Wednesday 28 October 2015

Install Windows 8 directly from Hard drive – NO Need of DVD or USB !!

Picture of Install Windows 8 directly from Hard drive – NO DVD or USB needed!
How to CLEAN Install Windows 8 directly from Hard drive – NO Need of DVD or USB !!

For example, you have a netbook or desktop that you want to install Windows 8 onto, but can’t use DVD or USB for whatever reason (or don't want to, like me). This method will allow you to boot and install Windows directly from the hard drive. This guide involves plugging the hard drive into another working computer, preparing the hard drive, placing it back in the system, and installing Windows as usual.

This was tested with Windows 8 and Windows 8.1.  The guide for Windows 7 is exactly the same.

Step 1: Part 1: Preparing the HDD with Windows 8 setup files.

- Connect the hard drive to another working computer.
- Format the hard drive to NTFS (Quick format works fine; multiple partitions also work).
- Copy the following from your Windows 8 disc or ISO:

   -Boot
   -Sources
   -Bootmgr

Step 2: Part 2: Making the HDD bootable

Picture of Part 2: Making the HD bootable
Using Windows XP, Windows Vista, Windows 7, or Windows 8 open CMD as Administrator (Windows key + R, type CMD, hit Enter)

Enter the following commands, (replace X with what applies to your hard drive):

diskpart
list disk
select disk X
list partition
select partition X
active
exit
X:\boot\bootsect.exe /nt60 X:

(See picture for example)

Exit and shutdown.

Note: If you’re working on a 32-bit system, and you want to install 64-bit Windows, you may get problems trying to run the last command (X:\boot\bootsect.exe /nt60 X:).
Solutions:

    Use a computer with a 64-bit version of Windows

OR

    A little trick that worked for me: If you have a 32-bit Windows 8 disc, you can copy bootsect.exe from that and replace the 64-bit one (boot\bootsect.exe).

Step 3: Part 3: Booting and installing Windows

Picture of Part 3: Booting and installing Windows
Place the hard drive back into the target machine. Make sure that the BIOS is configured to boot from the hard drive. If you did everything correctly, you should see the blue Windows logo (see picture for example) and setup will load (really fast, too, because it's loading from the hard drive). Install Windows as usual (but don’t format your drive this time in the installer – otherwise it will erase the Windows 8 setup files too!).

Step 4: Part 4: Final steps/housecleaning

Picture of Part 4: Final steps/housecleaning
We’ll have to quickly edit the boot menu once Windows is installed.

In Windows 8, hit the Windows key + R. Type msconfig, and hit Enter.
Click to the Boot tab at the top.
Click 'Windows Setup (\windows)', and hit Delete.
Click OK.
Click 'Exit without restart'.
(See picture for example)

And lastly, delete the ‘Sources’ folder and “Windows.old” (if it exists) from your hard drive root (this will free up 2-4gb).


I hope this helps some people out.  Feel free to comment :)

Tuesday 20 October 2015

Network Topology

Hello Friends, Today I am Telling you About Topology ?

NETWORK TOPOLOGIES
  • Understand what Topology is.
  • Understand different Topologies. 
What is Topology? Physical connection of devices on the network. Point-to-Point (PTP) Connect two devices directly together. For Example:
  • Two computers communicating via modems.
  • A workstation communicating along a parallel cable to a printer.

In a point-to-point link, two devices monopolize a communication medium.
Because the medium is not shared, a mechanism is not needed to identify the computers.
Therefore, a simple,two-device point-to-point network has no need for addressing.

Point-to-point links can be simplex, half-duplex, or full-duplex.
When devices must engage in bi-directional communication on a half-duplex link,
some turn around mechanisms must be in place to switch the roles of the sending and receiving devices.

1. Simplex
  • Signal flows in ONE direction.
  • Only one station transmit and the other receive.
2.Half-duplex
  • Each station can both transmit and receive but NOT at the same time.
3.Full-duplex
  • Both stations transmit and receive simultaneously
  • Link capacity is shared between the two devices either by 2 separate transmission path.
  • Channel capacity is divided for transmitting and receiving.
Multi- Point
  • Link three or more devices together through a single communication medium
  • For sharing a common channel, each device needs a way to identify itself and the device to 
which it wants to send information. The method used to identify senders and receivers is called addressing.
Three common types of multi-point topology:
  • Bus
  • Ring
  • Star

Sharing of channel’s capacity
1. Spatial sharing – all attached devices using the link simultaneously 2. Time sharing – devices take turn in using the link Bus Devices connected to a single linear cable called a trunk 

• Bus consists of a single linear cable called a trunk. • Data is sent to all computers on the trunk. Each computer examines EVERY packet on the wire to determine who the packet is for and accepts only messages addressed to them. • Bus is a passive topology. • Performance degrades as more computers are added to the bus. • Signal bounce is eliminated by a terminator at each end of the bus. • Barrel connectors can be used to lengthen cable. • Repeaters can be used to regenerate signals. • Usually uses Thinnet or Thicknet • both of these require 50 ohm terminator • good for a temporary, small (fewer than 10 people) network • But its difficult to isolate malfunctions and if the backbone goes down, the entire network goes down • Terminators should be applied to both ends of the longest path • Nodes connected to the bus cable by drop lines and taps 1. Drop lines – connection between a node and the main cable 2. Taps – connector either splices into the main cable or punctures the sheathing of a cable to 
create a contact with the metallic core Advantages:
  • Easy to use and understand
  • Less number of cable required
  • Inexpensive simple network
  • Easy to extend a network by adding cable with a repeater that boosts the signal
and allows it to travel a longer distance
Disadvantages:
  • Becomes slow by heavy network traffic with a lot of device because network do not
coordinate with each other to reserve times to transmit.
  • Difficult to Troubleshoot a bus because a cable break or loose connector will cause
reflections and bring down the whole network.

RING Devices are connected on a single circle of cable  
  • Computers are connected on a single circle of cable.
  • Usually seen in a Token Ring or FDDI (fiber optic) network.
  • Each computer acts as a repeater and keeps the signal strong => no need for repeaters on a 
ring topology.
  • No termination required => because its a ring.
  • Token passing is used in Token Ring networks.
  • The token is passed from one computer to the next, only the computer with the token can transmit.
  • The receiving computer strips the data from the token and sends the token back to the sending computer with an acknowledgement.
  • After verification, the token is regenerated.
  • Relatively easy to install, requiring ;minimal hardware.
Advantages:
  • One device cannot monopolize the network.
  • Continue to function after capacity is exceeded but the speed will be slow.
Disadvantages:
  • Failure of one device can affect the whole network.
  • Difficult to Troubleshoot.
  • Adding and removing devices distrupts the network.
STAR Devices are connected by cable segments to a centralized device (e.g., HUB)

  • Computers are connected by cable segments to a centralized hub.
  • Signal travels through the hub to all other computers.
  • Requires more cable.
  • If hub goes down, entire network goes down.
  • If a computer goes down, the network functions normally.
  • Most scalable and reconfigurable of all topologies.
Advantages:
  • The failure of a single device or cable doesn't bring bring down the entire network.
  • The Centralized networking equipment can reduce costs in the long run by making
network management much easier.
  • It allows several cable types in same network with hub.
  • The can accommodate multiple cable types.
Disadvantages:
  • Failure of the central device (HUB) causes the whole network failure.
  • It is slightly more expensive than using bus topology.
HIERARCHICAL (TREE) The most common topologies found in large corporations today
  • Often mirrors corporate structure.
  • Use Polling.
Advantages:
  • One fails, others can function independently.
HYBRID Combination of different Topologies.

Advantages:
  • Combine the benefits of several different types of topologies.
  • Workgroup efficiency and traffic can be customized.
Disadvantages:
  • Devices on one topology cannot be placed into another topology without some hardware changes
FREE
Like Hybrid Topology but no additional hardware required for changing data packet between topologies
LonWorks uses this type of topology Advantages:
  • Very easy to install.
Don't Forget To Say THANKS!!!

Tuesday 13 October 2015

What is OSI (Open Systems Interconnection) Model ?

Hello Friends, Today I am Telling you About OSI (Open Systems Interconnection) Model

What Is the OSI (Open Systems Interconnection) Model?


Layers of the OSI Model. 

Definition: The OSI model defines internetworking in terms of a vertical stack of seven layers. Upper layers of the OSI model represent software that implements network services like encryption and connection management. Lower layers of the OSI model implement more primitive, hardware-oriented functions like routing, addressing, and flow control.
Data communication in the OSI model starts with the top layer of the stack at the sending side, travels down the stack to the sender's lowest (bottom) layer, then traverses the physical network connection to the bottom layer on the receiving side, and up its OSI model stack.
The OSI model was introduced in 1984. Designed to be an abstract model and teaching tool, the OSI model remains a useful for learning about today's popular network technologies like Ethernet and protocols like IP.
Also Known As: Open Systems Interconnection (OSI) reference model, OSI seven layer model
Examples: Internet Protocol (IP) corresponds to the Network layer of the OSI model, layer three. TCP and UDP correspond to OSI model layer four, the Transport layer. Lower layers of the OSI model are represented by technologies like Ethernet. Higher layers of the OSI model are represented by application protocols like TCP and UDP.




OSI 7 Layers:

The Open Systems Interconnection (OSI) model is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers



Application Layer:

The top, or seventh, layer of the OSI model is the Application layer. Contrary to what its name implies, the Application layer does not include software applications, such as Microsoft Word or Firefox. Instead, Application layer services facilitate communication between software applications and lower layer network services so that the network can interpret an application’s request and, in turn, the application can interpret data sent from the network.
Through Application layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network.
For example, when you choose to open a Web page in Firefox, an Application layer protocol called HTTP (Hypertext Transfer Protocol) formats and sends your request from your client’s browser (a software application) to the server. It also formats and sends the Web server’s response back to your client’s browser.
Suppose you choose to view the Exhibits page at the Library of Congress’s Web site. You type
“www.loc.gov/index.html” in Firefox and press Enter. At that point, Firefox’s API (application program interface), a set of routines that make up part of the software, transfers your request to the HTTP protocol. HTTP prompts lower layer protocols to establish a connection between your computer and the Web server. Next, HTTP formats your request for the Web page and sends the request to the Web server. One part of the HTTP request includes a command that begins with “GET” and tells the server what page you want to retrieve. Other parts of the request indicate what version of HTTP you’re using, what types of graphics and what language your browser can accept, and what browser version you’re using, among other things.
After receiving your computer’s HTTP request, the Web server responsible for http://www.loc.gov (http://www.loc.gov) responds, also via HTTP. Its response includes the text and graphics that make up the Web page, plus specifications for the content contained in the page, the HTTP version used, the type of HTTP response, and the length of the page. However, if the Web page is unavailable, the host, http://www.loc.gov (http://www.loc.gov), sends an HTTP response containing an error message, such as “Error
404 – File Not Found.”
After receiving the Web server’s response, your workstation uses HTTP to interpret this response so that Firefox can present the http://www.loc.gov/index.html (http://www.loc.gov/index.html ) Web page in a format you’ll recognize, with neatly arranged text and images. Note that the information issued by one node’s HTTP protocol is designed to be interpreted by the other node’s HTTP protocol.
However, as you will learn in later sections, HTTP requests cannot traverse the network without the assistance of lower layer protocols.


Presentation Layer:


Protocols at the Presentation layer accept Application layer data and format it so that one type of application and host can understand data from another type of application and host.
In other words, the Presentation layer serves as a translator. If you have spent any time working with computer graphics, you have probably heard of the GIF, JPG, and TIFF methods of compressing and encoding graphics. MPEG and QuickTime are two popular methods of compressing and encoding audio and video data. The popular audio format MP3, for example, uses MPEG compression. It can turn a music track that would require 30 MB of space on a CD into a file no larger than 3 MB – or even smaller, if lower quality were acceptable. Two well-known methods of encoding text are ASCII and EBCDIC. In each of these examples, it is the Presentation layer protocols that perform the coding and compression.
They also interpret coded and compressed formats in data received from other computers.
In the previous example of requesting a Web page, the Presentation layer protocols would interpret the JPG files transmitted within the Web server’s HTTP response.
Presentation layer services also manage data encryption (such as the scrambling of passwords) and decryption. For example, if you look up your bank account status via the Internet, you are using a secure connection, and Presentation layer protocols will encrypt your account data before it is transmitted. On your end of the network, the Presentation layer will decrypt the data as it is received.


Session Layer:

Among the Session layer’s functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications. Session layer services also set the terms of communication by deciding which node communicates first and how long a node can communicate. Finally, the Session layer monitors the identification of session participants, ensuring that only the authorized nodes can access the session.
When you initiate a connection with your ISP, for example, the Session layer services at your
ISP’s server and on your computer negotiate the connection. If your data cable accidentally falls out of the wall jack, Session layer protocols on your end will detect the loss of a connection and initiate attempts to reconnect. If they cannot reconnect after a certain period of time, they will close the session and inform your client software that communication has ended.


Transport Layer:

Protocols in the Transport layer accept data from the Session layer and manage end‑to‑end delivery of data. That means they can ensure that the data is transferred from point A to point B reliably, in the correct sequence, and without errors. Without Transport layer services, data could not be verified or interpreted by its recipient. Transport layer protocols also handle flow control, which is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data. Dozens of different Transport layer protocols exist, but most modern networks, such as the Internet, rely on only a few. In the example of retrieving a Web page, a Transport layer protocol called TCP (Transmission Control
Protocol) takes care of reliably transmitting the HTTP protocol’s request from client to server and vice versa.



Network Layer:


The primary function of protocols at the Network layer, the third layer in the OSI model, is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver. Addressing is a system for assigning unique identification numbers to devices on a network. Each node has two types of addresses.
One type of address is called a network address. Network addresses follow a hierarchical addressing scheme and can be assigned through operating system software. They are hierarchical because they contain subsets of data that incrementally narrow down the location of
a node, just as your home address is hierarchical because it provides a country, state, ZIP code, city, street, house number, and person’s name. Network layer address formats differ depending on which Network layer protocol the network uses. Network addresses are also called network layer addresses, logical addresses, or virtual addresses. The second type of address assigned to each node is called a physical address,



Data Link Layer:


The primary function of protocols in the second layer of the OSI model, the Data Link layer, is to divide data they receive from the Network layer into distinct frames that can then be transmitted by the Physical layer. A frame is a structured package for moving data that includes not only the raw data, or “payload,” but also the senders and receiver’s network addresses, and error checking and control information. The addresses tell the network where to deliver the frame, whereas the error checking and control information ensure that the frame arrives without any problems.


Physical Layer:


The Physical layer is the lowest, or first, layer of the OSI model. Protocols at the Physical layer accept frames from the Data Link layer and generate signals as changes in voltage at the NIC. (Signals are made of electrical impulses that, when issued in a certain pattern, represent information.) When the network uses copper as its transmission medium, these signals are also issued over the wire as voltage. In the case of fiber optic cable, signals are issued as light pulses. When a network uses wireless transmission, the signals are sent from antennas as electromagnetic waves.

Don't Forget To Say THANKS !!!!