Client / Server processes - Using Mail Server/Mail Client ============================================= -E-mail, the most popular network service. -e-mail requires several applications and services. -Two example Application layer protocols are Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP), shown in the figure. As with HTTP, these protocols define client/server processes. When people compose e-mail messages, they typically use an application called a Mail User Agent (MUA), or e-mail client. The MUA allows messages to be sent and places received messages into the client's mailbox, both of which are distinct processes. In order to receive e-mail messages from an e-mail server, the e-mail client can use POP. Sending e-mail from either a client or a server uses message formats and command strings defined by the SMTP protocol. Usually an e-mail client provides the functionality of both protocols within one application. Mail User Agent (MUA), e-mail client:like Microsoft Outlook or Thunderbird -Mail Server: hmailserver. -MUA: Thunderbird. hMailServer is a free, open source, e-mail server for Microsoft Windows. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems.
Views: 41661 KOYA IT
In this lesson I'll show you in simple, short way how to install windows server 2012 standard edition on Oracle Virtual Box Windows Server 2012, codenamed “Windows Server 8″, is the sixth release of Windows Server. It is the server version of Windows 8 and succeeds Windows Server 2008 R2. Two pre-release versions, a developer preview and a beta version, were released during development. The software was generally available to customers starting on September 4, 2012. Review system requirements: Processor: Minimum: 1.4 GHz 64-bit processor Ram: Minimum: 512 MB Disk Space: Minimum: 32 GB Other requirements: DVD drive Super VGA (800 x 600) or higher-resolution monitor Keyboard and Microsoft® mouse (or other compatible pointing device) Internet access Please, Notice only 64 Bit processors supported
Views: 3807 KOYA IT
GNS3 -GNS3 Stands for Graphical Network Simulator -GNS3 is an open source software. In this lecture I'll give you information about what is GNS3? Who can use it? How to download & install GNS3? Download the IOS for 3700 router: https://drive.google.com/file/d/0B81y-HaXNqDDZ2htVFZWaVdKQ28/view?usp=sharing
Views: 2404 KOYA IT
GNS3: ======== Installing new version for GNS3, and exploring the great new updates, it became more faster and flexiable in use Download the program from the official website for GNS3: http://www.gns3.com/
Views: 215 KOYA IT
Download Cisco Configuration Professional (CCP): https://drive.google.com/file/d/0B81y-HaXNqDDN2lqZFZGYTM2VGM/view?usp=sharing HTTP ___________________________________________________ The Hypertext Transfer Protocol (HTTP), one of the protocols in the TCP/IP suite, was originally developed to publish and retrieve HTML pages and is now used for distributed, collaborative information systems. HTTP is used across the WWW for data transfer and is one of the most used application protocols. HTTP specifies a request/response protocol. When a client, typically a web browser, sends a request message to a server, the HTTP protocol defines the message types the client uses to request the web page and also the message types the server uses to respond. The three common message types are GET, POST, and PUT. GET is a client request for data. A web browser sends the GET message to request pages from a web server. As shown in the figure, once the server receives the GET request, it responds with a status line, such as HTTP/1.1 200 OK, and a message of its own, the body of which may be the requested file, an error message, or some other information. POST and PUT are used to send messages that upload data to the web server. For example, when the user enters data into a form embedded in a web page, POST includes the data in the message sent to the server. PUT uploads resources or content to the web server. Although it is remarkably flexible, HTTP is not a secure protocol. The POST messages upload information to the server in plain text that can be intercepted and read. Similarly, the server responses, typically HTML pages, are also unencrypted. For secure communication across the Internet, the Secure HTTP (HTTPS) protocol is used for accessing or posting web server information. HTTPS can use authentication and encryption to secure data as it travels between the client and server. HTTPS specifies additional rules for passing data between the Application layer and the Transport Layer. ============================================== Cisco Configuration Professional CCP: __________________________________ Cisco Configuration Professional is offered in two versions Cisco Configuration Professional offers smart wizards and advanced configuration support for LAN and WAN interfaces, Network Address Translation (NAT), stateful and application firewall policy, IPS, IPSec and SSL VPN, QoS, and Cisco Network Admission Control policy features. IT managers can easily organize and manage multiple routers at a single site. Cisco Configuration Professional Offers: Monitoring of router status Troubleshooting of WAN and VPN connectivity issues Cisco Configuration Professional Express is a GUI-based embedded device management tool for Cisco Integrated Services Routers (ISRs). It is available on the flash of the router and used for bootstrapping and basic configurations. Cisco Configuration Professional Express Offers: Basic configuration of router WAN and LAN interfaces Hostname, Dynamic Name Server (DNS), and Dynamic Host Configuration Protocol (DHCP) configurations User Management for the router Configuration of plug-n-play server Dashboard, basic troubleshooting, and command line interface (CLI) tool With Cisco Configuration Professional you can configure and monitor your Cisco routers without using the Cisco IOS Software CLI. If you are not an expert with Cisco IOS Software, the Cisco Configuration Professional GUI can help you in your day-to-day operations. The application: Provides easy-to-use smart wizards Assists you through comprehensive online and video help
Views: 1166 KOYA IT
DHCP service: ============================================ DHCP stands for Dynamic Host Configuration Protocol. DHCP allows a host to obtain an IP address dynamically when it connects to the network. The DHCP server chooses an address from a configured range of addresses called a pool and assigns ("leases") it to the host for a set period. Rather than have the network administrator assign IP addresses for each workstation, it is more efficient to have IP addresses assigned automatically using DHCP. If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is especially helpful with mobile users that come and go on a network. DHCP can pose a security risk because any device connected to the network can receive an address.. This risk makes physical security an important factor when determining whether to use dynamic or manual addressing. Dynamic and static addressing both have their places in network designs. Many networks use both DHCP and static addressing. DHCP is used for general purpose hosts such as end user devices, and fixed addresses are used for network devices such as gateways, switches, servers and printers.
Views: 540 KOYA IT
Download c7200 IOS: https://drive.google.com/file/d/0B81y-HaXNqDDNGFjVFhSVG5Ccms/view?usp=sharing Download Putty: https://drive.google.com/file/d/0B81y-HaXNqDDSkg1cGZWRDNHNms/view?usp=sharing Configuring the Router using telnet protocol ============================================== The idea from creating loopback adapter is to connect the real machine as network device or a host within GNS3 topology the Application layer uses protocols that are implemented within applications and services All three components may be used by a single executable program and may even use the same name. For example, when discussing "Telnet" we could be referring to the application, the service, or the protocol. There are several ways to access the CLI environment. The most usual methods are: -Console -Telnet or SSH -AUX port Telnet, a terminal emulation protocol, is used to provide remote access to servers, and networking devices (routers, switches) To support Telnet client connections, the server runs a service called the Telnet daemon. The vty lines allow access to a router via Telnet. By default, many Cisco devices support five VTY lines that are numbered 0 to 4. A password needs to be set for all available vty lines. The same password can be set for all connections. While the Telnet protocol supports user authentication, it does not support the transport of encrypted data. All data exchanged during a Telnet sessions is transported as plain text across the network. This means that the data can be intercepted and easily understood. If security is a concern, the Secure Shell (SSH) protocol offers an alternate and secure method for server access. SSH provides the structure for secure remote login and other secure network services. It also provides stronger authentication than Telnet and supports the transport of session data using encryption. As a best practice, network professionals should always use SSH in place of Telnet, whenever possible.
Views: 996 KOYA IT
Oracle Database ============================================== In this lesson you will learn what is oracle database, the hardware and hard disk space requirements, how to download oracle database from the official website for oracle corporation and the last step installing oracle database on your machine. It's ORDBMS "Object Relational Database Management System" Oracle Database Has been written in Assembly language, C, C++ Co founders: Larry Ellison and two friends and former co-workers, Bob Miner and Ed Oates. Oracle Database Available in Multilingual that’s mean it support many languages. License is not free, “Proprietary”. Development status for Oracle Database still Active. the first commercially available RDBMS was Oracle, released in 1979 by Relational Software, now Oracle Corporation.
Views: 338 KOYA IT