Saturday, September 13, 2008

Its Me SUNNY

can v do this also

How u C

Rules R rules

Friday, September 12, 2008

KAABA

“KAABA”- The House of Allah in Makkah. The Kaaba is covered by a black cloth known as “KISWA”, which is produced and changed every year. Special factory is designed for the making of Kiswa in Makkah. It costs approx SR 17 million. The cloth is made of 670 Kg’s of Silver and dyed black. About 120 kg’s of pure gold and 50 kg’s of silver is used in writing the Quranic verses over the cloth. The total area of the cloth is 658 sqr meter

Thursday, May 15, 2008

Art of Negotiating!

FATHER - picked a great girl to marry you.
SON- But, Dad, I prefer to choose my wife.
FATHER - My son, she is daughter of Bill Gates ...
SON- Well, in this case, I agree.
Then, the father negotiate , go find the Bill Gates.
FATHER - Bill, I have a husband for your daughter!
BILL GATES - But my daughter is too young to marry!
FATHER - This Guy is vice president of the World Bank ...
BILL GATES - in this case, so good.
Finally, the father went negotiate to the President of the World Bank.
FATHER - Mr. President, I have a couple recommended to be vice president of the World Bank.
PRES. WORLD BANK - But I already have many vice presidents, more than is necessary.
FATHER - Men, Sr., this couple is son-in-law of Bill Gates.
PRES. WORLD BANK - in this case it can even start tomorrow!

The moral of the story: There is no negotiation lost. Everything depends on the strategy.


'If one day say that their work is not a professional, remember: the Noah's Ark was built by amateurs; professionals built the Titanic ...'

Thursday, May 8, 2008

About Me!

I 'm pretty, But i 'm not Beautiful.I sin, But i 'm not the Devil.I 'm good But i 'm not an angel.I 'm son, A brother, A cousin, A friend. I 'm student, A young boy, I 'm confident & scacrd. Terrified & excited.I 'm loving & caring & thoughtful & hopeful.I 'm sick & tired.I 'm shy & friendly,& careful & careless.I 'm misunderstood, I 'm hardworking & determined,but a little scared on the inside. I wish on stars & dream my dreams.I pray 2 GOD & cry my tears.I :) on the outside,while I 'm dying on the inside.I listen 2 others who won't listen 2 me.I believe in passion, but not true love. I want u but not so close. I 'm everything & nothing all at once.And all i want is 4 u 2 LOVE ME..........

Soooooooooo

Wednesday, May 7, 2008

What a Rose

Not a Morning Person

I woke up early one morning
The earth lay cool and still
When suddenly a tiny bird
Perched on my window sill,
He sang a song so lovely
So carefree and so gay
That slowly all my troubles
Began to slip away,
He sang of far off places
Of laughter and of fun
It seemed his very trilling
Brought up the morning sun
I stirred beneath the covers,
Crept slowly out of bed
Then gently closed the window
And crushed his fucking head

I'm not a morning person

Wednesday, April 30, 2008

Very Nice

Remember You are born to Live
Don't Live Because you are born
Don't go the way life takes you
Take life the way you go!!

Sunday, April 27, 2008

My Kittens

I have seen little kittens
In winters I give them mittens
Before they run
They eat a bun
They have lots of fun
And they like the shine of the sun
They like to drink milk
And like to sleep on silk
They don’t stink
And their color is pink
Their eyes are blue
And play with glue
Their favorite color is yellow
And they are my fellow
They never get flu
I hope their wishes come true
Everyday I count them, they are seven
I wish they go to heaven

Monday, April 21, 2008

Those Who..............

Those who give respect to their parents
And respect by their juniors
Those who admire their ancestors
Are admired by their generation
Those who take care of their neighbors
Are protected by their neighbors
Those who love their juniors
Are idolized by their juniors
Those who assist needy
Are supported by their God
And those who give respect to their teachers
Are the best students

Thursday, April 17, 2008

Subnet Mask Vs Wildcard Mask

In general we can derive the subnet mask from the networks bits of a class, like for class A, the network bits are eight (8), so we have to on (1) only the first eight bits and off (0) the remaining bits so the subnet mask we will get is 255.0.0.0, because on the eight bits means 255. Likewise for class B, the networks bits are sixteen (16) twenty-four (24) for class C, so the subnet mask will be 255.255.0.0 and 255.255.255.0 consecutively. If we go in detail of subnet mask, the networks bits means that when data comes so it will check the network bits of the data and will then forward that data.
Some people called the wildcard mask the opposite of subnet mask, like
Class C IP address---------------------- 200.100.50.52
Subnet Mask-----------------------------255.255.255.0
Wildcard Mask---------------------------0.0.0.255

But it is not true always like because if we are asked to calculate wildcard mask for range 192.1.1.0 to 192.1.1.15 then it is know that this range belong to Class C and subnet mask for class C is 255.255.255.0 and the opposite is 0.0.0.255 which is not true. The correct wildcard mask can be calculated by the this way, Suppose we are asked to calculate wildcard mask for the range that is 192.1.1.0 to 192.1.1.15, so the procedure to calculate this range is, First open the last byte and then put 0 for all the same columns and put 1 for different column
192.1.1.0000 0000
192.1.1.0000 1111
0 . 0.0 0000 1111-------> 0.0.0.15------> Wildcard Mask

Tuesday, April 15, 2008

Mum & Dad

My mum and dad are always there for me
When I don’t understand they help me see
Even though they live apart
My brother and I will always live in their heart
My mum and dad give me so much joy
I will always be their special boy
My mum makes me so proud
Without her I will be lost in a crowd
One thing that I do know
Is that my mum’s love will always show.

mY BrOtHeR

My brother is the best
He always helps me with my test
My mum says that we are good boys
Because we share all our toys
My brother and I like to play
A lot of games every day!

Thursday, April 10, 2008

DePeNdS............

A Clay pot containing milk will be ranked higher than
a golden pot containing poison.
Not our outer glamor but our inner virtues make us valuable.

Thursday, April 3, 2008

IPv6



IP version 6 (IPv6), the replacement protocol for IPv4, is a well known for a couple of reason. It provides the ultimate solution for the problem of running out of IPv4 address in the global internet address by using 128-bit address.
The world has change very rapidly so there is need of more and more address, as now the phone have the internet facility and it requires the IP address, the car dealer also feel the need of an IP address so that the dealer can contact their customer at any time when they want to diagnosis a problem, so some of the manufacturer have accept this idea. The two main reasons to shift to IPv6 is that of more address and some attractive features that includes IPsec, no need for NAT/PAT, Aggregation, Address assignment features etc. Before assigning Class C network that begin with 198 to a particular ISP in a particular part of the world allowed others ISP’s to use one route for 198.0.0.0/8. Finally NAT/PAT did amazingly by allowing a typical home or small office to consume only one public IPv4 address. The migration from IPv4 to IPv6 will not be a surprise as it already started and in couple of years it will be implemented. “As US government has set date in 2008 by which all government agencies should be running IPv6 in their core IP networks”.
The address assignment for IPv6 is elegant, simple and summarize as under:
i) Public IPv6 address are grouped (numerically) by major geographic region
ii) Inside each region, the address space is subdivided by ISP inside that region
iii) Inside each ISP in a region, the address space is subdivide for each customer

The Convention, IPv6 convention use 32 hexadecimal numbers, organized into 8 quarters of 4-hexa digits separated by colon, to represent a 128-bit address. For example

2002:042c:0000:5061:92AB:0000:0000:6104 / 64
Now it is difficult to remember this address, so there is certain rule through which we can make this address short and will be easy to remember.
Refer to Figure A,

Step # 1: Remove the Zero (0) from the octet which starts from 0. As in the figure, we remove 0 from 042C and wrote it 42C.
Step # 2: Now for four consecutive zero, write only one 0, as in figure, for 3rd, 6th and 7th octet we wrote one 0.
Step # 3: Put double colon (: :) for two consecutive zeros. As in figure, for 6th and 7th octet zero we put double colon. Note: Repetition of double colon is not allowed, we can do once in an address.

Expanding an Address:

2002 : : 4 / 64
2002 : 0000 : 0000 : 0000 : 0000 : 0000 : 0000 : 0004

If you want to reduce the size just apply the above three steps.

Configuration of IPv6:

a) On System
Just go to command prompt and type ipv6 install, here we go the installation is successful and enjoy now.

b) On Router:
It’s so simple to configure IPv6. There are two types of address; one is called Global Unicast Address which is assigned by our self while other is called Link Local which is assigned by router by self and that starts from FE80. Now Refer to Fig B.
A (Config) # IPv6 unicast-routing
A (Config) # interface e / 0
A (Config-if) # IPv6 2002 : : 2 / 64

***************************************
B (Config) # IPv6 unicast-routing
B (Config) # interface e / 0
B (Config-if) # IPv6 address 2002 : : 1 / 64

***************************************
A # Show IPv6 Interface
A # Ping 2002::2

Friday, March 28, 2008

Saturday, March 22, 2008

Anyway........!

If you are frank & honest, people may cheat you. Be honest anyway!
What may take years for you to build, someone could destroy overnight. Build anyway!
If you find happiness, they may be jealous. Be happy anyway!
The good you do today, people may forget tomorrow. Do well anyway!
You see, in the final analysis it between you and Allah. It was never between you and them anyway!
So go on and enjoy life. For ALLAH is in your life, anyway.

Confidence, Trust & Hope

Confidence: Once all villagers decided to pray for rain, on the day of prayers all people gathered and only one boy came with umbrella that’s confidence.

Trust: Trust should be like one year old baby when you throw him in the air, and he laughs because he knows you will catch him.

Hope: Every night we go to bed, have no assurance to get up alive in the next morning but still we plans for coming day.

Keep confidence, Trust in Allah & never loose hope!

Three Things

Three Things in Life once gone will never come back
i) Word
ii) Opportunity
iii) Time
Three Things in life are never sure
i) Dream
ii) Success
iii) Fortune
Three Things in life that makes you a great person
i) Hard work
ii) Sincerity
iii) Success
Three Things in life are most valuable
i) Love
ii) Self Respect
iii) Friends
Three Things in life must not be lost
i) Peace
ii) Hope
iii) Honesty
Three Things in life that destroy a person
i) Greed
ii) Pride
iii) Anger

Poem of the Year

This Poem was nominated for the best poem of 2005, written by an African child:

When I born, I black
When I grow up, I black
When I go in sun, I black
When I scared, I black
When I sick, I black and
When I die, I black
& you white Fella
When you born, you pink
When you grow up, you white
When you go in sun, you red
When you cold, you blue
When you scared, you yellow
When you sick, you green and
When you die, you gray
& you calling me colored?

Monday, March 17, 2008

SWITCHING


Ethernet switch operate at layer 2 of OSI reference model and having similar function to that of Ethernet bridges. An Ethernet switch learns the MAC address of the devices attached to its ports and store in a MAC database. When the Ethernet switch receive packet they concern to the MAC database for the right port to deliver. When a switch network includes loop for redundancy, an Ethernet switch prevent the duplicate frame from traveling over the redundant path if Spanning Tree Protocol (STP) is configured.

STP is used to up and down the switch or to avoid the switching loop or layer 2 loops or we can say that the ultimate goal is to block the port. The network composes of different segments. There are four states of spanning tree protocol, Blocking (10 Sec), Listening (10 Sec), Learning (15 Sec), and Forwarding (15 Sec). The port when shutdown is in blocking state, Listening states after blocking state include hearing to check for Bridge Protocol Data Unit (BPDU), this states indicate listening to all frames. When a port is in Learning sates it settle MAC address with the MAC address it hears on its ports. While in forwarding state the port is able to forward and receive the packets. The total time a port take to convert from Blocking state to Forwarding state is 50 minutes. The time it takes to convert from listening to learning or from learning to forwarding state is called Forward Delay. Assume we have two switches X and Y and X was elected as a Root Bridge, now lets say the switch X fails, switch Y will detect the missing BPDU from the Root Bridge. One of the spanning tree timers is called MAXAGE timer. When MAXAGE timer expire and a new BPDU has not been received from the neighbor, a spanning recalculation is calculated and after the network is converged (Convergence in the spanning tree protocol means a state where all the switches or bridges ports have transitioned to either blocking or forwarding state.), the switch Y becomes the root bridge and is then forwarding the traffic between the two segments.

Example: Refer to Fig no: 1, we have two segments and two switches are attached namely SW1 and SW2 through HUB. Suppose Computer A wants to send data to Computer B, so there is only one port on switch to enter the data and one port to leave the data similarly on SW2 one port for receiving and one port for forwarding as both of them are attached through HUB so it will always broadcast the data in circular from and a circular loop will be created and that is called switching loop. If we want to break the loop we have to switch off any one port of the switch using STP.

There are certain Conditions of STP which we have to follow while configuring the STP, i.e. One Root Bridge / Network, One Designated Port / Segment, and One Root Port / Non Root Bridge.

The selection of the Root Bridge, Non-Root Bridge, Designated Port, Root Port and Non-Designated Port are done on the basis of specific rules. Collectively Designated and Root port are called Forwarding Port and Non-Designated port is called Blocking port. The selection is done on Election keeping in view the Priority Number and Mac Address collectively called Bridge ID. Root Bridge is the most powerful unit in the network and will be only one in the whole network and the remaining ports will be Non-root Bridge. The one will be the Root Bridge having lowest priority number and this is the case in selection of designated port also, if two points have the same priority number then the election will be based on MAC address the one will be elected having lowest MAC address (48-bits). Let’s take an example and apply all the conditions.

Example: Refer to Fig No: 2, we have two segments namely 1 and 2. The S1 is attached to segment 1 and a computer is attached to it while the other S2 to S6 are attached to both segments and another computer is attached to segment 2. Now the selection for the root bridges and others are done as under:

Step # 1: When election is done for the Root Bridge (RB), so S1 is elected as a Root Bridge as it has the lowest priority number that is one while the remaining all points are termed as Non-root bridges (NRB).

Step # 2: Now election for the designated port on both the segments:

a) On segment 1 the S1 has the lowest priority number so it is declared Designated port (DP).
b) On segment 2 the S2 has the lowest priority number among all so it is declared designated port.

Step # 3: Now election for the Root Port (RP), those ports will be consider as a root port which have a direct path to the root bridge as in the given figure the upper ports will be called as a root port. Now there will be one Root Port per Non-root Bridge. If the S1 one port is Root Port and other is Designated Port then the second port of all other switches are termed as Non-Designated Port (NDP). So data will be forwarding from computer 1 attached to segment 1 to computer 2 attached to segment 2 through the following way:

Machine A----------S1--------------S2-----------------Machine B

Where S1 and S2 are declared Root Port and Designated Port while the second port of the remaining switches are declare Non-root bridges and will be turned off so there will be no switching loop while data is receiving and forwarding.

As I have discussed above if S1 fails then convergence process is take place and re-election is made and another switch having lowest priority number will be elected as a new root bridge and data then will be forwarding through that root.

Saturday, March 8, 2008

Router Boot up Process


When we apply a command
Router # show version
Output: …………………………configuration Register 0x2102

When we turned on the device the first thing they do is to read the configuration register value and this value by default is 0x2102.

Normally the best place from where we should run our operating system is FLASH, then TFTP and at last ROM. Why we should run from FLASH because our full operating system is kept there and after this why from TFTP not from ROM, because we kept our operating system backup here and at last when we need ios and both FLASH are erased and we also don’t have backup so then the best place from where we should run is ROM (here we have baby ios).

Now our heart says that the boot up sequence will be like see Fig A, first it will read the register value and then point towards Flash to load the operating system and then to the NVRAM to load the configuration files. But this is not the case here because; suppose FLASH becomes corrupt then system will not respond.

NOTE: Why the system read the register value first?

There is a concept called Cold Stating, which states that when system start the command will move to a small memory and than to main micro-processor.
Now the correct sequence and diagram of the router boot up process is given see Fig B, in which after reading the register value it will point to the NVRAM and there we identify the boot up sequence say, Boot System FLASH. After loading the IOS it will return to the NVRAM.

Now suppose the FLASH becomes corrupt then? So after reading the register value it will point to NVRAM and there we identified the boot up sequence that if FLASH not found then boot from TFTP and it this is also corrupt or we haven’t took the backup then boot from Rom see Fig c.

Thursday, February 21, 2008

wHaT I tHiNk...................!

* Your Aspiration are Your Possibilities
* A Winner never quits and a quitter never wins
* Toughness is in the soul and spirit, not in muscles
* Tough times never last, but tough people do
* Success is not something to wait for. It is something to work for.
* Not Failure, but low aim, is a crime.
* Never bend your head. Always hold it high. Look the world straight in the face.
* I am a slow walker but I never walk back.
* If you can imagine it,
You can achieve it.
If you can dream it,
You can become it.
* Control your destiny or somebody else will.
* The highest result of education is tolerance.
* I am a great believer in luck, and I find that the harder I work,
The more I have of it.
* Success is a journey, not a destination.
* Whenever you fall, pick something up.
* No one can climb the ladder of success with both hands in the pockets.

Thursday, February 14, 2008

Reviewing the X86 Based Boot Process

Pre-Boot Sequence

File Accessed --- POST (Check Processor, Memory & I/O)--MBR (Specify Partition used to boot O/S) --- C:\\ (Normally)--MBR (Booted & Executed) copy NTLDR to Active Partition)

Boot Sequence

Pre-boot complete --- NTLDR (switch CPU to Prorated mode (NTFS, FAT32 selection) BOOT.INI (File read & Info used to Initialize menu selection) Selection in case of Dual boot (BOOTSECT.DOS)--NTDECT.COM (Gather H/W data & pass to Registry)-- NTLDR check if more than one H/W protocol exists-- NTOSKRNL.EXE (Take the way and Load Window XP)

Kernel Load Sequence

NTOSKRNL.EXE is Loaded --- HAL LoadedLow Level Drivers are added

Kernel Initialization Sequence

H/W Register & Clone Control --- Device Driver Initialized (Loaded during Kernel Load Phase)  High order sub-system & services are loaded

Logon Sequence

After Kernel Initialization  Logon Screen appear  Services controller executes & perform full scan to see if any services needed to be loaded

Plug & Play Devices Detection Phase

All devices are detected during Startup Process  if any device found, the required driver is automatically installed from DRIVER.CAB  if driver not found then it is prompted to user

Who was Valentine?

Eight Valentine has been invented? But there is no concept of this in Roman History…..!

Western world celebrate valentine day with full energy but there is no image (talk) of the person in the memories of which this day is celebrating. According to the inventers, at least eight valentines have been invented to which the Roman Catholic called SAINT. Now we are facing difficulty to know that to which valentine, this day is associated.

There is a contradiction in views of the people (Past); they declare three different people Valentine, to which this day is linked. At last the Roman Catholic Church select one among these three and declare 14th February day for it.

This is the custom of Roman Catholic Church. In 270’s Marks R.A Laies Cladetes Ghotti was the king of Roman and he spends this journey only for two years. According to history (Roman), before coming to the journey of king he was a brave soldier and win may fights. In mean while of his victories the young boy (Valentine) comes in. When he was a king he feels the need of more army to become more powerful. So he orders for bachelor people to join his army. When the Roman people came to know about this, the bachelor people start marrying, when the king came to know about this, he pass order to stop further marriages and declare these marriages illegal. In this while the young boy (Valentine) starts a progression of marriages so the king came to know about this and he arrests this boy. In Jail Life the boy Valentine fell in love with a girl there and starts writing letters to each other and at last the boy used “You’re Valentine” in the letters. After some times the boy head were make separate from his body and the church declare him SAINT. The Roman Catholic Church celebrates this day in his memories.

Month February name come from FEBRA. In roam the spring season start from this month and in respect, some different activities are performing there to get clean environment, away from difficulties and get good food. On this day the people hang some parts of horse body in there doors. By doing this they think that we will be safe from difficulties, we will be having peace in our homes and we will get good food. In this month they kept their homes clean and they perform no marriage between 13th and 21ist of this month, even the judge also not wear their caps (Custom Caps for Judge in Roam).

In history there is no discussion about the valentine day, although all the custom and other things are related to Roam and Greeks.

In my opinion, in Pakistan valentine day is always present either to serve our grandparents, or to serve our relatives or our brothers and sisters serve us, or to help other when they are in trouble, so each and every time we have love in our heart for others. The father who felt him self young when he sees his young son and the mother who can’t control herself when see her son marrying. All these colors are of Pakistan so why to follow the western custom to insult our ones and this is not surprise for us because we are the nation who always copies the west. The main contradiction of mine with this day is that this day is not celebrated in respect of all these relation but for a “Love Affair” that was between a girl and boy. This day is just reserved for our young generation (Boys and Girls), on which the girls and boys give red flowers to each others and give cards. This is not only the fault of people but also the companies who specially made thousands of cards fro this day they are equally the participant.

I have no objection on celebrating this day…..! But don’t copy the western and especially on 14th Feb, if u wants to celebrate a love day try to find out people who really need these smalls and small bliss and pleasure.