jackprabha's blog

What’s DHCP? And why it’s recommended to use it? Imagine that you’re working as a SysAdmin for a large company with 500 desktop computers; you need to set to each desktop computer IP address, subnet mask, default gateway, DNS servers, and other network settings. How could you do that?


If you’ll try to perform this task manually you’re probably going to waste a lot of time on sitting on each computer 5-10 minutes, beside time, you can for example accidentally enter wrong IP address to few clients, or to type the same IP address to few clients too.


In order to solve these “problems” you can use Dynamic Host Configuration Protocol (or DHCP) in your network.


DHCP allows you  to manage the networks’ IP addresses scopes and other TCP/IP settings like DNS, Default Gateway, etc. from central place, this central place called DHCP server. Beside the management, if there’s any problem you don’t need to run between your clients, you just need to connect to your server and to check the DHCP settings, as I mentioned – the DHCP works from central place, so if there’s a problem, it’s probably from the server, so you know where to go in case of problem and your saving time.


Know more: what does lan mean


The DHCP server can provide easily IP addresses to clients automatically so you don’t even need to configure and set options in the client side, all you need is to setup DHCP server, configure scope options and some other TCP/IP settings in the server side and that’s it. You can provide to your clients IP addresses from the selected range that you’ve configured and some other TCP/IP options.


May 5 '20 · 0 comments · Tags: dhcp, what does lan mean

Without entering to the related technical information (DORA process) the DHCP client request from the DHCP server IP address for a while, the length of time that the DHCP client can use the dynamic IP address that the DHCP Server provided can be called lease, just like the name: lease means that the client “rent” an IP address for a specific time from the DHCP server, if the client wants to continue using the specific IP address the client needs to re-assign the address by renew the lease, this will happen before the expiration time of the lease if the client is still in the network.

More in depth, the DHCP service works by using the DORA (Discover, Offer, Request and Acknowledgment) process (you can trace on the whole process using a network monitor utility):

  1. DHCPDISCOVER – The client broadcast a DHCPDISCOVER packet in order to locate a DHCP server in the network, in some cases that the DHCP server isn’t in the same subnet of the client, you’ll need to configure in your network devices (usually routers) a DHCP Relay Agent, in order to transfer the DHCPDISCOVER packet to the DHCP server.
  2. DHCPOFFER – The DHCP server broadcast a DHCPOFFER packet to the client which includes an offer to use a unique IP address for the client.
  3. DHCPREQUEST – The client broadcast a DHCPREQUEST packet to the DHCP server with an answer, and “asks” from the server to “rent” the unique address that the server offer to her.
  4. DHCPACK – The DHCP server broadcast a DHCPACK packet to the client, in this packet the server acknowledge the request from the client to use the IP address, and provide to the client the IP address lease and other details such as DNS servers, default gateway, etc. if the server cannot provide the requested IP address or from some reasons the address is not valid the server sends DHCPNACK packet in stand of DHCPACK, more information about DHCPNACK is under the specific subject – DHCPNACK.
Apr 30 '20 · 0 comments · Tags: dhcp, dhcp server

In the space of streamlined IT services, a network operations center (NOC) is a centralized site where IT engineers can directly assist the efforts of remote monitoring and management (RMM) software. Experts from Convergence Labs Hyderabad explain that the NOC Engineers are on board to keep an observant eye over the entire monitored endpoints, and to ensure round the clock uptime for an MSP’s customers. Whether the MSP takes up an in-house NOC, outsources to a third-party provider, or redistribute a hybrid solution somewhere in the middle, the NOC’s key functions and responsibilities continue to be the same.


Know more: What is NOC?


Roles & Responsibilities of NOC Engineer


The responsibilities of NOC engineers and technicians include supervising each netflow, hop, server and endpoint connected to an MSP’s client networks. They examine infrastructure robustness, security and capacity, and make suitable modifications to ensure favorable network performance and organizational efficiency. Whenever MSP requires any action or intervention, NOC technicians can generate alerts or tickets that classify the issue based on its sternness, alert type, and some of the other criteria.

Engineers are categorized depending on “levels”, which designate expertise and problem-solving capability. In the case of a hardware breakdown, an alert may be allocated to a Level 1 technician initially — but after further inspection if the issue goes beyond the failed hardware, the alert may be escalated to a Level 2 or Level 3 engineers.

Apr 27 '20 · 0 comments · Tags: noc, what is noc

On the topic of choosing between an ink tank printer vs a laser printer, it really depends on what you’ll be printing.


Laser printers are great for documents and medium-quality color prints. Inkjet or ink tank printers provide better color depth and variance in comparison to laser printers.


Print Quality: if you’ll be printing more documents, web files like recipes and articles–then a laser printer is still better. But if you’ll be printing photos or need to print impressively colored presentation materials, an ink tank would be better.


Find more: HP Printer Repair


Print Economy: Laser printers and ink tank printers both have low operation costs. The only downside to ink tank printers is that if you don’t use the printer regularly, all that ink in the reservoir, cartridge, and tubes can dry up and cause clogging problems–just like any inkjet printer. Laser printers are better for those who don’t print as often.


Does ink dry in ink tank printers?

Yes, just like how ink dries up in cartridges that are not used for extended periods of time, so can ink dry up in an ink tank printer. Ink tank printers are inherently still inkjet printers so it inherits the same problems.

Computers are everywhere—networked in businesses, across corporations, internationally or at home. As technology becomes an integral part of everyday life, professionals with deep experience in computer networking are best equipped to handle the latest developments in a fast-evolving industry.


Are you your family and friends “go to” when they have computer issues? If you enjoy working with computers, troubleshooting issues, and solving tech-related problems, a computer networking degree could help you start the path to a rewarding career in technology.


Jobs you can get with a degree in computer networking

Computer networking professionals focus on the day-to-day support that keeps network systems running properly. This includes maintaining the software and hardware, monitoring the system for potential issues, analyzing problems, and creating plans to prevent or correct issues.


Computer networking professionals often work in fast-paced environment that can be challenging due to an organization’s dependence on computers and technology. However, many IT jobs offer competitive compensation based on the education, skills, and traits needed to succeed in the field. IT professionals may also find great personal satisfaction in creating solutions to difficult problems.


Know more; entry level network engineer pay


Technology touches almost every part of our lives, and computer networking jobs are in demand. According to the U.S. Bureau of Labor Statistics, the number of overall jobs in computer and information technology is expected to grow by 12% from 2018 to 2028, faster than the average across all U.S. occupations. There are a variety of jobs you can find with a degree in computer networking that may match your specific interests.

Because SD-WANs are software controlled, it is easier to add features and functions from a central location, while also reducing the need for edge appliances (e.g., WAN optimization and firewall boxes). SD-WANs delivered as a service over a private network also make it possible to deploy a global enterprise WAN without sourcing and procuring MPLS providers around the world.


MPLS never got the memo about the speed of business changing, because adding new locations can still take weeks, if not months. With SD-WAN, new locations can be brought up in days. What’s more, Aryaka’s Global SD-WAN encrypts traffic end-to-end, which isn’t offered with MPLS and may be an important compliance consideration.


Speed up your applications no matter where they are hosted. An SD-WAN, with built-in WAN optimization, improves performance for all mission-critical applications, hosted on-premises or in the cloud. And if you choose an SD-WAN delivered as a service over a private network, you can realize consistent application response times for users anywhere in the world, and sidestep the performance problems that plague SD-WANs that use Internet transport.

Apr 20 '20 · 0 comments · Tags: sd wan, mpls

After being a security partner for SD-WAN vendors, Palo Alto Networks is now a competitor in the SD-WAN sector with its $420 million purchase of CloudGenix. Palo Alto announced the all-cash deal on Tuesday, and it is expected to close in its fiscal fourth quarter once it clears the usual regulatory hurdles.


The deal for CloudGenix is notable on several fronts. Increased security by SD-WAN vendors has been one of the major trends over the past few years, which has generated business for Palo Alto Network's firewall virtual network functions.


CloudGenix was rumored to be on the market last year. The deal with Palo Alto Networks marked what could be more consolidation among the 60-plus vendors in the marketplace.


"This is the classic convergence between SD WAN and network security," said Lee Doyle, principal analyst at Doyle Research. "This gives Palo Alto an SD-WAN feature as part of its security offering. It gives them one of the leading independent SD-WAN players. It also gives Palo Alto CloudGenix's customer base and leading edge technology to incorporate into their offer."


Palo Alto Networks will integrate CloudGenix's cloud-managed SD-WAN products with its cloud-based Prisma Access security to accelerate the on-boarding of remote branches and retail stores. Palo Alto said the combination would extend the breadth of the Prisma Access SASE platform, address network and security transformation requirements, and accelerate the shift from SD-WAN to SASE. SASE, which was coined by Gartner last year, defines a sub-trend in SD-WAN, which includes integrating SD-WAN with cloud-based security applications.

Now that you know the great advantages of tracking computer usage, you should learn how to do it properly. This will help you take your work (or a private life) to a better, higher level. It’s a little hack that can change your life. Let’s take a look at the short list prepared by lifehacker:


DEFINE WHAT TO TRACK

As I already mentioned, when you track employees’ work, you have to be careful. If you breach their privacy and security, it may have legal consequences for you and your organization.


Know more: computer repair technician description


So the first step is to inform your employees or team that their work will be monitored. And the purpose of it is not to spy on them but to enhance their work and boost productivity. Then, discuss with all people what exactly you want to track. Which tasks, projects, tools, etc.


On the other hand, if you’re a parent caring for your child’s well-being, tracking web computer usage is a great way to protect them from the harmful influence of the internet. For example, you can block inappropriate sites and monitor child’s activity. It is a fantastic way to ensure their safety by not invading their privacy at the same time.

As cloud computing is taking center stage for different IT enabled business enterprises it is highly essential to define policies, procedures and service level agreements (SLA) in order to maximize the value of cloud for both the consumer and the service provider. SLA statements written must be measurable, achievable, relevant and timely and should remain specific for cloud services aimed at minimizing ambiguities for both the cloud consumer and the cloud service providers.


The cloud service models (IaaS, PaaS, SaaS, etc.) offer new paradigms of computing resources and IT enabled capabilities for all types of organizations. IT industry experts claim that over 80% of enterprises have adopted some cloud service in their organization. The key term ‘service’ in cloud computing creates the need to develop contracts named service level agreements (SLA) between the client organization and the cloud service provider (CSP). SLAs are used by companies for a long time, especially when the company hires third party service provider to manage some of their business operations. SLAs will ensure the consumer receives all the services availed as agreed by the provider and of course ensure money’s worth for the client.


Know more: Cloud SLA


Likewise, an organization deciding to hire cloud services for their IT needs, SLAs come into play to make sure the services offered by the CSP are delivered as promised. SLA has become a pre-requisite due to cloud business strategy and provides series of rules and directives that must be taken by cloud consumers to evaluate and negotiate terms with CSP. It describes a set of non-functional requirements of cloud services. An example of SLA can be the return of operations (RTO) in case of any service failure in the cloud.

Apr 14 '20 · 0 comments · Tags: cloud sla, sla, sla security

A Comprehensive List of The Best Online Computer Engineering Degree Programs With Comparison. Select The Right Course Based On Your Preferences:


Are you someone with an immense passion for computers? Do you like meddling with binaries and want to learn the art of turning 0’s and 1’s into legible information?


If you answered yes then a Computer Science Degree can be a great career path for you.


The current technology is advancing at an unprecedented rate. Many firms and industries are trying to one-up each other in terms of the advanced technology used. This indeed has exponentially increased the demand for a computer engineer.


Find more: computer engineering jobs


Computer Engineers are practically technological doctors. They diagnose technical issues and identify innovative solutions to solve them. They create the video games you play, the web application you use, or apply administrative and network security measures to protect data.
They are also artists who develop software solutions. Most of the popular software which we use in our day to day life like Facebook, Uber, and Tinder were all developed by computer engineers. They are the visionaries of the modern era in several ways.

Pages: «« « ... 5 6 7 8 9 ... » »»