Catatan

Menunjukkan catatan yang berlabel network

Discover MAC Address through NMAP & ARP

 https://chatgpt.com/share/66fb5b2f-e3b0-8001-8079-1915b31fc199 tools to detect any mac address specific for brand Advantech in the network and to set ip without access to the equipment To detect MAC addresses of specific devices like Advantech in a network and assign IP addresses without direct access to the equipment, you can utilize several tools and techniques. Here's an outline of how to achieve both tasks: 1. Detect MAC Address Specific to Advantech Devices MAC addresses typically have the first three octets (known as the Organizationally Unique Identifier, OUI) that identify the manufacturer of the device. To detect Advantech devices: Tools to Detect MAC Addresses: Nmap (Network Mapper) : Nmap is a powerful network scanning tool that can be used to detect devices on a network based on their MAC addresses. Example command to scan for Advantech devices: sudo nmap -sn 192.168.1.0/24 This command will ping all devices in the subnet and display their MAC addresses. You can look f

Packet Tracer

 Reference : https://www.geeksforgeeks.org/router-configuration-with-cisco-packet-tracer/ 

Error Detection Topics : Parity Check

Imej
  How can the simple parity bit detect a damaged data unit?  The simple parity bit can detect a damaged data unit by ensuring that the total number of bits set to 1 (or sometimes 0, depending on the parity system) in the data unit, including the parity bit itself, is either even or odd. Here's how it works: Adding Parity Bit : Before transmission, a parity bit is added to the data unit. This parity bit is calculated based on the current state of the data unit. If using even parity, the parity bit is set so that the total number of 1-bits in the data unit (including the parity bit) is even. If using odd parity, the parity bit is set so that the total number of 1-bits in the data unit (including the parity bit) is odd. Transmission : The data unit, along with the parity bit, is transmitted. Reception : Upon reception, the receiving system recalculates the parity of the received data unit, including the received parity bit. Error Detection : If the recalculated parity doesn't matc

Error Detection Topics : CRC Detection

Imej
Define the concept of CRC CRC stands for Cyclic Redundancy Check. It's a method used in error detection in digital data transmission or storage. Essentially, CRC involves generating a fixed-size checksum (a sequence of numbers) based on the data being checked. This checksum is appended to the data and transmitted or stored alongside it. When the data is received or retrieved, the CRC checksum is recalculated and compared with the transmitted checksum. If the two checksums match, it's likely that the data was transmitted or stored without errors. If they don't match, it indicates that errors might have occurred during transmission or storage. Discuss the concept of redundancy in error detection Purpose : The primary purpose of redundancy is to provide a means of detecting errors and ensuring data integrity. By adding redundant information to the data, we can perform checks on this extra information to verify the accuracy of the transmitted or stored data. Types of Redundancy

Networks and Data Transmission : Error Detection

Imej
Please go to the original post. I copied this for my personal notes only. REFER THIS LINK :  https://www.computerscience.gcse.guru/theory/error-detection#:~:text=With%20an%20echo%20check%2C%20the,data%20will%20be%20transmitted%20again.   Error Detection There is always the chance that data has been corrupted (changed in some way) during transmission. This is true regardless of the distance of transmission. To avoid having corrupted data it is really important that computers check for errors and correct them wherever possible. There are several methods of error checking, with some being more effective than others. Parity Check An extra bit (parity bit) added to a string of  binary  code to ensure the number of 1-bits are either even or odd, depending upon the  parity check  system used. Method The sending and receiving computers agree the  protocol  to be used (even or odd) The sending computer adds the correct parity bit to the binary data (either an extra 1 or 0) The sending computer

Wireshark export byte

Imej
  Mark the packets File, export specified packets Windows above shown Select packet range n save the file

Multihomed Windows Server

Imej
  Multihomed Windows Server 2012R2 splitting network traffic on both interfaces -  https://serverfault.com/questions/1016239/multihomed-windows-server-2012r2-splitting-network-traffic-on-both-interfaces Chatgpt :  https://chat.openai.com/share/ecb917f3-0132-43c5-9866-56a802a42d12 Configure ECMP what happen when i bridged 2 different network port that connect to 2 different switch huawei and cisco in the server network configuration ? Bridging two different network ports that connect to two different switches, one Huawei and one Cisco, in a server network configuration can be done, but it's essential to understand the potential implications and challenges involved. Here's what happens when you bridge these ports: 1. Layer 2 Bridging: When you bridge the two network ports, you are essentially creating a single broadcast domain. This means that devices connected to both switches will be in the same Layer 2 network, and they can communicate with each other as if they were on the sa

Learn to install Huawei eNSP

Follow step from this page : https://infosyte.com/how-to-install-huawei-ensp-network-simulator/ Facebook page ref : https://www.facebook.com/infosytemalaysia/posts/download-ensp-simulator-from-here-ensp-v100r003c00spc100-setupzipclick-this-link/767427503314681/  Cloud mega link : https://mega.nz/folder/WtFwWIZB#swLFgAQA156pSBNLYQNk2g 

Allow apps to communicate in local network area

Imej
 1. Turn on network discovery. 2. Allow apps sharing 3. Turn off firewall Window Defender. 4. Check for duplex and half duplex. This can be configured on; # Device Manager > Network adapters > Realtek PCIe GbE Family Controller # Control Panel > Network and Sharing Center > Ethernet

Know the different RJ pinout

Imej
Refer : rj11 vs rj8 vs rj45 Know the Difference- RJ9, RJ11, RJ12, RJ45, RJ48 & Pinout What is the difference between RJ9, RJ10, RJ11, RJ12 and RJ45 connectors?

Filter for a specific time frame in Wireshark.

Ref:  https://www.securitronlinux.com/bejiitaswrath/filter-for-a-specific-time-frame-in-wireshark/

C# An established connection was aborted by the software in your host machine

Imej
  The logic behind this error WSAECONNABORTED - An understandable explanation. -  https://www.chilkatsoft.com/p/p_299.asp Wikipedia Winsock -  https://en.wikipedia.org/wiki/Winsock Stackoverflow -  https://stackoverflow.com/questions/14304658/c-sharp-an-established-connection-was-aborted-by-the-software-in-your-host-machi

Cannot connect WiFi. Network card fully utilized.

Imej
The problem: The machine denies connecting with WiFi. The Solution: Reset the log and disconnect the network using step as below; 1. Type netstat -a to check the network loopback. 2. Stop any application that uses the network card such as Apache XAMPP, IIS Server, MSSQL, or MySQL. Also, need to stop any services that used the network activity such as ping, and connect to the server. *Note: loopback can be monitored through Wireframe. *Note: If the machine has installed Docker Desktop, we need to stop the services. 3. Open a command prompt and type ipconfig /release to clear the established connection. 4. Type ipconfig /renew to renew the connection. 5. Okay done.

Wireshark Dark Mode

Imej
How to open Wireshark in Dark Mode. Download the latest Wireshark software. Open a command prompt and type this command  "C:\Program Files\Wireshark\Wireshark.exe" -platform windows:darkmode=2   Yay! Wireshark Dark Mode References: 

System.Net.Sockets.SocketException: 'Only one usage of each socket address (protocol/network address/port) is normally

Imej
 System.Net.Sockets.SocketException: 'Only one usage of each socket address (protocol/network address/port) is normally Option 1 Open the Command Prompt. Type  netstat -ano | findstr ":80"  - where "80" is the port number you are searching for. Look at the last column in the results - the PID. For each PID running that you want to kill, execute  taskkill /PID <PID> /F  in the Command Prompt window (where  <PID>  is the PID that needs to be killed). Option 2 If Option 1 above doesn't work, try rebooting your machine.

Wireshark frame.marked == 1

https://www.wireshark.org/lists/wireshark-users/201004/msg00032.html Tim Black wrote: > I would love to be able to customize the display of packets in an absolute > fashion, e.g. "Ignore this one" or "show only this one and this one". To me > this means there would be a Display Filter field for packet number. Is there > support for this hiding from me somewhere, or if not, is there at least a > plan to support this? To be clear, I am talking about Display Filtering by > the leftmost column entitled "No.". I hope this is not also the answer to my > question. ;-) How about Ctrl-M to mark either the packets you want to display, or the packets you want to ignore. Then: "frame.marked == 1" to display only the marked packets, or "frame.marked == 0" to ignore the marked packets and display only the unmarked packets.

HEX, decimal, binary, CRC calculation

Decimal to Binary converter https://www.rapidtables.com/convert/number/decimal-to-binary.html Online Hex Converter https://www.scadacore.com/tools/programming-calculators/online-hex-converter/

[PSH,ACK] wireshark capture

Reference : https://osqa-ask.wireshark.org/questions/20423/pshack-wireshark-capture/ This is basic TCP communications flow. The ACK indicates that a host is acknowledging having received some data, and the PSH,ACK indicates the host is acknowledging receipt of some previous data and also transmitting some more data. Google will let you search for more info about basic TCP communication.   ACK means that the machine sending the packet with ACK is acknowledging data that it had received from the other machine. In TCP, once the connection is established,   all   packets sent by either side will contain an ACK, even if it's just re-acknowledging data that it's already acknowledged. PSH is an indication by the sender that, if the receiving machine's TCP implementation has not yet provided the data it's received to the code that's reading the data (program, or library used by a program), it should do so at that point. To quote  RFC 793 , the official specification for TCP

Router CP2001/RS980+ dan Cara config

Imej
 Ni cuma untuk notes rujukan Router yang saya beli je. Bukan untuk promote. Just note for myself. πŸ‡²πŸ‡ΎUpgraded Version RS980+ Modified Unlimited Hotspot 4G LTE Modem Router MOD Wifi Huawei B310 B315 CP101+ RS860 Shopee link :  https://shopee.com.my/%F0%9F%87%B2%F0%9F%87%BEUpgraded-Version-RS980-Modified-Unlimited-Hotspot-4G-LTE-Modem-Router-MOD-Wifi-Huawei-B310-B315-CP101-RS860-i.41383663.4943390768 Rujukan: Penerangan tentang jenis-jenis BAND dalam coverage telko -  https://support.yoodo.com.my/hc/en-us/community/posts/900001087583-Penerangan-tentang-jenis-jenis-BAND-dalam-coverage-telko Unboxing 4G Wifi Router LTE CPE RS860 - Review dan Cara Set APN dan Lock Band Setting -  https://www.youtube.com/watch?v=kMkoGYhQgYE Cara Lock 4G atau 3G Only Modem CP2001/RS980+ -  https://www.youtube.com/watch?v=yZ5vUZ3ig5s Speedtest by Ookla - https://www.speedtest.net/

Byte HEX C#

 00,50,00,00,00,00,00,01,00,01, 00,03,01,00,00,00,00,00,00,00, 00,00,00,00,00,01,00,01,02,00, 00,00,00,00,00,00,00,00,00,00, 00,02,00,01,03,00,00,00,00,00, 00,00,00,00,00,00,00,03,00,01, 04,00,00,00,00,00,00,00,00,00, 00,00,00,04,00,01,00,00,00,00, 00,00,00,00,00,00,00,00,d2,18