Posts

How to understand OSI model in Nepali.

Image
  https://www.youtube.com/watch?v=ImxCi2ec9qM OSI Model: 1) Application layer :  key word is : interaction between human using application like: browser, any application like chat software, zoom, teams etc 2) Presentation layer :  key word - translates the date in correct format  : Like: video file:mp4, avi | audio       file: mp3, wav | image file : jpeg, png, gif etc | document file : doc,.xls, txt etc 3) Session layer :  create and maintain the session - time | key word: = timeframe the bank website will close automatically in 5 mins. | facebook will close within 30 mins automatically. | For security we need sessions. 4) Transport layer:   source to destination delivery of data | key word : delivery of data | TCP and UDP          TCP : Transmission control protocol : Get Confirmation (reliable)| 3 way handshake | Phone call/ browsing the internet page. (TCP)          UDP : User Datagram Protocol : No Confirmation (Not reliable) live radio transmission | audio, video (real  time ap

How to do IP Subnetting Part 3?

Image
                                         How to do IP subnetting Part 3?

The company needs 48 hosts in each subnet. Given the network ID 192.168.0.0/24, how many subnets can they create?

Image
  How to do IP Subnetting part 2? To determine how many subnets can be created from the 192.168.0.0/24 network while accommodating 48 hosts in each subnet, let's follow these steps: Calculate the number of host bits needed: 48 hosts + 2 (network address and broadcast address) = 50 total addresses needed The smallest power of 2 that can accommodate 50 is 64 (2^6) So we need 6 host bits Determine the subnet mask: Original network is /24, so we have 8 bits available in the last octet We need 6 bits for hosts, so we can use 2 bits for subnetting New subnet mask will be /26 (24 + 2) Calculate the number of subnets: With 2 bits for subnetting, we can create 2^2 = 4 subnets Therefore, the company can create 4 subnets from the 192.168.0.0/24 network, each accommodating 48 hosts. The subnets will be: 192.168.0.0/26 (usable range: 192.168.0.1 - 192.168.0.62) 192.168.0.64/26 (usable range: 192.168.0.65 - 192.168.0.126) 192.168.0.128/26 (usable range: 192.168.0.129 - 192.168.0.190) 192.168.0.1

What are the differences between Classful IP address and Classless IP Address?

Image
  What are the differences between Classful IP address and Classless IP Address? Examples Classful Addressing: Class A: IP Range: 1.0.0.0 to 126.255.255.255, Example: 10.1.1.1, Subnet Mask: 255.0.0.0 Class B: IP Range: 128.0.0.0 to 191.255.255.255, Example: 172.16.0.1, Subnet Mask: 255.255.0.0 Class C: IP Range: 192.0.0.0 to 223.255.255.255, Example: 192.168.1.1, Subnet Mask: 255.255.255.0 Classless Addressing (CIDR): Example 1: 192.168.1.0/24, where /24 indicates the first 24 bits are the network portion, Subnet Mask: 255.255.255.0 Example 2: 10.0.0.0/8, where /8 indicates the first 8 bits are the network portion, Subnet Mask: 255.0.0.0 Example 3: 172.16.0.0/12, where /12 indicates the first 12 bits are the network portion, Subnet Mask: 255.240.0.0 Classful addressing divides IP addresses into fixed classes with predetermined ranges, leading to inefficiencies and wasted addresses. Classless addressing, or CIDR, allows for more flexible and efficient use of IP address space by using va

What is IP Subnetting?

Image
  What is IP Subnetting? IP subnetting is a process of dividing a larger network into smaller subnetworks to improve network performance, security, and address allocation efficiency. It involves using a subnet mask to determine which portion of an IP address identifies the network and which portion identifies the host.To solve the given problem: 1. Identify the network address: The IP address is 10.35.154.117, and the subnet mask is 255.240.0.0. 2. Convert the subnet mask to binary: 255.240.0.0 = 11111111.11110000.00000000.00000000 3. Determine the network and host portions: The first 12 bits (11111111.1111) represent the network, and the remaining 20 bits are for hosts. 4. Calculate the network address: 10.35.154.117 AND 255.240.0.0 = 10.32.0.0 5. Find the broadcast address: The broadcast address will have all host bits set to 1. 10.47.255.255 6. Determine the last valid host: The last valid host is one address before the broadcast address Therefore, the last valid host on

To increase the attachment file size limit in Exchange Server 2019

  https://www.youtube.com/watch?v=9hLxvwO1VCs&t=4s To increase the attachment file size limit in Exchange Server 2019 To increase the attachment file size limit in Exchange Server 2019, you can follow these steps: Check current limits: First, verify the current message size limits by running the following command in the Exchange Management Shell: Powershell Get-TransportConfig | Format-List MaxReceiveSize,MaxSendSize Increase the limits: Use the Set-TransportConfig cmdlet to increase both the MaxSendSize and MaxReceiveSize. For example, to set the limit to 50 MB: powershell Set-TransportConfig -MaxSendSize 50MB -MaxReceiveSize 50MB Note that you should set the limit about 33% higher than the actual desired attachment size to account for Base64 encoding. So for a 50 MB attachment limit, you may want to set it to around 67 MB. Restart Exchange services: For the changes to take effect immediately, restart the Exchange services using: powershell Get-Service *Exchange* | Where {$_.Displ

How to set up a Shared folder in Windows Server 2022?

Image
  Shared folder in Windows Server 2022 : 1.        Open Server Manager and navigate to File and Storage Services, then click on Shares 2.        Click on "Tasks" and select "New Share" to launch the New Share Wizard 3.        Choose "SMB Share - Quick" for general file sharing and click Next 4.        Select the location for your shared folder. You can choose an existing folder or create a new one by selecting "Type a custom path" and using the Browse button 5.        Provide a name for the share. By default, it will use the folder name, but you can change it if desired 6.        Configure share settings: 7.        Enable "Access-based enumeration" to only show files and folders users have permission to access 8.        Optionally, configure offline file caching and data encryption settings 9.        Set up permissions: 10.    Click on "Customize permissions" to modify the default NTFS permissions 11.    Disable inheritance an