Wednesday, 26 March 2014

To Build a Storage and Backup Strategy for Small Business



Now-a-day businesses generate more data than the previous days to which the pre-gigabyte cost of various external and internal hard disks and various associate storage technologies are never been lower, while on the other side the cloud storage also increasing rapidly to which they offers even more opportunities to do more things with less.
Most of the small business are aware of the storage capacity in today’s move due to the confusion about the various storage options and a failure to understand the old paradigm and about backup which was no longer adequate.
When coming to backup strategy it was more than a hardware, it differs according to the system of business lack of the budget and functionality of the backup.
There are various six common data storage solutions
Unless going to every storage facility around u reveal of various categories is better for storage options:

  • Attaching direct storage: DAS is which storage devices that which are connected directly to a personal computer or a server, where commonly using a USB 2.0 or USB 3.0 peripheral port. In these there a backlog of to do ad-hoc or a batch backups to transfer the data.

  • Network attached storage: In NAS it connects directly to the network and there the data is stored it is main function is around file server and it helps us to accept multiple storage drives. NAS can be accessed anywhere in the area s where the network is available and can be accessed from any computers and laptops using certain authorization. And in some NAS the data can synchronized in the certain selected folder and in various volumes with a second

  • Disaster protected storage: It is defined in the name itself which can mainly come in the form of NAS or DAS they are hardened against these various types which would have been easily destroyed and the data can be lost and for example considering the ioSafe company it says there DAS can be survive even for thirty long minutes in fire and in days under water.
  • Online storage: In online storage of data there are actually about two different variables such as Amazon Storage Service which serve as a cloud version for all the supported amazon compute platform. And in the another form using the data to be stored to cloud and any consumers and business store can back up the data according to there will.  Some companies like MozyPro and SpiderOak which mainly used for business storage

  • Private Cloud: when the customer feels that why to keep the data in third party hands then they can use cloud vendors, and to these various enterprises made to build some private versions of the cloud storages to gain some of the inherent benefits of the flexibility and electricity .

  • Offline media: Mainly called as the tape drivers for the optical such as DVD and Blue ray disc which were capable of storage a very large amount of data and they are totally offline data backup. This storage can be looked as outrage but consider once that tape backups saved top company like Google at one Gmail outrage and Facebook is now using Blu-Ray discs for data backup of entire server rack

  

Power – Line Communications



This describes in many other forms such as:

  • Power –Line networking (PLN).
  • Power –Line carrier.
  • Power –Line telecommunications.
  • Mains Communication
  • Power –Line digital subscriber line (PDSL).
In this it carries data on a conductor which is also used simultaneously for AC electric power supply or electric power transmission

For different type of applications a wide range of power line communication are most needed such as getting the internet access for home which is used to called as broadband over power lines (BPL). For which most of the power line communication limit themselves for one certain building and some can cross to another two levels of communication such as the both premises wiring and the distribution network and in these various frequencies and data rates are maintained at certain required situations.
It is operate by mainly adding a modulated carrier signal to the wiring system according to the power line communication types the frequency bands varies according to it basically the power distribution of this system is intended to transfer AC power at various difficult frequencies of 50 or 60 Hz, they have a very limited frequencies to carry high frequencies.

Transmission of radio programs:
In some cases the power line communications are widely used in transmitting the radio programs through the power lines. And when it is used in AM radio bad, it is well known as carrier current system.

High-frequency (≥ 1 MHz):
Depending on the technology various high range frequency spectrum uses large portion of the radio spectrum communication.

Home Network (Large area network –LAN):
Most of the home networks and other various peripheral’s like TV’s, players, etc... And all other entertainment devices which have Ethernet port capability can access. When power line adapters are established with Ethernet connection using the already existed wiring in the home which helps the devices to access the data without any inconvenience of running network cables

Broadband network over the power line:
Broad band over power line is easily stated as BPL is a system which will transmit two-way data over the existing AC MV a medium voltage among transformers in electrical distribution wiring and a AC LV a low voltage among transformer and customer outlets which was typically around 110 to 240V which helps to avoid the expenditure of maintaining a dedicated network of various devices such routers, radios and antennas in wireless network system.

In the broadband network power line the OPERA standard was used mostly by internet service providers in Europe. And in some places like Washington Island of North America and this were more commonly used for smart meters and to manage load on electric distribution.

Automotive uses:
Using Direct current (DC) battery power-line technology enables us to use the communication of data, music, voice and video signals in vehicle network. To overcome the noise and hostile environments they are used to be tailored in the advanced digital communication techniques which are mostly implemented in a small sized silicon devices in this one singled powered line can be used to multiple various independent networks. In these the benefits could be as lower in the cost, weight, ease of installation, and flexible modification.

Friday, 21 March 2014

Understanding Switch Security

Understanding Switch Security:

Completion of the security in the physical access, and there should be a growth in need to the process that to ensure access to various ports is thoroughly secure of any EXEC session connection, mostly by securing the console port (CON) and by securing the Telnet ports (VTY) and by adding to this an administration they will assign a certain permanent address to the variant ports. And to ensure security holes not to become by the switch ports various sections are described to migrate electrical, environmental and mitigate hardware and other maintenance related security type of threads to the Cisco IOS devices.

Physical and Environmental Threats:

Installation of software’s and other improper or the incomplete device installation will also leads to the  security threat and if the mistake is left unconcerned then there will have a dire sort of results. The threat is included in all sort of devices or the server configurations. Because of the peer installation the data also cannot be retrieved and huge loss may occur.
And to this the beyond insecure type of configuration settings, four classes of insecure installations or the physical access threats has been implemented.

  Hardware threats: This sort of threat is physical damage for the switch and to the switch hardware.
  Environmental threats: In the increase of the temperature extremes (means when there is too hot or too cold) or by increase in humidity (means too wet or too dry).
 Electrical threats: Breaks in power supply, insufficient supply of voltage, voltage spikes, unconditioned power, and total power loss.
   Maintenance threats: Poor maintenance in the electronic components and poor cabling, poor labelling and lack of critical spare parts may result in the maintenance threats.
Configuring in Password Security:
To configure the password and other console a (CLI) command-line interface is used. The following sort of examples show the configuration of a switch.

Example 1: Switch Password Configuration: Virtual Terminal (Telnet) Password Configuration
SwitchX(config)# line console 0
SwitchX(config-line)# login
SwitchX(config-line)# password india

Example 2: Switch Password Configuration: Console Password Configuration

SwitchX(config)# line console 0
SwitchX(config-line)# login
SwitchX(config-line)# password india

Example 3: Switch Password Configuration: Secret Password Configuration

SwitchX(config)# enable secret sanfran

Example 4: Switch Password Configuration: Enable Password Configuration

SwitchX(config)# enable password india

Note: The passwords mentioned are for example purpose and in the real time purpose they should be stronger and they should be a complex password.
There uses the login local command which helps us to enable the password checking to be more protected as per the user basis by using the password username and password specified with the username global configuration command. In this the username commands and establish an encrypted passwords with its username authentication.

According to the difference in switches the maximum size of a MAC address is varied. And when consider the Catalyst 2690 series switch which has a capable to store up to 8192 MAC addresses and on other hand less sophisticated switches will not support that many MAC address.

Data Communications Process

Communication on a network will be generated on the network from a source and
the obtained data is sent to a destination. And in the networking protocol will uses
the all the data in the OSI layers or some sort of layers to move the data betweenthe layers. When consider about layers let recall that layer 1 is the part the protocolwhich operates and communicate with the sort of media, and in the other end Layer7 is the part of the protocol which communicates among the applications. Becauseof the network layers only the data frame can be travelled through the computernetworks and other devices which are connected to it. And this process of passingthrough the data though network from one device to the others is accomplished bythe information passing from the applications down to the protocol stack, where anappropriate header is added at each part of the layer model. And this sort of processadding header and stack is called as encapsulation. When data encapsulation iscompleted and it was passed though the network, and then the data is removed bythe receiving devices, by using the messages in the header and the various directionsto known how the data will be passed through the appropriate applications.The one of the important concepts in the networking is the data encapsulation. Itmainly functions and depends on the working of the layers called as peer layers towhich the communication on critical parameters defined as on control informationand addressing.The encapsulation concept was quite simple although so many will think that as anabstract concept. It can be easily explained in a day-to-day work consider a mugto be transported to a friend who was in another place you need to send it by anytransportation ways road, rail or airways the process will not be done by throwingthe mug and expecting it to be reach your friend. You need a proper service to donethe work. The process is completely shown below.Step 1: Pack the mug in a box.Step 2: Indicate an address such that the transporter knows where to deliver itStep 3: Give the box to a parcel carrier.Step 4: The package was transferred to its final destination.And in the same manner the data also transfers from one point to the other throughthe means of the network. And after the package has been delivered to the concernperson the process should be reversed by your friend. The process of the reverseencapsulation is known as the de-encapsulation.

Wednesday, 19 March 2014

Starting a Cisco Router



The Cisco will not come with a configuration saved when it is started. And when the start-up is completed then an initial software configuration is entered. A router should have an exact and valid configuration to operate on a network.

Initial Startup of a Cisco Router:

It should be required to verify the physical installation the router should be powered up and the cisco IOS software is to be console. And to start up a router certain operations are required the following are stated below.

  • The power runs on self-test-POST to test the working of hardware system.
  • According to the operating system the Cisco IOS Software finds and loads what the router requires
  • Required configurations about router-specific attributes, interface addresses, and Protocol functions are installed.

When a Cisco router powers up, it performs a POST. During this process, the router will executes diagnostics to verify the working of CPU, interface circuits and its memory.
Completion on hardware check the router then proceeds for the software instalment’s where it finds and loads the Cisco IOS image, and then finds and loads the configuration file, if one exists.

The following steps are used for startup for a cisco router:



Step 1: Before starting the router, the following steps points should be verified

  • Whether all the network cables are in secure connection.
  • Whether the host terminal is connected to the console port
  • Your console terminal application, such as HyperTerminal, is selected.

Step 2: The power switch is then is “On” or plug the device to power.

Step 3: The boot sequence should be observed and the Cisco IOS Software output on the console.

Initial Setup of a Cisco Router:

When the router starts up the device should be configured by automatically or by self and then setup is configured in the system. After a router is setup is completes the POST and loads a Cisco IOS image, it looks for a device configuration file called as NVRAM. This part of the router is a type of memory that retains its contents even when power is turned off in the router. And then if the router is enabled with password protection it should be logged in. 
 
                           

When starting a new Cisco router, if there was no certain required configuration file then the operating system will run the setup in the installation of the system configuration. 

Setup mode is not intended for entering complex protocol features in the router. Use setup mode to bring up a minimal configuration. Other various configurations can be used in order to setup the installation of the program to configure the router.

The main purpose of the setup configuration is to help the other type of routers which does not configure according to the OS in other sources. Setup mode can be done when the required configuration is not found, or it can be entered at any time after the router is operational or booted to the default, by entering the setup privileged in the EXEC mode command.