Difference between Stacking and Clustering on Cisco switches

Stacking Vs Clustering I covered the difference between Stacking and Clustering on Cisco Switches and it also applicable to all other vendor switches.   S.No Stacking Clustering 1 Stacking is a dedicated high performance but interconnecting desktop switches in single wiring closet, single point of authentication and management of desktop switches (single IP address) Clustering is a logical collection of switches independent of hardware interconnect method, single point of authentication and management with no physical boundary. 2 It isolated to the single wiring closet It extends beyond  wiring closet 3 It will not support for the legacy systems. It will support for the legacy systems. 4 It will support limited number of switches for stack It will support 16 switches per cluster 5 No flexibility in stacking design Admin chooses the cluster members. 6 Easily Scalable Not easily scalable as compared to stacking 7 Single IP address for management It […]

How to resolve Microsoft jet oledb 4.0 provider is not registered error

When you are installing new software or application on 64bit operating system, you may find the error “microsoft jet oledb 4.0 provider is not registered”. Microsoft jet oledb 4.0 doesn’t works for 64bit machine. You can use Microsoft.ACE.OLEDB.12.0 for 64 operating system bit system. You can check is it 32 bit or 64 bit system. If 32 bit then use Microsoft.JET.OLEDB else use Microsoft.ACE.OLEDB. There is not a 64 bit version of jet that is why you get that error.  To force your app to use the 32 bit change the target CPU to x86 in the advanced compiler options. To resolve this issue open the project in Visual Studio then: 1. From the solution explorer right-click your project then click Properties 2. Click the Build tab 3. Change Platform target from: Any CPU to x86 4. Re-build your solution Latest Service pack for Microsoft Jet 4.0 Database Engine http://support.microsoft.com/kb/239114/en-gb    

How to remove Shortcut Virus from External Hard Disk or Pendrive

When you connect any Pendrive or Flash Drive or External Hard Disk to your PC, Sometimes you will see all files and folder have changed to shortcuts like below image, and also My Documents, My Pictures and My Videos folders are in there. When you try to open them (double click) nothing happen. It was a virus attack for External Hard disk or Pendrive. Everybody call it Shortcut Virus.               Shortcut virus problem in Removable disk like Pendrive or External hard disk  is most common virus of the computer and users are hanged because to find the solution to clear the shortcut virus. Now I found a solution. A secure data recovery method. I could recover all my data back. No shortcuts anymore.               Steps to Remove Shortcut Virus from Pendrive or External Hard disk 1. Go to […]

A Buyer’s Guide to Network Management Software

Overview Network Management is a set of activities that aim to ensure the health and availability of a network. Network management software allows the administrators to do the set of activities to manage the network and the nodes attached to the network. Network Management activities cover areas such as security, configuration management, change management, incident management, problem management and network inventory maintenance. Network Management activities are often automated through the use of monitoring and reporting utilities. Network management software is not just for monitoring and resolving the issues. It is for complete proactive and automatic network management strategy can eliminate many of the tedious manual tasks typically associated with network maintenance, allowing IT administrators to improve efficiencies, increase performance, reduce risk and manage  growth. When choosing Network management software, IT organizations should look at a broad range of key criteria: functionality, features, architecture, integration, automation, reporting and cost. Only a thorough […]

Verify Cisco IOS Images Checksum with MD5 File Validation

MD5 File Validation on Cisco Router The MD5 File Validation feature provides a mechanism for users to verify that Cisco IOS image files on Cisco Devices are not corrupted or incomplete. This feature uses the industry-standard MD5 algorithm for improved reliability and security. It’s always advisable to check the MD5 checksum after you downloaded the new IOS image and again after you uploaded the new image to the Cisco device. Otherwise, your Routers may not even able to bootup with corrupted images. There are free MD5 checksum program available on the Internet. One such program is the MD5 Checker. And it’s also probably good idea to store the MD5 value alongside with the image. Run MD5 file validation for Cisco IOS, It computes and displays the MD5 values, note down the MD5 values before uploading into Cisco device. How to Verify Cisco IOS Images Using the MD5 Algorithm on Cisco […]

Difference between SNMP RO and SNMP RW Community String

SNMP Protocol Simple Network Management Protocol (SNMP) is a popular protocol for network devices management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. Very difficult to manage a large network with hundreds or thousands of nodes and it requires a large number staff to monitor every computer. SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host. You can monitor network devices such as servers, workstations, printers, routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet Name Service (WINS). Use SNMP management software to monitor any network device on which you install SNMP agent software. By default All Networking devices including Routers, Switches, Firewalls and other devices have inbuilt SNMP agent, we have to enable […]