Showing posts with label Tips. Show all posts
Showing posts with label Tips. Show all posts

Mar 11, 2013

How to configure my AP work in WDS repeater mode

How to configure my AP work in WDS repeater mode Note:
1. Your root router must support WDS feature.
2. Make sure your Access Point’s IP address is different from IP address of root router, but the IP address should be in same IP segment.
 
The steps are followings:
  1. Type in http://192.168.0.254 in address bar in your web browser, then press Enter.
   How to configure my AP work in WDS repeater mode
  1. Input username and password in pop-up, both of them are admin. Then click OK to login management page.
   How to configure my AP work in WDS repeater mode
  1. Change your LAN IP address of access points to avoid IP conflict.
      How to configure my AP work in WDS repeater modeHow to configure my AP work in WDS repeater mode

  1. Click Radio SettingàMode Setting in the gray menu on the left, select WDS AP Repeater as work mode
 How to configure my AP work in WDS repeater mode How to configure my AP work in WDS repeater mode
  1. Click Scan button in the main page, then the AP list appears, please find SSID of your root router, and select it, then the Mac address of your root router will be automatically filled the blanks.
  How to configure my AP work in WDS repeater mode
6. Then please keep security settings be the same with the root router. Then click Apply to save the settings.
How to configure my AP work in WDS repeater mode    

How To Set WDS (Repeater Function) on WNDR3300/WNR3500?

Below are instructions how to set the repeating function on WNDR3300.  In this example, we will be using the WNDR3300 as the Base station and we’ll use the WNR3500 as a repeater.  Please note that WNDR3300 only supports WDS on 802.11N mode.
  1. Login to WNDR3300 administration page (e.g. www.routerlogin.net or 192.168.1.1).
  2. Go to Wireless settings menu and set the following.
                - SSID (ex. 3300n)
                - Mode (ex. Up to 270 Mbps at 2.4 GHz)
                - 11N Channel (ex. 6)
                - Security options (ex. WEP or None)
                - Security Encryption key

    After applying the settings, you should have similar settings like below.
    Image
  3. Go to Wireless Repeating Function menu of WNDR3300 and set the following:
                - Select "Enable Wireless Repeating Function"
                - Select "Wireless Base Station"
                - Enter MAC address of the device you'll be using as a repeater

    After applying the settings, you should have similar settings like below.
    Image
  4. On the device that will be used as a repeater, login and set wireless settings the same as base station (See Step 2).  Below is a screenshot of WNR3500 configured as a repeater.
    Image
  5. Go to the Wireless Repeating Function menu of WNR3500 and set the following:
                - Select "Enable Wireless Repeating Function"
                - Set WNR3500 as your Repeater by selecting "Wireless Repeater"
                - Enter IP address of the device you’ll be using as a repeater.  Note: Make sure to use an IP address that is within the same range of the base station.
                - Enter the MAC address of the device you'll be using as a repeater

    After applying the settings, you should have similar settings like below.
    Image

    The wireless repeating function of the WNDR3300 (Base station) and WNR3500 (Repeater) are now set.

Feb 22, 2013

How do I configure wireless Access Point to Point to Point Bridge mode?

Definition: In Wi-Fi networking, Bridge mode allows two or more wireless access points (APs) to communicate with each for the purpose of joining multiple LANs.
Some wireless bridges support only a single point-to-point connection to another AP. Others support point-to-multipoint connections to several other APs. This article is about to setup Point to Point Bridge.
Note:
1. You need configure both of your two wireless access points (TL-WA501G/TL-WA601G) to Bridge mode by following below steps in order to setup a Bridge mode based wireless network.
2. Before the configuration, please check and write down the Wireless MAC Address of the Access Points.
In the bottom of the device, there is a label with the MAC address printed.
Configuring the access point (TL-WA501G/TL-WA601G)
Step 1 Connect your computer to TL-WA501G/TL-WA601G, and then log into the Web-based Utility by entering the IP address 192.168.1.1 into Web Browser.
If you can not log into the Web-based Utility, please follow the instruction How do I log into the Web-based Utility of TL-WA501G/TL-WA601G for a try. 
Step 2 Change the LAN IP address of the access point (TL-WA501G/TL-WA601G) to avoid IP conflict if necessary. This is due to your own network, please refer to Why & How do I change the IP address of TL-WA501G/TL-WA601G for some detailed information.
After changed the IP address of your access point, you need re-log into it by using the new IP address. And please note that the IP addresses of the two access points can not be the same in your network.
Step 3 Configure your TL-WA501G/TL-WA601G to Point to Point Bridge mode.
1. Click Wireless -> Wireless Mode on the left, select Bridge (Point to Point). And then enter the MAC address of the other access point (TL-WA501G/TL-WA601G) which you want to connect into the MAC of AP box.
Note: Very two numbers should be separated by the character ‘-‘, and please enter the correct MAC address of another access point which you want to connect into the box, otherwise, the wireless connection will be can not set up.
2. After done the configuration, enable Reboot and click on Save, the
settings will take effect after the device reboot.
After done the below procedure in both of the two wireless access
point (TL-WA501G/TL-WA601G), the Bridge mode based wireless
connection will be setup successfully.
Additional information:
There is an option called With AP Mode in the setting page, if you enable it, the access point (TL-WA501G/TL-WA601G) also can work in AP mode at the same time when it had been configured to Bridge mode. This means that you can connect other wireless clients to this access point when it had been configured to Bridge mode.
And if you do not enable it, you can not connect any wireless client to this access point when it had been configured to Bridge mode.

Cisco Discovery Protocol (CDP)

CDP is a Cisco proprietary data link layer protocol that operates over any medium that supports the Subnetwork Access Protocol (SNAP) encapsulation (LANs, most WANs, and ATM). It is important to understand that because CDP operates at Layer 2 (data link layer of the OSI model), it functions independently of the Layer 3 (network) protocol (IP or IPX). CDP is on by default, but it can be disabled. In many cases, CDP is disabled on dial backup links, such as ISDN, so as to not keep the link up constantly. Chapter 4 of Interconnecting Cisco Network Devices provides more detailed information about CDP.
To display what CDP has discovered, issue this command:
Router#show cdp [entry | interface | neighbors | traffic]
This command offers several options. For purposes here, look at the interface and neighbors options only, but feel free to become familiar with the other options.
The first option to look at is the interface option:
Router#show cdp interface [ethernet | loopback | null | serial] [number]
The first option on this command is to specify the type of interface that you want to see CDP information on. The last option is to specify the interface number. Example 7-44 uses the show cdp interface command to examine R5's Serial 0 interface.

Example 7-44. show cdp interface serial 0 Command Output

R5#show cdp interface serial 0
Serial0 is up, line protocol is up
  Encapsulation HDLC
  Sending CDP packets every 60 seconds
  Holdtime is 180 seconds
R5#
It does not give a whole lot of information, but it is a "quick and dirty" way of seeing some CDP information. The second option of the show cdp command that we are going to look at is this:
Router#show cdp neighbors [bri | loopback | null | serial | tokenring | detail]
As you can see, this command provides the option to see CDP information by interface, but the last option, detail, gives a complete summary of all Cisco devices that CDP was capable of discovering and displays information about those devices. Example 7-45 displays the output of the show cdp neighbors detail command.

Example 7-45. show cdp neighbors detail Command Output

R5#show cdp neighbors detail
-------------------------
Device ID: R3
Entry address(es):
  IP address: 192.168.35.3
Platform: cisco 2500, Capabilities: Router
Interface: Serial0, Port ID (outgoing port): Serial1
Holdtime : 164 sec

Version :
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-JS-L), Version 11.2(17), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 04-Jan-99 17:27 by ashah

R5#
The first piece of information that the output shows is the device ID, usually the hostname of the device. As you can see, R5 has discovered R3.
The second field is the IP address of R3. This is very useful if you have several routers and you are not sure of the IP address of the desired router. You can use this command to find that instead of trying to track down a network map.
The third field is the platform and capability. R3 is a 2500 and is a router. If you issue this same command on R1, you will see the Catalyst 1900 switch in the summary as well.
The fourth item is the interface on R5 that the device was discovered and the port on R3 to which R5 is connected. The command also displays the Cisco IOS Software version of your neighbor.
You will see this command revisited throughout the rest of the book, to demonstrate the different ways to utilize this command to help configure and troubleshoot the network.
Now that you have all the interfaces configured and have established IP connectivity, you can move on to the next chapter and start configuring the different routing protocols.

Creating and Configuring Loopback Interfaces

A loopback interface is a virtual interface that resides on a router. It is not connected to any other device. Loopback interfaces are very useful because they will never go down, unless the entire router goes down. This helps in managing routers because there will always be at least one active interface on the routers, the loopback interface.
To create a loopback interface, all you need to do is enter configuration mode for the interface:
Router(config)interface loopback {number}
The only option on this command is to specify a number between 0 and 2,147,483,647. Cisco IOS Software gives you plenty of loopback interfaces, if you want to use all of them. When entering this command, Cisco IOS Software automatically creates the loopback interface, places you into interface configuration mode, and removes the interface from shutdown mode. When that is complete, you only need to assign an IP address to the interface. The criteria for the IP addresses of the loopback interfaces is as follows:
  • Create loopback interfaces on all routers using IP address 192.169.X. X/24 (where X is the router number). So, R1 would have a loopback address of 192.169.1.1/24, R2 would be 192.169.2.2/24, and so on.
Because you are already on R6, create and configure the loopback interface on R6; then go to R1, R2, and so on, and create and configure all the loopback interfaces and assign appropriate IP addresses. Example 7-42 takes you through the process on R6.

Example 7-42. R6 Loopback Interfaces Configuration

R6(config)#interface loopback 0
R6(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
R6(config-if)#ip address 192.169.6.6 255.255.255.0
Because the router automatically removes the loopback from shutdown state, you receive the console message indicating that the interface is up.
Now configure the rest of the routers, starting with R1. Don't forget to save the running-config to NVRAM (startup-config) before leaving the routers. See Example 7-43.

Example 7-43. Loopback Interface Configuration

R6#<ctrl-shft-6><x>
    Termserver#1
[Resuming connection 1 to r1 ... ]
[OK]
__________________________________________________________________

R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface loopback 0
%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
R1(config-if)#ip address 192.169.1.1 255.255.255.0
R1(config-if)#end
%SYS-5-CONFIG_I: Configured from console by console
R1#copy running-config startup-config
Building configuration...
[OK]
R1#<ctrl-shft-6><x>
Termserver#2
 [Resuming connection 2 to r2 ... ]
____________________________________________________________________

R2#
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface loopback 0
R2(config-if)#ip address 192.169.2.2 255.255.255.0
R2(config-if)#end
R2#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
R2#<ctrl-shft-6><x>
    Termserver#3
[Resuming connection 3 to r3 ... ]
[OK]
____________________________________________________________________

R3#config t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#interface loopback 0
%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
R3(config-if)#ip address 192.169.3.3 255.255.255.0
R3(config-if)#end
R3#copy running-config startup-config
Building configuration...
[OK]
R3#<ctrl-shft-6><x>
    Termserver#4
[Resuming connection 4 to r4 ... ]
____________________________________________________________________

R4#config t
R4(config)#interface loopback 0
%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
R4(config-if)#ip address 192.169.4.4 255.255.255.0
R4(config-if)#end
R4#copy running-config startup-config
Building configuration...
[OK]
R4#<ctrl-shft-6><x>
Termserver#5
[Resuming connection 5 to r5 ... ]
____________________________________________________________________

R5#config t
Enter configuration commands, one per line. End with CNTL/Z.
R5(config)#interface loopback 0
%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to up
R5(config-if)#ip address 192.169.5.5 255.255.255.0
R5(config-if)#end
R5#copy running-config startup-config
Building configuration...
[OK]
R5#
Everything looks okay. A router interface description is not necessary here because no other type of device can connect to a loopback interface. Now that you have configured all the interfaces and have IP connectivity, you should familiarize yourself with the Cisco Discovery Protocol (CDP). CDP is an information-gathering tool that enables you to discover directly connected Cisco devices and their network layer addresses.

Configuring Token Ring Interfaces

Token Ring interfaces have similar configuration tasks to Ethernet, but the technologies are very different. For lab purposes, those differences are out of the scope of this book.
The only configuration difference in Token Ring versus Ethernet interfaces is that, on Token Ring, you need to specify a ring speed, either 4 or 16 Mbps. Begin by reviewing the routers that you will be configuring as Token Ring, as shown in Figure 7-6.
07fig06.gif Figure 7-6 Router Interfaces to Configure as Token Ring
To set the ring speed, you must be in interface configuration mode for the Token Ring interface and must use this command:
Router(config-if)#ring-speed {4 |16}
As mentioned earlier, Token Ring supports two speeds: 4 and 16 Mbps. For this lab, use 16 Mbps. For Token Ring to operate correctly, every device belonging to a certain Ring must be configured for the same ring speed. After you set the speed, you can assign an IP address to the interface. Example 7-40 completes the commands on R5.

Example 7-40. R5 Token Ring Interface Configuration

R4#<ctrl-shft-6><x>
    Termserver#5
[Resuming connection 5 to r5 ... ]

R5#config t
Enter configuration commands, one per line. End with CNTL/Z.
R5(config)#interface tokenRing 0
R5(config-if)#ring-speed 16
R5(config-if)#ip address 192.168.50.5 255.255.255.0
R5(config-if)#$iption This interface does not connect with another IP device
R5(config-if)#no shutdown
R5(config-if)#
%LINK-5-CHANGED: Interface TokenRing0, changed state to initializing
R5(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface TokenRing0, changed state to up
R5(config-if)#
%LINK-3-UPDOWN: Interface TokenRing0, changed state to up
R5(config-if)#
Example 7-40 shows a console message a little differently than on other interfaces. "%LINK-5-CHANGED: Interface TokenRing0, changed state to initializing" means that the router is trying to insert the Token Ring into the main network ring. If that is successful, you will get the interface up and line protocol up messages. This looks good, so save the configuration and complete R6. See Example 7-41.

Example 7-41. Token Ring Interface Configuration on R6

R5#copy running-config startup-config
Building configuration...
[OK]
R5#<ctrl-shft-6><x>
    Termserver#6
[Resuming connection 6 to r6 ... ]

R6#config t
Enter configuration commands, one per line. End with CNTL/Z.
R6(config)#interface tokenRing 0
R6(config-if)#ring-speed 16
R6(config-if)#ip address 192.168.60.6 255.255.255.0
R6(config-if)#$iption This interface does not connect with another IP device
R6(config-if)#no shutdown
R6(config-if)#
%LINK-5-CHANGED: Interface TokenRing0, changed state to initializing
R6(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface TokenRing0, changed state to up
R6(config-if)#
%LINK-3-UPDOWN: Interface TokenRing0, changed state to up
R6(config-if)#
Everything looks good. Next you will learn how to create and configure loopback interfaces.

Configuring Ethernet Interfaces

The configuration tasks for Ethernet interfaces are quite simple. In fact, you only need to assign the IP address and remove the interface from shutdown mode. Because the configuration tasks are so straightforward, an overview of Ethernet technology is not really necessary here. Begin with a review of the routers that have Ethernet interfaces that you will need to configure. Figure 7-5 illustrates the Ethernet interfaces on the routers.
07fig05.gif Figure 7-5 Ethernet Routers
Start with configuring R1, then configure R2, and go up to R4. To assign the IP address and remove the interface from shutdown mode, you need to be in interface configuration mode for the Ethernet interface. Example 7-34 takes you through the process of configuring the Ethernet interface on R1. Refer to Figure 7-5 for the interface number, IP address, and subnet mask.

Example 7-34. R1 Ethernet Configuration

R5#<ctrl-shft-6-x>
    Termserver#1
[Resuming connection 1 to r1 ... ]

R1#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#interface ethernet0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#description This interface connects to R2's E0
R1(config-if)#no shut
R1(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
R1(config-if)#
R1#
%SYS-5-CONFIG_I: Configured from console by console
R1(config-if)#
%LINK-3-UPDOWN: Interface Ethernet0, changed state to up
R1's Ethernet 0 came up fine, so go to R2. Example 7-35 demonstrates the steps in configuring R2's Ethernet interfaces.

Example 7-35. R2 Ethernet Interface Configuration

R1#copy running-config startup-config
Building configuration...
[OK]
R1#<ctrl-shft-6><x>
    Termserver#2
[Resuming connection 2 to r2 ... ]

R2#
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface ethernet 0
R2(config-if)#ip address 192.168.1.2 255.255.255.0
R2(config-if)#description This interface connects to R1's E0
R2(config-if)#no shutdown
R2(config-if)#
1d17h: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up
1d17h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state
to up
R2(config-if)#
R2(config-if)#exit
R2(config)#interface ethernet 1
R2(config-if)#ip address 192.168.2.2 255.255.255.0
R1(config-if)#description This interface does not connect with another IP device
R2(config-if)#no shutdown
R2(config-if)#
1d17h: %LINK-3-UPDOWN: Interface Ethernet1, changed state to up
1d17h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1, changed state
to up
R2(config-if)#
Both Ethernet interfaces came up. You should be capable of pinging R1's Ethernet 0 interface for R2, as demonstrated in Example 7-36.

Example 7-36. R2 to R1 ping Results

R2(config-if)#end
R2#ping 192.168.1.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 1/1/1 ms
R2#
Okay, R1 and R2 have IP connectivity. You can verify that Ethernet 1 is functional by looking at the interface. Example 7-37 shows the output of the show interfaces command, which displays all of R2's interfaces; however, only the Ethernet interfaces are of interest for this part of the lab.

Example 7-37. show interfaces Command Output on R2

R2#show interfaces
Ethernet0 is up, line protocol is up
  Description: This interface connects to R1's E0
  Hardware is QUICC Ethernet, address is 0010.7bf9.4912 (bia 0010.7bf9.4912)
  Internet address is 192.168.1.2/24
  MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
  Encapsulation ARPA, loopback not set, keepalive set (10 sec)
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 00:00:20, output 00:00:06, output hang never
  Last clearing of "show interface" counters never
  Queueing strategy: fifo
  Output queue 0/40, 0 drops; input queue 0/75, 0 drops
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     41 packets input, 4110 bytes, 0 no buffer
     Received 36 broadcasts, 0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     0 input packets with dribble condition detected
     159 packets output, 16101 bytes, 0 underruns
     0 output errors, 0 collisions, 1 interface resets
     0 babbles, 0 late collision, 0 deferred
     0 lost carrier, 0 no carrier
     0 output buffer failures, 0 output buffers swapped out
Ethernet1 is up, line protocol is up
  Hardware is QUICC Ethernet, address is 0010.7bf9.4913 (bia 0010.7bf9.4913)
  Description: This interface does not connect with another IP device
  Internet address is 192.168.2.2/24
  MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
  Encapsulation ARPA, loopback not set, keepalive set (10 sec)
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 00:00:23, output 00:00:09, output hang never
  Last clearing of "show interface" counters never
  Queueing strategy: fifo
  Output queue 0/40, 0 drops; input queue 0/75, 0 drops
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     19 packets input, 1729 bytes, 0 no buffer
     Received 19 broadcasts, 0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     0 input packets with dribble condition detected
     136 packets output, 13770 bytes, 0 underruns
     0 output errors, 0 collisions, 1 interface resets
     0 babbles, 0 late collision, 0 deferred
     0 lost carrier, 0 no carrier
     0 output buffer failures, 0 output buffers swapped out
 --More--
The most important information right now is to see that both interfaces are up. This signifies that link keepalives are being exchanged between the interfaces and the switch. No other devices exist off Ethernet 1, so you cannot verify connectivity. However, because both interfaces are up, you can assume that they are configured and working properly.
Example 7-38 consolidates the configuration of both R3 and R4 to save time. Make sure that you see the console messages stating that the interfaces are up, but there is no need to ping anything at this point. Be sure to look at the subnet mask on R4's Ethernet 0. It has a mask of /27. That is a 255.255.255.224 mask in decimal notation.

Example 7-38. R3 and R4 Ethernet Configuration

R2#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
R2#<ctrl-shft-6><x>
    Termserver#3
[Resuming connection 3 to r3 ... ]

R3#config t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#interface ethernet 0
R3(config-if)#ip address 192.168.3.3 255.255.255.0
R3(config-if)#description This interface does not connect with another IP device
R3(config-if)#no shutdown
R3(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
R3(config-if)#
%LINK-3-UPDOWN: Interface Ethernet0, changed state to up
R3(config-if)#end
R3#
%SYS-5-CONFIG_I: Configured from console by console
R3#copy running-config  startup-config
Building configuration...
[OK]
R3#<ctrl-shft-6><x>
    Termserver#4
[Resuming connection 4 to r4 ... ]

R4#config t
Enter configuration commands, one per line. End with CNTL/Z.
R4(config)#interface  ethernet 0
R4(config-if)#ip address 192.168.4.4 255.255.255.224
Bad mask /27 for address 192.168.4.4
R4(config-if)#
Notice the error message "Bad mask /27 for address 192.168.4.4." Why is /27 (or 255.255.255.2250) a bad mask? In IP subnetting, you cannot use the first group of IP addresses or the last group of a subnetted address space. Does 192.168.4.4 fall into the first group of addresses? To find out, break up the /27 bit mask (255.255.255.224). The result is eight different groups of IP addresses:
  • 0 to 31
  • 32 to 63
  • 64 to 95
  • 96 to 127
  • 128 to 159
  • 160 to 191
  • 192 to 123
  • 224 to 255
The address of 192.168.4.4 does fall into the first group. Cisco has a command that will overcome this limitation:
Router(config)#ip subnet-zero
There are no options on this command, and it is executed under global configuration mode. This command enables you to use the first and last groups of a subnetted address space. Example 7-39 uses this command to configure R4.

Example 7-39. R4 Configuration for ip subnet-zero

R4(config-if)#exit
R4(config)#ip subnet-zero
R4(config)#interface ethernet 0
R4(config-if)#ip address 192.168.4.4 255.255.255.224
R4(config)-if)#$cription This interface does not connect with another IP device
R4(config-if)#no shutdown
R4(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
R4(config-if)#
%LINK-3-UPDOWN: Interface Ethernet0, changed state to up
R4(config-if)#end
%SYS-5-CONFIG_I: Configured from console by console
R4#copy running-config startup-config
Building configuration...
[OK]
R4#
You get no error messages this time. The IP address successfully is assigned to the interface and is removed from the shutdown state. Console messages indicate that the interface and line protocol for Ethernet 0 are up. The configuration is saved, and you are ready to configure the Token Ring interfaces on R5 and R6.

Configuring Point-to-Point Serial Interfaces

The point-to-point serial link is a little different than the Frame Relay serial link. As you recall, Frame Relay is used in many cases in a point-to-multipoint environment. To create a point-to-point connection between two routers, you can use other types of WAN encapsulations, such as HDLC, PPP, and SLIP. For a complete review of these encapsulations, refer to Chapter 11 of the ICDN book. We will use the default serial encapsulation, which is HDLC.
For two serial interfaces to communicate, you must provide the clock rate. The clock rate provides bit synchronization and has other uses that are beyond the scope of this chapter's purposes. The device that provides this clock rate is the data circuit-terminating equipment (DCE). The other device is denoted as the data terminal equipment (DTE). In the real world, the router is the DTE. The telecom equipment, such as the Frame Relay switch, is the DCE. Because the lab scenario bypasses the telecom equipment, you need to specify which router is the DTE and which one is the DCE; you also need to provide the clock rate. To bypass the telecom equipment, you need to directly connect the routers with a DTE–DCE crossover cable. Each end of this cable is labeled as DTE or DCE. Whichever router is plugged into the DCE end of the cable will need to provide the clock rate. In the Frame Relay network, the Frame Relay switch is the DCE, so none of the Frame Relay routers needs to provide clock rate. For more information on WAN serial cabling and signaling, refer to Chapter 2 of Interconnecting Cisco Network Devices from Cisco Press.
First, review the routers that you are going to use to configure a point-to-point serial connection. Figure 7-4 shows routers R3 and R5. This is the only point-to-point connection in the lab.
07fig04.gif Figure 7-4 Point-to-Point Serial Connection
In the figure, you can see the R5 has been cabled as the DCE, so it will need to supply the clock rate.
Begin by configuring the serial link and assign IP addresses to the interfaces. Start with R5.
You last configured R2, so you need to go back to the terminal server and resume the connection to R5. When there, you need to go into global configuration mode and then into the appropriate interface configuration. For R5, that would be Serial 0. Example 7-26 walks you through these initial configuration steps.

Example 7-26. R5 Serial Configuration

R2#
R2#<crtl-shft-6-x>

    Termserver#5
[Resuming connection 5 to r5 ... ]

R5#config t
Enter configuration commands, one per line. End with CNTL/Z.
R5(config)#interface serial 0
R5(config-if)#
Now that you are in interface configuration mode for R5's Serial 0, you can execute the necessary configuration commands. The first thing to do is make the encapsulation type HDLC for the interface. Because HDLC is the default encapsulation method, you really don't need to execute the command. However, just for the sake of practice, and so that you understand that there is a data link layer configuration command for the serial link, specify HDLC as the encapsulation by entering it as a command option. This is the same command issued previously when specifying the encapsulation type for routers R2, R3, and R4; the only difference is that you specify the hdlc option instead of frame-relay.
This is the command for R2's S0, R3's S0, and R4's S0:
Router(config-if)#encapsulation frame-relay [cisco | ietf]
This is the command for R3's S1 and R5's S0:
Router(config-if)#encapsulation hdlc
Unlike Frame Relay, there aren't any different types of HDLC encapsulation. After you specify the encapsulation type as HDLC, you can assign the appropriate IP address to the interface.
Example 7-27 shows the commands executed on R5.

Example 7-27. R5 Configuration Commands

R5(config-if)#encapsulation hdlc
R5(config-if)#ip address 192.168.35.5 255.255.255.0
R5(config-if)#
Before removing the interface from shutdown mode, you need to provide the clock rate to R3 using the following command:
Router(config-if)#clock rate {300-8000000 bps}
The only option in this command is to give the speed of the link in bits per second. Because this is a T1 or E1 interface, you can specify an easy-to-remember value of 2,000,000. This is the equivalent of an E1 link, which will work for this lab environment. As mentioned earlier, in the real world, you will not have to configure this parameter. The telecom service provider will set this value on its equipment. After you set this value, give the interface a description and remove the interface from shutdown mode, as demonstrated in Example 7-28.

Example 7-28. clock rate Command

R5(config-if)#clock rate 2000000
R5(config-if)#description This interface connects to R3's S1 (DTE)
R5(config-if)#no shutdown
R5(config-if)#
%LINK-3-UPDOWN: Interface Serial0, changed state to down
R5(config-if)#
At first glance, you might get a little nervous that the interface did not come up, but that is normal. R3's serial interface has not been configured yet, so the R5 interface is not receiving any signaling from R3; thus, the interface will remain in the down state until R3 is configured and removed from shutdown mode. Before you get too far into this configuration, you should know about a very helpful show command:
Router#show interfaces [bri | null | serial | tokenring | accounting | crb | irb]
  {number}
This command is very useful in troubleshooting and verifying interface configuration. The first option is to choose which type of interface you would like to see; the second option is to select the number of the interface. If you do not select any type of interface, the command shows you all the interfaces that the router has. Example 7-29 demonstrates sample output of the command on R5.

Example 7-29. show interfaces serial 0 Command Output

R5#show interfaces serial 0
Serial0 is down, line protocol is down
  Hardware is HD64570
  Description: This interface connects to R3's S1 (DTE)
  Internet address is 192.168.35.5/24
  MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
  Encapsulation HDLC, loopback not set, keepalive set (10 sec)
  Last input never, output 2w5d, output hang never
  Last clearing of "show interface" counters never
  Queueing strategy: fifo
  Output queue 0/40, 0 drops; input queue 0/75, 0 drops
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     0 packets input, 0 bytes, 0 no buffer
     Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     212 packets output, 18206 bytes, 0 underruns
     0 output errors, 0 collisions, 37557 interface resets
     0 output buffer failures, 0 output buffers swapped out
     111 carrier transitions
     DCD=up  DSR=up  DTR=down  RTS=down  CTS=up
The highlighted text reveals some important information regarding the interface Serial 0. The first thing that you see is the state in which the interface resides: "Serial0 is down, line protocol is down." The first "down" (this is referred to as interface or the physical layer state) tells you that there is a physical problem. A physical problem might result from a cable not being plugged in, or the connected device might not be receiving any electrical signaling, which is the case here. The "line protocol down" means that Layer 2 is not functional, meaning that HDLC is not operating correctly for some reason. It is important to note that the line protocol will never be up if the interface is in the down state. Next, the output shows the description placed on the Serial 0 interface. You see the IP address that you assigned earlier. This is a good place to review your configuration and make sure that what you typed in the interface configuration mode was correct. You also see the encapsulation type here. For a complete review of the output, refer to Chapter 3 of Interconnecting Cisco Network Devices. You will see this command again after configuring R3's serial interface to see what changes.
To configure R3, you need to go back to the terminal server and resume the session with R3, but don't forget to save the configuration before leaving. When at R3, you need to enter global configuration mode and then go into interface configuration mode for Serial 1. Remember, you will configure Serial 0 for Frame Relay. Serial 1 connects to R5's S0 interface. (Refer to your lab diagram.) See Example 7-30.

Example 7-30. R3 Interface Configuration Mode

R5#copy running-config startup-config
Building configuration...
[OK]
R5#<ctrl-shft-6><x>
    Termserver#3
[Resuming connection 3 to r3 ... ]
R3#
R3#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R3(config)#interface serial 1
R3(config-if)#
Now you are in interface configuration mode for Serial 1 on R3, and you can assign the appropriate IP address and mask. After that, don't forget to remove the interface from shutdown mode. Example 7-31 illustrates the commands.

Example 7-31. R3 Serial 1 Configuration Commands

R3(config-if)#encapsulation hdlc
R3(config-if)#ip address 192.168.35.3 255.255.255.0
R3(config-if)#description This interface connects to R5's S0 (DCE)
R3(config-if)#no shutdown
R3(config-if)#
%LINK-3-UPDOWN: Interface Serial1, changed state to up
R3(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
R3(config-if)#
As you can see, the interface came up, and so did the line protocol. Return to R5 and see how the show interface command output has changed. Example 7-32 shows the changes in the output.

Example 7-32. R5 show interface serial 0 Command Output

R3(config-if)#end
%SYS-5-CONFIG_I: Configured from console by console
R3#copy running-config startup-config
Building configuration...
[OK]
R3#<ctrl-shft-6-x>
    Termserver#5
[Resuming connection 5 to r5 ... ]

R5#
R5#show interface serial 0
Serial0 is up, line protocol is up
  Hardware is HD64570
  Description: This interface connects to R3's S1 (DTE)
  Internet address is 192.168.35.5/24
  MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
  Encapsulation HDLC, loopback not set, keepalive set (10 sec)
  Last input 00:00:01, output 00:00:01, output hang never
  Last clearing of "show interface" counters never
  Queueing strategy: fifo
  Output queue 0/40, 0 drops; input queue 0/75, 0 drops
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     25 packets input, 1865 bytes, 0 no buffer
     Received 25 broadcasts, 0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     236 packets output, 20009 bytes, 0 underruns
     0 output errors, 0 collisions, 37629 interface resets
     0 output buffer failures, 0 output buffers swapped out
     112 carrier transitions
     DCD=up  DSR=up  DTR=up  RTS=up  CTS=up
R5#
Great! You now should be capable of pinging R3 from R5, as demonstrated in Example 7-33.

Example 7-33. R5 ping Result

R5#ping 192.168.35.3

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.35.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms
R5#
You got 100 percent success! R3 and R5 have full IP connectivity. Question: Should R5 be capable of pinging R3's Serial 0 IP address? Why not? Even though R5 can reach R3 through interface Serial 1, R5 cannot ping R3's Serial 0 interface. This is because you do not have any routing protocols configured to let R5 know about the 192.168.100.0 network, to which R3's Serial 0 interface belongs. When you have configured all the interfaces on all the routers, you will start configuring the routing protocols. Then you should be capable of pinging any interface on any router.

Feb 17, 2013

Creating Twitter and Facebook posts with symbols

Below is a listing of special characters and symbols that can be copied and pasted into your own Twitter and Facebook posts to give your posts and tweets a little more originality.
Tip: Not all third-party tools and devices that are used to read Facebook and Twitter can interpret these symbols. When these symbols are not understood they will be shown as an empty box.

Arrows and fingers
← ◄ ⇐ ☚ ☜ ↔ ⇔ → ► ⇒ ☛ ☞ ↑ ⇑ ☝ ↓ ⇓ ☟

Crosses and stars
✝ ✞ ☨ ☦ ☥ ✙ ✚ ✛ ✜ ☩ ♆ ✠ ☪ ✡ ★ ☆ ✪ ⋆ ✩ ✮ ✯ ✰ ☸

Danger and peace
☠ ☢ ☣ ☮ ✌ ☯ ☹ ☺ ☻

Flowers and snowflakes
❀ ✿ ❁ ✾ ❇ ❈ ❅ ❄ ❆ ✹

Game
♚ ♔ ♛ ♕ ♜ ♖ ♝ ♗ ♞ ♘ ♟ ♙ ♠ ♤ ♣ ♧ ♥ ❤ ❥ ♡ ♦ ◊

Lines and bars
❘ ❙ ❚

Music
♪ ♫ ♩ ♬ ♭ ♮ ♯

Office
✍ ✎ ✏ ✉ ☎ ☏ ✆ ⌛ ⌚ ✓ ✈ ✂ ✄ © ® ™ ♀ ♂ ☤ ∞

Weather
☼ ☀ ☁ ☂ ☃ ☄ ☽ ☾

Top 10 Twitter tips and tricks

Below is a listing of our top 10 favorite Twitter tips and tricks. These tips will help make your Twitter experience more enjoyable and can help increase your followers. Customize
  • Change your profile picture. Use a picture of yourself to make it seem more personalized if this is your personal Twitter account.
  • Utilize as much of the 160-character limit Twitter BIO space allows. Include keywords your followers or potential followers may be searching for.
  • Create your own background image. However, do not make the image too much like an ad or sales pitch. The background image must be less than 800k and we recommend a size of 1600x1200 for a large image or smaller if you plan on tiling the image or just having it on the left-hand side. Finally, keep in mind that smaller resolutions and monitor sizes will hide much of the background.
Third-party tools
Take advantage of the hundreds of different third-party online tools and services that enhance your Twitter experience. Below are a few of our favorites.
  • TwitPic - Take advantage of TwitPic to post pictures on your tweets. If you want to post pictures while away from the computer, use the Twitterific app.
  • Qwitter - Great service that sends an e-mail any time someone unsubscribes from your Twitter profile and mentions a possible Twitter post you made that may have caused them to leave.
  • Manageflitter - Fantastic site for managing your followers and getting an easy to read overview of people not following you back, quiet users, and inactive users.
  • WeFollow - Great website that allows you to add yourself to a listing of Twitter users by tags you find interesting.
  • SocialOomph - Another great service with a collection of free Twitter tools including the ability to schedule when a tweets gets posted.
  • Tweetbeat - An excellent site that takes the trending topics on Twitter and gives you a clearer explanation of present and past trending topics.
  • TwitterMeme - Another great location to find the hottest links on Twitter.
  • Twitter Grader - Great service that grades any Twitter account and gives you additional details and ranking information.
  • Twitter Fan Wiki Apps - Finally, this wiki has a listing of several hundred different Twitter applications and tools for users wanting more.
Use Twitter search
Take full advantage of the Twitter search tool. Below are just a few tips that can help improve your search capabilities on Twitter.
  • Search for your website or blog URL and see if others are mentioning your page.
  • Search for anything near you by adding near:"city state". For example, typing near:"Salt lake city Utah" club would return current tweets that have happened in Salt Lake City, Utah with the keyword club in them.
  • Find people who you may enjoy following by searching for keywords that interested you.
  • If you do not want tweets with links add ? -filter:links at the end of your search query.
  • Need more options, use the Advanced Twitter search.
  • Any time you get excellent results click the "Save this search" button to save that search. These searches can then be found under "Saved Searches" on the right-hand part of your profile on the old Twitter interface or under the "Searches" tab next to your timeline on the new Twitter interface.
Followers
  • Engage followers.
  • Do not follow too many people. No one is going to follow someone who is following thousands of people but only has 10 followers.
  • Retweet interesting posts.
  • Retweet and participate in conversations with people with a lot of followers.
  • Realize it is impossible for anyone to read every tweet.
  • When first joining do not follow hundreds of people, doing this may mark you as a bot.
Create useful and interesting tweets
  • Try making all your tweets informative, useful, or funny.
  • Do not post mundane posts, e.g. eating a bowl of cereal.
  • Add hastags to your tweets. For example, if your tweet is about computers, consider adding #computer in the tweet.
  • Tweet frequently. No one is going to follow someone they do not know who has not tweeted in months. Try at the very least to tweet a few times a week or daily if you can manage.
  • Do not whine or complain. Everyone will unfollow anyone who constantly whines or complains.
  • Try making your valuable tweets during the times people will most likely see them.
  • Keep some space available in your tweet in case someone retweets your post.
  • Use special characters in your tweets.
Know the lingo
Know the Twitter lingo, these are just a few examples: @reply, Direct Message (DM), Follower, Hashtag, Retweet (RT), Trending Topics, and Tweet. See the Twitter description for a full listing of Twitter terms and Lingo and related terms.
Follow the masters
Following a few of the masters of Twitter and Social Networking will give you an understanding of how to tweet better, posts to RT, and inspiration for tweets of your own. Below are the top ten Twitters we recommend following.
  • Twitaholic - A full listing of the top users on Twitter based on Followers. This is a terrific service to find and follow the top users and possibly incorporate some of the ideas they are doing on their account.
Tip: Many of the first few hundred people are celebrities on Twitaholic, if they do not interest you skip the first page.
Create and use lists
Twitter list iconTwitter lists are an excellent method of filtering filter through the people you follow. To create a list, click the Lists link and then Create a list. After creating a list visit the persons profile page you wish to add and click the list icon, as shown in the picture to the right. Our Computers and Tech list is an example of a public list we created.
Go Mobile
Apple iPhones, Blackberry phones, Android phones, Windows phone 7 phones, and most of the other smart phones have Twitter applications. Take full advantage of these applications. For users who do not have smart phones Twitter also has extensive support for SMS, which can send tweets over a text message.
Advertise
  • Mention your Twitter page as many places as you can, e.g. your business card, e-mail signatures, web page, blog, Facebook, etc.
  • Create a tweet button or at least your Twitter name on your pages, similar to the below examples.

Determine last modified date of a web page

For web pages that do not list their last modified date, you can determine the date and time when a website was last updated, modified, or changed by following the below suggestions. Keep in mind that
Internet Archive
Although this site will not give you an exact modified date, it can give you a good idea of when the page last changed and will also allow you to view the history of a page, even if it is offline. Visit the Internet Archive and enter the URL of page or website you're trying to view the modification date.
JavaScript in address bar
Insert the below JavaScript string into the address bar.


javascript:alert(document.lastModified)


Note: With dynamic generated content this will not work. Newer Internet Browsers will also not support this feature since the address bar as a search or for other features.

Quickly scroll to an item in a list or drop down

Quickly find text, an icon, or other item in a group or list by highlighting one of the icons or clicking on the list items and pressing the beginning letter of the item you're looking for. Below are some examples of how this could be used.
Internet drop down list
Instead of scrolling through a list of options in an Internet drop down list press the first letter of the option you're looking for. For example, if you wanted to get down on the below list of countries to United States you could click the down arrow and then press U to quickly move down to the first item beginning with U, which in this case is Uganda. If you continued to type United... it would continue to scroll down as long as a result was found.
Windows desktop icons
If you have a lot of icons on your desktop or in another folder highlight one of the icons and press the first letter. For example if you were looking for an icon named "test" highlight any icon and then press the "t" key. Note: you can also press the "t" key multiple times to individually highlight each icon that starts with "t".

Quickly bookmark a web page

Quickly bookmark any web page in all major browsers by pressing CTRL + D on your keyboard. Pressing these two keys together will open the bookmarks or favorites for your browser and allow you to quickly place a bookmark for the page you're currently at. For example, pressing the two keys now would bookmark this page.

Quickly zoom in on images by hovering mouse over thumbnail

 Thumbnail in Twitter zoomed with mouse hover
Many sites such as Twitter, Facebook, Amazon, eBay, and Wikipedia will show a larger image of small thumbnails images when you click them. Save yourself the time of having to click the image to view it by installing a browser extension that will show you the larger image by hovering the mouse over the image. In the picture to the right, is an example of a Twitter profile icon that is enlarged when hovering over the small icon in the Following section. Click the below link for the browser you are using to open the extension that will add this feature.
Firefox users
Chrome users

Create small easy to read URL's

Create easy to read and type Internet addresses from long convoluted addresses often found on popular sites such as Amazon, eBay, MapQuest, etc. by using online services that shrink the address. Below are examples of sites that allow you to copy and paste any URL into them to make them smaller.
In addition to visiting one of the above sites each time you need to make a URL smaller if you're running Mozilla Firefox there are many tinyurl and other Firefox add-ons that allow you to integrate this feature into your browser. Many other browsers such as Chrome also have similar services.

Tabbed browsing tips

With the introduction of Microsoft Internet Explorer 7 all major browsers now support tabbed browsing. Below are various tips to improve your browsing using tabs.
  1. Clicking on any link with your middle mouse button or wheel will open that link in a new tab. Alternatively you can hold down your CTRL key in IE and Firefox and click a link to open that link in a new tab.
  2. Clicking on an open tab with your middle mouse button will close that tab.
  3. Mozilla Firefox users can middle-click the back button to open a previous page in a new tab.
  4. Pressing CTRL + T will open a new tab in IE, Firefox, and Opera.
  5. Pressing CTRL + Shift + T will undo the closed tab. Alternatively right clicking on a portion of the tab bar will also display this option.
  6. Firefox and IE users can hold down CTRL and press 1 through 0 on their keyboard to open that respected tab.
  7. Right-clicking the active tab will give you an option to close all other non-active tabs.

Send a web page to a friend

When visiting a web page you may come across something you like, for those pages that don't have an e-mail option following the below simple steps can allow you to send a link to a friend.
Internet Explorer users
Send a friend the web page you are viewing by clicking File, Send, and "Page by E-mail". If you do not see the File menu press the Alt key.
Firefox users
Right-click on the page you wish to send to your friend and in the menu click Send link.
Opera users
Right-click on the page you wish to send to your friend and in the menu click Send link by Mail.
Netscape users
Send a friend the web page you are viewing by clicking File, and "Send Page"

Feb 14, 2013

22 common Windows 7 problems solved

1. Problem Steps Recorder
As the local PC guru you're probably very used to friends and family asking for help with their computer problems, yet having no idea how to clearly describe what's going on. It's frustrating, but Microsoft feels your pain, and Windows 7 will include an excellent new solution in the Problem Steps Recorder.
When any app starts misbehaving under Windows 7 then all your friends need do is click Start, type PSR and press Enter, then click Start Record. If they then work through whatever they're doing then the Problem Steps Recorder will record every click and keypress, take screen grabs, and package everything up into a single zipped MHTML file when they're finished, ready for emailing to you. It's quick, easy and effective, and will save you hours of troubleshooting time.
2. Burn images
Windows 7 finally introduces a feature that other operating systems have had for years - the ability to burn ISO images to CDs or DVDs. And it couldn't be much easier to use. Just double-click the ISO image, choose the drive with the blank disc, click Burn and watch as your disc is created.
3. Create and mount VHD files
Microsoft's Virtual PC creates its virtual machine hard drives in VHD files, and Windows 7 can now mount these directly so you can access them in the host system. Click Start, type diskmgmt.msc and press Enter, then click Action > Attach VHD and choose the file you'd like to mount. It will then appear as a virtual drive in Explorer and can be accessed, copied or written just like any other drive.
Click Action > Create VHD and you can now create a new virtual drive of your own (right-click it, select Initialise Disk, and after it's set up right-click the unallocated space and select New Simple Volume to set this up). Again, you'll be left with a virtual drive that behaves just like any other, where you can drag and drop files, install programs, test partitioning software or do whatever you like. But it's actually just this VHD file on your real hard drive which you can easily back up or share with others. Right-click the disk (that's the left-hand label that says "Disk 2" or whatever) and select Detach VHD to remove it.
The command line DISKPART utility has also been upgraded with tools to detach a VHD file, and an EXPAND command to increase a virtual disk's maximum size. Don't play around with this unless you know what you're doing, though - it's all too easy to trash your system.
4. Troubleshoot problems
If some part of Windows 7 is behaving strangely, and you don't know why, then click Control Panel > Find and fix problems (or 'Troubleshooting') to access the new troubleshooting packs. These are simple wizards that will resolve common problems, check your settings, clean up your system and more.
5. Startup repair
If you've downloaded Windows 7 (and even if you haven't) it's a good idea to create a system repair disc straight away in case you run into problems booting the OS later on. Click Start > Maintenance > Create a System Repair Disc, and let Windows 7 build a bootable emergency disc. If the worst does happen then it could be the only way to get your PC running again.
6. Take control
Tired of the kids installing dubious software or running applications you'd rather they left alone? AppLocker is a new Windows 7 feature that ensures users can only run the programs you specify. Don't worry, that's easier to set up than it sounds: you can create a rule to allow everything signed by a particular publisher, so choose Microsoft, say, and that one rule will let you run all signed Microsoft applications. Launch GPEDIT.MSC and go to Computer Configuration > Windows Settings > Security Settings > Application Control Policies > AppLocker to get a feel for how this works.
7. Calculate more
At first glance the Windows 7 calculator looks just like Vista's version, but explore the Mode menu and you'll see powerful new Statistics and Programmer views. And if you're clueless about bitwise manipulation, then try the Options menu instead. This offers many different unit conversions (length, weight, volume and more), date calculations (how many days between two dates?), and spreadsheet-type templates to help you calculate vehicle mileage, mortgage rates and more.
Don't take any Windows 7 applet at face value, then - there are some very powerful new features hidden in the background. Be sure to explore every option in all Windows applets to ensure you don't miss anything important.



Windows 7 calculator
CALCULATE MORE:The new Calculator is packed with useful features and functionality
8. Switch to a projector
Windows 7 now provides a standard way to switch your display from one monitor to another, or a projector - just press Win+P or run DisplaySwitch.exe and choose your preferred display. (This will have no effect if you've only one display connected.)
9. Get a power efficiency report
If you have a laptop, you can use the efficiency calculator to get Windows 7 to generate loads of useful information about its power consumption. Used in the right way, this can help you make huge gains in terms of battery life and performance. To do this you must open a command prompt as an administrator by typing 'cmd' in Start Search, and when the cmd icon appears, right-click it and choose Run as administrator.
Then at the command line, just type in 'powercfg -energy' (without quotes) and hit Return, and Windows 7 will scan your system looking for ways to improve power efficiency. It will then publish the results in an HTML file, usually in the System32 folder. Just follow the path it gives you to find your report.
10. Understanding System Restore
Using System Restore in previous versions of Windows has been something of a gamble. There's no way of telling which applications or drivers it might affect - you just have to try it and see.
Windows 7 is different. Right-click Computer, select Properties > System Protection > System Restore > Next, and choose the restore point you'd like to use. Click the new button to 'Scan for affected programs' and Windows will tell you which (if any) programs and drivers will be deleted or recovered by selecting this restore point. (Read our full Windows 7 System Restore tutorial.)
11. Set the time zone
System administrators will appreciate the new command line tzutil.exe utility, which lets you set a PC's time zone from scripts. If you wanted to set a PC to Greenwich Mean Time, for instance, you'd use the command
tzutil /s "gmt standard time"
The command "tzutil /g" displays the current time zone, "tzutil /l" lists all possible time zones, and "tzutil /?" displays details on how the command works.
12. Calibrate your screen
The colours you see on your screen will vary depending on your monitor, graphics cards settings, lighting and more, yet most people use the same default Windows colour profile. And that means a digital photo you think looks perfect might appear very poor to everybody else. Fortunately Windows 7 now provides a Display Colour Calibration Wizard that helps you properly set up your brightness, contrast and colour settings, and a ClearType tuner to ensure text is crisp and sharp. Click Start, type DCCW and press Enter to give it a try.
13. Clean up Live Essentials
Installing Windows Live Essentials will get you the new versions of Mail, Movie Maker, Photo Gallery and others - great. Unfortunately it also includes other components that may be unnecessary, but if you like to keep a clean system then these can be quickly removed.
If you left the default "Set your search provider" option selected during installation, for instance, Windows Live will install Choice Guard, a tool to set your browser home page and search engine, and prevent other programs from changing them. If this causes problems later, or you just decide you don't need it, then Choice Guard may be removed by clicking Start, typing msiexec /x {F0E12BBA-AD66-4022-A453-A1C8A0C4D570} and pressing [Enter].
Windows Live Essentials also adds an ActiveX Control to help upload your files to Windows Live SkyDrive, as well as the Windows Live Sign-in Assistant, which makes it easier to manage and switch between multiple Windows Live accounts. If you're sure you'll never need either then remove them with the Control Panel "Uninstall a Program" applet.
14. Add network support
By default Windows Live MovieMaker won't let you import files over a network, but a quick Registry tweak will change this. Run REGEDIT, browse to HKEY_CURRENT_USER\Software\Microsoft\Windows Live\Movie Maker, add a DWORD value called AllowNetworkFiles and set it to 1 to add network support.
15. Activate XP mode
If you've old but important software that no longer runs under Windows 7, then you could try using XP Mode, a virtual copy of XP that runs in a window on your Windows 7 desktop. But there's a big potential problem, as XP Mode only works with systems that have hardware virtualisation (AMD-V or Intel VT) built-in and turned on. If you've a compatible CPU then this may just be a matter of enabling the option in your BIOS set-up program, however some high profile brands, including Sony Vaio, disable the setting for "security reasons". And that blocks XP Mode from working, too.
One solution has emerged, but it's a little risky, as essentially you'll have to alter a byte in your laptop firmware and hope this doesn't have any unexpected side-effects. Gulp. If you're feeling brave then take a look at the Feature Enable Blog for the details, but don't blame us if it goes wrong.
A safer approach might be to use VirtualBox, a virtualisation tool that doesn't insist on hardware support, but then you will need to find a licensed copy of XP (or whatever other Windows version your software requires) for its virtual machine.
16. Enable virtual Wi-Fi
Windows 7 includes a little-known new feature called Virtual Wi-Fi, which effectively turns your PC or laptop into a software-based router. Any other Wi-Fi-enabled devices within range - a desktop, laptop, an iPod perhaps - will "see" you as a new network and, once logged on, immediately be able to share your internet connection.
This will only work if your wireless adapter driver supports it, though, and not all do. Check with your adapter manufacturer and make sure you've installed the very latest drivers to give you the best chance.
Once you have driver support then the easiest approach is to get a network tool that can set up virtual Wi-Fi for you. Virtual Router (below) is free, easy to use and should have you sharing your internet connection very quickly.


Virtual router
If you don't mind working with the command line, though, maybe setting up some batch files or scripts, then it's not that difficult to set this up manually. See Turn your Windows 7 laptop into a wireless hotspot for more.
17. Recover locked-up apps
If an application locks up under a previous version of Windows then there was nothing you could do about it. A new Windows 7 option, however, can not only explain the problem, but may get your program working again without any loss of data.
When the lockup occurs, click Start, type RESMON and click the RESMON.EXE link to launch the Resource Monitor.
Find your frozen process in the CPU pane (it should be highlighted in red), right-click it and select Analyze Wait Chain.
If you see at least two processes in the list, then the lowest, at the end of the tree, is the one holding up your program. If it's not a vital Windows component, or anything else critical, then save any work in other open applications, check the box next to this process, click End Process, and your locked-up program will often spring back to life.


Waitchain
18. Fault-Tolerant Help
Windows 7 includes a new feature called the Fault Tolerant Help (FTH), a clever technology that looks out for unstable processes, detects those that may be crashing due to memory issues, and applies several real-time fixes to try and help. If these work, that's fine - if not, the fixes will be undone and they won't be applied to that process again.
While this is very good in theory, it can leave you confused as some applications crash, then start working (sometimes) for no apparent reason. So if you'd like to check if the FTH is running on your PC, launch REGEDIT, and go to HKEY_LOCAL_MACHINE\Software\Microsoft\FTH - any program currently being protected by the FTH will be listed in the State key.
Experienced users may also try tweaking the FTH settings to catch more problems, and perhaps improve system stability. A post on Microsoft's Ask The Performance Team blog (bit.ly/d1JStu) explains what the various FTH Registry keys mean.
19. Automatically switch your default printer
Windows 7's location-aware printing allows the operating system to automatically switch your default printer as you move from one network to another.
To set this up, first click Start, type Devices, and click the Devices and Printers link.
Select a printer and click Manage Default Printers (this is only visible on a mobile device, like a laptop - you won't see it on a PC).
Choose the "Change my default printer when I change networks" option, select a network, the default printer you'd like to use, and click Add.
Repeat the process for other networks available, and pick a default printer for each one.
And now, as you connect to a new network, Windows 7 will check this list and set the default printer to the one that you've defined.

Feb 11, 2013

Common Troubleshooting Techniques & Strategies

The following article is based on years of experience. It is provided as a free service to our customers and visitors. However, Directron.com is not responsible for any damage as a result of following any of this advice.

Copying the contents for commercial purposes is strictly prohibited without Directron.com's written consent. However, you are welcome to distribute these computer support tips free to your friends and associates as long as it's not for commercial purposes and you acknowledge the source. You are permitted and encouraged to create links to this page from your own web site.


Here are five common-sense techniques and strategies to solve common computer hardware problems.

(1) Trial-and-error

Personal computers are highly modular by design. The most powerful trouble-shooting technique is to isolate the problem to a specific component by trial-and-error. Swap compatible components and see if the system still works. Try different peripherals on different machines and see if the same problem occurs. Make one change at a time.

(2) "It's the cable, s-----."

More than 70% of all computer problems are related to cabling and connections. Ensure all cables are connected firmly. IDE and floppy ribbon cables and power cables can often go loose. Ensure microprocessor, memory modules, and adapters such as video card and sound card are inserted correctly and didn't "pop-up" during transportation.

(3) Don't be frustrated!

Don't be afraid of computer problems. It is often the best opportunity to learn. Trouble-shooting is part of the fun of owning a computer. Imagine the satisfaction you could get by solving a problem yourself.

Of course the fun could ran out quickly once you are frustrated and have spent too much time on the same problem. If you feel frustrated, it's time to leave it for a while and go back with some new ideas or call someone who can help. Rule of thumb: You shouldn't spend more than three hours on the same problem at one time.

(4) Take notes!

Take notes of what you have done and all the error messages. You may need to use them later. For instance, when you see an unusual blue screen with an error message, copy the entire message onto a piece of paper. In many situations, that message may point to the right direction in getting the problem solved quickly.

(5) Take a look?

It's OK to open a computer case and take a look inside. There is only 5V and 12V DC voltage supplied to the components outside the power supply. Those who have never seen the inside of a computer are often amazed by how simple it looks. Of course, still always power down and unplug the power cord first.

How to Maintain a Computer System?

You are encouraged to make links to this article from your website and tell your friends

The following article is based on years of experience. It is provided as a free service to our customers and visitors. However, Directron.com is not responsible for any damage as a result of following any of this advice.

Copying the contents for commercial purposes is strictly prohibited without Directron.com's written consent. However, you are welcome to distribute these computer support tips free to your friends and associates as long as it's not for commercial purposes and you acknowledge the source. You are permitted and encouraged to create links to this page from your own web site.


  • If you use your computer more than a few hours per day, we suggest you not to turn off your computer at the end of the day. Instead turn off only the monitor to save electricity. Daily power up and down makes the components exposed to high and low temperature cycles that are not good for the life-time of the components, particularly the critical ones such as hard drives, CPU, and memory. The temperature cycle would result in expansion-shrinking cycle for the components. The life-time of electronic components would be increased if they are run at constant temperature with adequate ventilation.
  • If your area experiences a few times of power outage per year, it is necessary to use a UPS. Sudden power downs while the system is running may cause severe damage to hard drives.
  • A tape backup and a lock to make systems hard to move are worthy investment for critical data.
  • Use your hand to touch and feel the cover of your computer at least once a week. The cover should be at room temperature. If it feels warm there may be a problem! Check to make sure that the cooling fans on the power supply and CPU are working properly. Clean the air pathway on the back of the power supply on a regular basis.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Computer Tricks and Tips