Thursday, August 7, 2008

Increase your Bandwidth by 20 percent

Windows uses 20% of your bandwidth! Get it back
A nice little tweak for XP. M*crosoft reserves 20% of your available
bandwidth for their own purposes (suspect for updates and interrogating
your machine etc..)

Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:

Local Computer Policy-->Computer Configuration-->Administrative
Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth

Double click on Limit Reservable bandwidth. It will say it is not
configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of
the bandwidth of a connection, but you can use this setting to override
the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO.
This will allow the system to reserve nothing, rather than the default
20 percent.
works on XP Pro, and 2000

Load needed DLL's for Kernel

CAUSE
This behavior may occur if Windows XP or Windows 2000 program files are
either missing or damaged.


RESOLUTION
To resolve this behavior, start your computer from Windows installation
CD-ROM , and then perform an in-place upgrade of Windows.

Method 1: Reinstall Windows XP by using Windows XP

To reinstall Windows XP by using Windows XP, follow these steps:

1. Start your computer.
2. Insert the Windows XP CD in your computer's CD-ROM or DVD-ROM drive.


3. On the Welcome to Microsoft Windows XP page, click Install Windows
XP.
4. On the Welcome to Windows Setup page, click Upgrade (Recommended) in
the Installation Type box (if it is not already selected), and then
click Next.
5. On the License Agreement page, click I accept this agreement, and
then click Next.
6. On the Your Product Key page, type the 25-character product key in
the Product key boxes, and then click Next.
7. On the Get Updated Setup Files page, select the option that you
want, and then click Next.
8. Follow the instructions that appear on the screen to reinstall
Windows XP.


Method 2: Reinstall Windows XP by starting your computer from the
Windows XP CD


To reinstall Windows XP by starting your computer from the Windows XP
CD, follow these steps: 1. Insert the Windows XP CD into your
computer's CD-ROM or DVD-ROM drive, and then restart your computer.
2. When the "Press any key to boot from CD" message appears on the
screen, press a key to start your computer from the Windows XP CD.


Note Your computer must be configured to start from the CD-ROM or
DVD-ROM drive. For more information about how to configure your
computer to start from the CD-ROM or DVD-ROM drive, see your computer's
documentation or contact your computer manufacturer.
3. You receive the following message on the Welcome to Setup screen
that appears:
This portion of the Setup program prepares Microsoft Windows XP to run
on your computer:

To setup Windows XP now, press ENTER.

To repair a Windows XP installation using Recovery Console, press R.

To quit Setup without installing Windows XP, press F3.
Press ENTER to set up Windows XP.
4. On the Windows XP Licensing Agreement screen, press F8 to agree to
the license agreement.
5. Make sure that your current installation of Windows XP is selected
in the box, and then press R to repair Windows XP.
6. Follow the instructions that appear on the screen to reinstall
Windows XP. After you repair Windows XP, you may have to reactivate
your copy of Windows XP.

Lock Down Display Settings

If you administer several office PCs, you may want to prevent users from changing their screen resolutions or digging into the details of your monitor and video card settings. This Registry tweak hides the Settings tab in the
Display Properties window to make all resolution and monitor settings
inaccessible.

1. Start > Run > Regedit

2. Go to
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES.

3. Right-click the key and choose New and Key to create a new key, and
name it System. With the new System key highlighted, right-click and
choose New and DWORD Value. Name the valueNoDispSettingsPage.

4. Double-click this new value and set the Value data to 1 to remove
the Settings tab from the Display Properties window. The effect will be
immediate.

You can restore the Settings tab either by deleting this
NoDispSettingsPage value or setting the value data to 0.

Suppress That System Tray

If you are tired of long strings of icons across your Taskbar from the
System Tray, you can hide them altogether.

1. Start > Run >> Regedit

2. Go to
HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLOR­ER.

3. In the Edit menu, select New and DWORD Value.

4. Name the new Value NoTrayItems-Display.

5. Double-click the new item and give it a Value of 1.

6. Reboot to see it take effect or simply use the WinXP tip to relaunch
Explorer and the Registry with the new settings.

7. Your System Tray will now only contain the system clock.

***To restore your tray icons, return to the NoTrayItemsDisplay Value
and change theValue to 0 or eliminate the Value.

OSI LAYERS MODEL

Introduction
During the early years of our modern computer era, very few standards
and protocols existed between various manufacturers. However, as time
went on and computer technology continued to improve and become more
widespread, it became apparent that standards would be necessary to
ensure compatibility.


This was especially true with regard to networks, and networking
technology. Since the main purpose of a network is to share
information, a standard that governs how this information is formatted,
transmitted, received and verified would make it possible for
information to be shared openly, even when dealing with dissimilar
networks.


This need for a standard means of implementing open communications led
the ISO and ANSI to develop the seven-layer network communications
model known as Open Systems Interconnect. By providing guidelines
regarding the way network equipment should be manufactured and how
network operating systems communicate on a network, the OSI model
became the common link that allows data to be transmitted and exchanged
reliably. Although it does not actually perform any functions or do any
of the actual work, the OSI model defines the way things should be done
by the software and hardware on a network so that communications can
take place between two computers or nodes.


In this way, the OSI model provides a universal set of rules that make
it possible for various manufacturers and developers to create software
and hardware that is compatible with each other. This makes for
organized communications. As I thought about this, I related it to the
freeways that connect the various states of the mainland U.S. Because
all of these freeways were constructed with the same set of standards
regarding the width of each lane, the proper side that a person should
drive on, the speed at which they should travel, and so on, people can
comfortably drive across the country in an organized and efficient
manner and car manufacturers are able to design cars within these
guidelines as well.


On the other hand, if each state had devised its own set of rules, each
differing from the other, not only would there be a lot more chaos on
the roads, but also car manufacturers would have a hard time designing
vehicles that would be compatible with each state's roads. To me, this
illustrates the importance of the OSI model with respect to network
communications. Not only is it the foundation for all network
communications today, but also because it is such a fundamental part of
these communications, it becomes very apparent to me that it is very
important for a network technician to understand the OSI model in full
detail.


The OSI model is made up of the following layers: the physical, data
link, network, transport, session, presentation and application.
Together, these seven layers are collectively referred to as a stack.
As a node receives data, each layer starting with the physical layer
extracts the various portions of the packet and this process works its
way up to the application layer. When data is sent, it begins at the
application layer and travels down to the physical layer. The
information is pushed to the next layer of the stack by means of
commands called primitives. Each layer uses a peer protocol to encode
the information, which ensures that the same layer on the receiving
node will be able to understand the information.


Physical Layer

Beginning at the bottom, the first layer is the physical layer. It
governs the actual voltages, type of electrical signals, mechanical
connections and other items relating to the actual data transmission
medium. This includes cabling types, distances and connectors, as well
as protocols like CSMA/CD.


Data Link Layer

The next layer is the data link layer. This is the layer that actually
constructs the frames, and it also performs error checking using CRC.
It ensures that the frames are sent up to the next layer in the same
order that they were received, providing an error free virtual path to
the network layer. The data link layer consists of two sub layers; the
logical link control (LLC) and the media access control (MAC), which
provide reliable communications by ensuring the data link is not broken
and also by examining packet address information. A bridge is an
example of a device that works at this layer. A bridge learns, forwards
and filters traffic by examining the layer 2 MAC address.


This helps segment network traffic. More recently, bridges have been
replaced by switches, which performs the same functions as a bridge,
but can do so on each port. To find out more about switches, visit the
Products link on the left.


Network Layer
Moving up to the next layer in the stack we come to the network layer.
This layer actually routes packets of data, finding a path (both
physical and logical) to the receiving or destination computer. It
provides a unique address for each node through address resolution. One
of the most common protocols for routing information at this layer is
the Internet Protocol (IP). An example of hardware that can operate at
this layer is a router. Although routers are often used to allow a LAN
to access a WAN, layer 3 switches can also provide routing
capabilities, but often at full wire-speed.


Transport Layer

The transport layer makes sure that the data arrives without errors, in
the proper sequence and in a reliable condition. It uses flow control
to make sure that information is sent at the proper speed for the
receiving device to be able to handle it, and it repackages large data
into smaller messages and then back again at the receiving node. An
example protocol at this layer is the Transmission Control Protocol
(TCP). Layer 4 switches can use the port information found in the TCP
header to provide QoS (Quality of Service) and load balancing. To learn
more about multi-layer switches, visit the Products link.


Session Layer

The session layer establishes the link between two nodes and ensures
that the link is maintained and then disconnected. This is referred to
as the session. It also makes sure the session is orderly, establishing
which node transmits first, how long it can transmit, and what to do in
case of an error. It also handles the security of the session.


Presentation Layer

The presentation layer deals with the actual formatting of the data. It
handles compression, encryption, as well as translation to make sure
differences in formatting can be read by the receiving node. For
example, data might be converted from EBCDIC to ASCII formatting so
that the receiving node can understand it.


Application Layer

This brings us to the seventh and final layer, the application layer.
It allows applications access to network services, such as file and
printer sharing, as well as file transfer and management services. This
would be the layer that a programmer uses to allow his application to
access a network service, such as linking into a database.


Although this explains the flow of data and what processes are
performed by each layer starting with the physical layer and working to
the top, or application, layer, the process would be the same, only
reversed, for data flowing from the application layer and down to the
bottom, or the physical layer.