys of each of these variables. Discuss how managers use the elasticities measurements to make managerial decisions. </b></p>
<p><b> </b></p>
<p>It is important to take into account the uncertainty in the estimation of the regression coefficient. Regression analysis is used when you want to predict a continuous dependent variable from a number of independent variables. If the dependent variable is dichotomous, then logistic regression should be used. (If the split between the two levels of the dependent variable is close to 50-50, then both logistic and linear regression will end up giving you similar results.)in let the &#8220;X,&#8221; &#8220;Y,&#8221; &#8220;dependent,&#8221; &#8220;independent&#8221; be associated with the magnitude of the regression coefficient ( ) with the change in the dependent variable that results from the unit increase in the independent variable, X.  This magnitude does not tell you how much X changes.   X always increases by one unit to get Y to change by   units. The sign associated with   tells us whether Y increases or decreases by   units when X increases by one unit. (If you begin your interpretation with a unit decrease in X, then remember to reverse the direction indicated by the sign when you describe the change in Y.) . A positive coefficient means X and Y change in the same direction.  If X increases, then Y increases.  If X decreases, then Y decreases.  A negative coefficient means X and Y change in opposite directions.  If X increases, then Y decreases.  If X decreases, then Y increases.</p>
<p>&nbsp;</p>
<p>So when you think about it the regression coefficient is not what excel calls them both coefficients, but people should then be concerned and talk about the intercept or constant. Remember that we are talking about changes in X and changes in Y, not levels of either. This is like the idea of a marginal change. It can be stated that the regression line is linear (y = ax + b) the regression coefficient is the constant (a) that represents the rate of change of one variable (y) as a function of changes in the other (x); it is the slope of the regression line (Osgood, 2000).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Reference</p>
<p>Honaker, J. (2010). What to Do about Missing Values in Time-Series Cross-Section Data. American Journal of Political Science, Vol. 54, No. 2, Pp. 561–581 http://gking.harvard.edu/files/gking/files/pr.pdf</p>
<p>&nbsp;</p>
<p>Osgood, D.W. (2000). Poisson-Based Regression Analysis of Aggregate Crime Rates.Journal of Quantitative Criminology 16:21-43.</p>
<p>&nbsp;</p>
<p><b>Fundamental Economic Concepts</b></p>
<p><b>Pick a recently released good or service. Then, determine the factors that must be evaluated regarding the product’s supply and demand. Analyze how these factors impact the decision to supply the product indicating the significance of each in the decision-making process.</b></p>
<p>Recently Blackberry released blackberry Q10, after the release of the blackberry Z10.Which now is pointing to weakening sales of the BlackBerry Z10, but strong initial demand for the limited supply of Q10 Smartphone’s, For the first quarter of fiscal 2014 (ending May 2013), his shipment estimates fall to 2.8 million units from 3.3 million previously. Analylist list like Mr. Michael Walkley has warned that Z10 sales could weaken further in the consumer retail as blackberryQ10faces increase competition at the end from Samsung Galaxy S4 and HTC One. As there is no doubt that this strong boost in demand for q10 will lead to decrease in z10 (Ratner, 2013).</p>
<p>&nbsp;</p>
<p><b>Using the same product example above, analyzing how the risk tolerance factors play in supplying the good or service and how this should influence management’s decisions.  </b></p>
<p>Now you can see timing and managerial decision play its role in this event based on the store checked , the blackberry Q10, has been selling extremely well and has sold out in many stores in march, blackberry report fourth-quarter profit of $98 million this surprised analyst because they had widely expecting a loss (Ratner, 2013). The influence is product modification base on customer demand which increase supply, as well help in the competition market but leads to the decrease in demand of the blackberry Z10. We see this today in all technology it’s better not to change the existing product that to introduce a less demand product the introduction of Blackberry Z10, cause Blackberry to loss as they where uneven with the completion of similar design in the market like the iphone5, Samsung galaxy s4, but the introduction of Blackberry Q10 as a better technology than the Z10 help strengthens their market (Ratner, 2013).</p>
<p>&nbsp;</p>
<p>Reference</p>
<p>Ratner, J. (2013).BlackBerry sales forecast cut despite strong demand for Q10.financial post.http://business.financialpost.com/2013/05/06/blackberry-estimates-cut-despite-q10-strength-likely-offsetting-z10-weakness/</p>
<p><span style="text-decoration: underline;">See more on daily bases</span></p>
<p><a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-550-WK-3-Assignment.docx">ECO 550 WK 3 Assignment</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EC0-550-DICUSSION-WK-1.doc">EC0 550 DICUSSION WK 1</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-5500-Week-1-Discussion-2.docx">ECO 5500 Week 1 Discussion 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EC0-550-Week-3-Check-Your-Understanding-Submission.docx">EC0 550 Week 3 Check Your Understanding Submission</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-550-Check-your-understanding-Week-2.docx">ECO 550 Check your understanding Week 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/eco-5500-week-2-DQs-Estimating-Demand.docx">eco 5500 week 2 DQs Estimating Demand</a><a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Discussion-1.docx">Discussion 1</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Discussion-2.-cyberwarfare.docx">Discussion 2. cyberwarfare</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Discussion-2.docx">Discussion 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Eco-550-Office-Building-Assignment-in-research.docx">Eco 550 Office Building Assignment in research</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Eco-550-Week-6-Check-Your-Understanding-draft.docx">Eco 550 Week 6 Check Your Understanding draft</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/eco-5500-week-2-DQs-Estimating-Demand1.docx">eco 5500 week 2 DQs Estimating Demand</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-5500-WK2-DQs.docx">ECO 5500 WK2 DQs</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-Assessment-4-ON-Research.docx">ECO Assessment 4 ON Research</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-WK-4-Check-Your-Understanding.docx">ECO WK 4 Check Your Understanding</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Eco550-Week-2-Check-Your-Understanding.docx">Eco550 Week 2 Check Your Understanding</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Monopolies.docx">Monopolies</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/Oligopoly.docx">Oligopoly</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EC0-550-DICUSSION-WK-1.doc">EC0 550 DICUSSION WK 1</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/EC0-550-Week-3-Check-Your-Understanding-Submission.docx">EC0 550 Week 3 Check Your Understanding Submission</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-550-Check-your-understanding-Week-2.docx">ECO 550 Check your understanding Week 2</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-550-WK-3-Assignment.docx">ECO 550 WK 3 Assignment</a> <a href="http://www.kingsmich.com/wp-content/uploads/2013/04/ECO-5500-Week-1-Discussion-2.docx">ECO 5500 Week 1 Discussion 2</a></p>
<p>&nbsp;</p>
<p><span style="color: #000000; font-family: Times New Roman; font-size: medium;"> </span></p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/04/30/the-virtual-memory-manager-vmm/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Product &amp; Services</title>
		<link>http://www.kingsmich.com/2013/03/21/product-services/</link>
		<comments>http://www.kingsmich.com/2013/03/21/product-services/#comments</comments>
		<pubDate>Thu, 21 Mar 2013 19:23:40 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[Services]]></category>

		<guid isPermaLink="false">http://kingsmich.com/?p=22</guid>
		<description><![CDATA[Product and Services Kingsmich is proud to accept responsibility for the functionality of your IT Infrastructure. We provide all the service and support you need to keep your business running productively. Kingsmich is proud to offer 24/7 onsite, phone and<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/03/21/product-services/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p><a href="http://kingsmich.com/wp-content/uploads/2013/03/data-center-guys.jpg"><img class="size-full wp-image-23 alignleft" alt="data center guys" src="http://kingsmich.com/wp-content/uploads/2013/03/data-center-guys.jpg" width="484" height="197" /></a></p>
<p><b>Product and Services</b></p>
<p>Kingsmich is proud to accept responsibility for the functionality of your IT Infrastructure. We provide all the service and support you need to keep your business running productively. Kingsmich is proud to offer 24/7 onsite, phone and email support. Call us today</p>
<ul>
<ul>
<li>Virus Removal</li>
<li>Computer/Laptop Repair</li>
<li>Network Installation</li>
<li>Server Installation/Monitoring</li>
<li>Data Backup Onsite/Offsite</li>
<li>Blackberry Server installation</li>
<li>Computer/Laptop Optimization</li>
</ul>
</ul>
<p>&nbsp;</p>
<ul>
<li>Computer Forensics</li>
<li>Consulting</li>
<li>24/7 Onsite, Phone and Email</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/03/21/product-services/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Who We Support</title>
		<link>http://www.kingsmich.com/2013/03/21/4/</link>
		<comments>http://www.kingsmich.com/2013/03/21/4/#comments</comments>
		<pubDate>Thu, 21 Mar 2013 13:41:44 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[support]]></category>

		<guid isPermaLink="false">http://kingsmich.com/?p=4</guid>
		<description><![CDATA[Who We Support Individual with computer, networking, cell phone, laptop cabling and other related issues Comcast PNC Bank Century link Pendum Unlimited DC net Edge Technologies Insight Globe Maryland Department of Transportation AUTHORIT Social Security Administration Center for social change<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/03/21/4/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p><a title="Support" href="http://kingsmich.com/wp-content/uploads/2013/03/phone-image.jpg" target="_blank" rel="home "><img class=" wp-image-5  " style="border: 2px solid black; margin: 2px 1px;" title="Support" alt="phone image" src="http://kingsmich.com/wp-content/uploads/2013/03/phone-image-246x300.jpg" width="200" height="300" /></a></p>
<p><b>Who We Support</b></p>
<ul>
<li>Individual with computer, networking, cell phone, laptop cabling and other related issues</li>
<li>Comcast</li>
<li>PNC Bank</li>
<li>Century link</li>
<li>Pendum Unlimited</li>
<li>DC net</li>
<li>Edge Technologies</li>
<li>Insight Globe</li>
<li>Maryland Department of Transportation AUTHORIT</li>
<li>Social Security Administration</li>
<li>Center for social change</li>
<li>Progress Unlimited</li>
<li>Harry corporation tech</li>
<li>Rem mentor Network</li>
<li>Royal exchange Assurance plc.</li>
<li>Noc &amp; co.</li>
<li>New day Network</li>
<li>Other U.S. federal government customers</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/03/21/4/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Data Backup Onsite/Offsite</title>
		<link>http://www.kingsmich.com/2013/03/19/hello-world/</link>
		<comments>http://www.kingsmich.com/2013/03/19/hello-world/#comments</comments>
		<pubDate>Tue, 19 Mar 2013 22:21:34 +0000</pubDate>
		<dc:creator><![CDATA[KINGSMICH]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Data]]></category>

		<guid isPermaLink="false">http://kingsmich.com/?p=1</guid>
		<description><![CDATA[Kingsmich offers IT support for all of your companies&#8217; needs. Do you desire to have in house IT support without the payroll costs, and then you have come to the right place?  We manage your network, so you can manage your<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://www.kingsmich.com/2013/03/19/hello-world/">Read more &#8250;</a></div><!-- end of .read-more -->]]></description>
				<content:encoded><![CDATA[<p><a href="http://kingsmich.com/wp-content/uploads/2013/03/cisco-router.jpg"><img class="alignnone size-medium wp-image-11" alt="cisco router" src="http://kingsmich.com/wp-content/uploads/2013/03/cisco-router-300x121.jpg" width="300" height="121" /></a>Kingsmich offers IT support for all of your companies&#8217; needs. Do you desire to have in house IT support without the payroll costs, and then you have come to the right place?  We manage your network, so you can manage your business. Our technicians are trained to provide businesses with rapid response support and the highest quality of professionalism. Kingsmich is proud to handle every aspect of your IT needs. From server outages to desktop support, we can solve all of your technology issues at the most affordable prices around</p>
]]></content:encoded>
			<wfw:commentRss>http://www.kingsmich.com/2013/03/19/hello-world/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
