Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Tuesday, 21 January 2014
Hello, everyone Today I'm going to explain About how to make connection to router using different approaches. So, here we go.
As we know Routers are special computers built to handle internetwork traffic. Routers are very important network infrastructure devices and Router serve many users at same time. The network traffic generated by the end users communicate through the router.We know that There are no input devices for router like a monitor, a keyboard, or a mouse. So Admin has lot of choice to choose from to comminucate with router. Following are methods which admin can use to connect to router. Connection Through using Console Port
First method is By connecting the router's console port to a workstation through a console cable. The console port is the management port which is used by admin to log into a router directly-I mean to say that without using a network connection. There are some specification or requirements that need to fulfill to successfully establish connection. First of all You require a terminal emulator application like hyperterminal or Putty (will discuss it later on) to connect to router. Console port connection is a way to connect to the router when a router cannot be accessed over the network. Click the following link to learn how to connect and access a router using console connection.
Connection Through AUX Port
Second method is By using a remote computer through a modem that calls another modem connected to the router with a cable using the Auxiliary Port on the router. Auxiliary Port (AUX Port) allows a direct, non-network connection to the router, from a remote location. The Auxiliary Port (AUX Port) uses a connector type to which modems can plug into, which gives permission to an administrator from a remote location to access the router like a console port.
Connection through protocols telnet, SSH, HTTP,HTTPS
Third Method is The routers can be managed over the network by using standard TCP/IP protocols like Telnet, SSH, HTTP that is hyper text transfer protocol or HTTPS that is hyper text transfer protocol secure. Let me tell one thing telnet is device which was developed to manage computers remotely in early days of unix operating systems. A Telnet client and server application ships with Cisco's IOS software and most computer operating systems. SSH is a more secure way to configure routers, since the SSH communication is encrypted. Cisco IOS also has a HTTP server to managed web based communication with the router.
|
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment