tag:blogger.com,1999:blog-37755291514360473102023-11-16T01:02:16.560+07:00What You Want to Know About Technologycomputer, network security, troubleshooting, internet, education and more.milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.comBlogger62125tag:blogger.com,1999:blog-3775529151436047310.post-29404162006266448292009-08-19T07:42:00.000+07:002009-08-19T07:42:11.642+07:00What is Proxy meansIn computer networks, a proxy server is a server, that could be a computer system or an application program that acts as a go-between for requests from clients seeking resources from other servers. In other word, proxy server called man in the midle between real server on internet and the client. Simple work from a proxy server, client connects to server, requesting some service, such as a file, connection, web page, or other resource, available from a different server that allocate on other network. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by protocol, time access, or IP address. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly. With this use, our connection to internet will be more simple because we didn't need to contact the real server to have what we want. We can set our proxy server to update the data to synchronous with the real server.<br />
A proxy server has two main purposes:<br />
<ul><li>To keep machines behind it anonymous. It's really help us to keep our privacy and network security.<br />
</li>
<li>To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.</li>
</ul>A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes <i>tunneling proxy</i>. A proxy server can be placed in the user's local computer or at various points between the user and the destination servers or the Internet. A<a href="http://draft.blogger.com/goog_1250636639457"> </a>reverse proxy is a proxy used as a front-end to accelerate and cache in-demand resources (such as a web page).<br />
<br />
<br />
<div class="zemanta-pixie" style="height: 15px; margin-top: 10px;"><a class="zemanta-pixie-a" href="http://reblog.zemanta.com/zemified/23241704-af0c-49a2-bfad-baf04c3ba127/" title="Reblog this post [with Zemanta]"><img alt="Reblog this post [with Zemanta]" class="zemanta-pixie-img" src="http://img.zemanta.com/reblog_e.png?x-id=23241704-af0c-49a2-bfad-baf04c3ba127" style="border: medium none; float: right;" /></a><span class="zem-script more-related more-info pretty-attribution paragraph-reblog"><script defer="defer" src="http://static.zemanta.com/readside/loader.js" type="text/javascript">
</script></span></div>Tulisanku Inspirasikuhttp://www.blogger.com/profile/08967875921398722878noreply@blogger.com2tag:blogger.com,1999:blog-3775529151436047310.post-14487159729631309772009-08-07T07:17:00.004+07:002009-08-07T07:49:24.415+07:00Collaboration between Facebook with TwitterWe all know Facebook is a most growth social networking in internet. It's connect so many people so easily and make a distance has no meaning. Also with Twitter, this is a mini blog with high growing rate as well as Facebook does. Now we will make a collaboration between this two powerfull site. We will make an update from Facebook will be appear in our Twitter homepage and vice versa.<br /><br /><ol><li><span style="font-weight: bold;">Facebook make an update to Twitter<br /></span>First, find your status RSS feed on Facebook. It is buried. To find it, we need to visit our profile and on our mini-feed select "See All". On the right you will see a list of items, select “status stories” and finally below this a feed link can be found. Finally add your newly found status RSS feed to the <a href="http://www.twitterfeed.com/">TwitterFeed</a> service. In this step, we can set our update frequentcy, prefixed it with "From Facebook..." and am publishing just the title from the status feed.</li><li><span style="font-weight: bold;">Twitter make an update to Facebook<br /></span>The official Twitter Facebook app (found here: <a href="http://apps.facebook.com/twitter/" rel="nofollow">http://apps.facebook.com/twitter/</a>) has an option after you install it to update your Facebook status with your latest tweet. We need to understand that there is a delay if you use twitter frequently. But overall it's really powerfull to make frequently update for both with one update in a side.<br /></li></ol><br />Both Facebook and Twitter have pretty extensive APIs that you can develop applications against. With these a lot is certainly possible, but it would take development time and effort to write the code necessary to accomplish whatever else you might want to do. Also keep in mind that "everything" isn't possible. The APIs are limited in certain respects, specially where privacy, technical, or other issues might be involved.milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com3tag:blogger.com,1999:blog-3775529151436047310.post-36898292804350508422009-03-01T19:36:00.000+07:002009-03-01T19:40:45.770+07:00What is set associative mappingset associative cache - A compromise between a direct mapped cache and a fully associative cache where each address is mapped to a certain set of cache locations. The address space is divided into blocks of 2^m bytes (the cache line size), discarding the bottom m address bits. An "n-way set associative" cache with S sets has n cache locations in each set. Block b is mapped to set "b mod S" and may be stored in any of the n locations in that set with its upper address bits as a tag. To determine whether block b is in the cache, set "b mod S" is searched associatively for the tag.A direct mapped cache could be described as "one-way set associative", i.e. one location in each set whereas a fully associative cache is N-way associative (where N is the total number of blocks in the cache). Performance studies have shown that it is generally more effective to increase the number of entries rather than associativity and that 2- to 16-way set associative caches perform almost as well as fully associative caches at little extra cost over direct mapping.<br /><br />source : http://encyclopedia2.thefreedictionary.com/set+associative+cachemilda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com3tag:blogger.com,1999:blog-3775529151436047310.post-45664241725777538262008-12-14T10:21:00.003+07:002008-12-14T11:05:05.986+07:00Have a blog, so make money from it<div align="center"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.payingpost.com/images/bg-logo-valorambiente.png"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 280px; height: 112px;" src="http://www.payingpost.com/images/bg-logo-valorambiente.png" border="0" alt="" /></a><br /></div><p><br /></p><p><br /><br /><br />Every people who alway visit internet know about blog. Yes, a blog. Blog is a personal website that we can make without know about web programming. Thats the truth, a common user can make a blog so easy, just click and click then finish and you have create a blog. Blog is like online diary, most of user write down on their blog about their daily activities.</p><p>But does everyone know how to make money from that hobby, blogging?. Maybe there is a lot of blog user doesnt know about it. <a href="http://www.payingpost.com/">advertise on blogs</a> are one of many way to monetize your blog. There is many way around internet, but this is the most used by blogger in common. For example, there are PTC ( pay to click ), PTR ( pay to review ) and many more. </p><p>Payingpost.com is one of the most popular program in review program. You just need to submit your blog, wait for reviewing by the payingpost.com crew, and make money with post a review that you can get. In payingpost.com we receive the payment with paypal transfer. It give a more reliable transfering money and it so secure. Many blogger have receive their payment and give testimonials that say payingpost.com is the best pay per review program in internet.</p><p>Payingpost.com has a good website looking,eye candy looking. Once you got there, you will know what you have to do. Sign up for new account is the first way for you. If you have any question, there is a crew that can answer all your question about this program with IM. They will be so pleasure to help you.</p><p>If you want to know more, read this <a href="http://www.payingpost.com/Get-paid-to-post-hones-reviews.php">article</a> carefully. I suggest you that have a blog, you have to follow my way. Run your hobby, create money. Do you like it, right? I've join this payingpost.com for a long time, and I have a good income from it. I can work at home, enjoy my life, and I have money from my hobby. </p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com1tag:blogger.com,1999:blog-3775529151436047310.post-26479238821935839912008-12-04T08:27:00.000+07:002008-12-04T08:30:04.472+07:00Technology And The WhistleblowerAs the meeting comes to a close, your boss smirks with an self assured arrogance. He then says that you should seriously consider his offer, because he has it on good authority, that there may be a very localized downsizing in your department. Wouldn’t it be nice to smirk back and just say “no thanks”.<br /><br />This scenario plays out more often then most people realize. With all of the recent business and government scandals there were a lot of people who knew that books were being cooked, laws being broken and the health of the public being put at risk, just to keep profits high and investors content. Many people felt that there was nothing they could do against powerful executives and corrupt bureaucrats. The credibility of a low level employee compared to that of a ‘successful’ corporate executive is a huge hurdle to overcome. Also, corporate lawyers are there to defend the company, even from internal hazards. So, once a person decides to speak up, they must be prepared to have their credibility brutally attacked and the onslaught of legal preceding from an all-star team of corporate lawyers.<br /><br />Just the thought of legal proceedings can stop a person from making the ethical choice. It’s easy for people to be vilified by their employer, at which point the credibility of the person speaking out is destroyed. How is possible for a single person to fight a company or government with infinite resources? Many years ago, it was practically impossible. However, the “digital revolution” may have changed the balance of power. For a “whistleblower” to be effective they need proof of wrong doing and a method to communicate those issues to the public. The availability of compact electronic devices such as digital audio recorders and digital cameras allow an individual to document many of the issues and bring the power back to the whistleblower.<br /><br />The first piece of technology that should be in every whistleblowers repertoire is a digital audio recorder. These devices are so small that they can be put in a shirt pocket without being noticed. Once you decide to “blow the whistle” you should start recording all of your conversations. Keep a log of the items discussed, so that you can refer to the appropriate recording when needed, otherwise you can spend hours going back over the content. The best part is that these devices are not expensive. A digital voice recorder costs about $100, or many times MP3 players have a microphone built into the device, so they can be used to record conversations.<br /><br />Another device that is very handy is a voice modem with telephone recording software. This will allow you to, hook up your phone, and record any conversations that occur over the phone. If you get fired before you have all the evidence, sometimes telephone conversations, with the people in power, can help to document important facts, because people very rarely think they are being recorded and say things that they probably should not have.<br /><br />Make sure you check your local laws regarding conversation recording. In most places it is legal to record with one-party consent. One-party consent means that if you are involved in the conversation, you do not need to notify the other parties that you are recording the conversation. In Canada, one-party consent is the law. In the United States it is a little more complicated, as some states have their own regulations. You can refer to this recording law chart (http://www.snakeoil.ca/docs/recordinglaw.html) to determine what laws affect you. If in doubt, speak with a lawyer.<br /><br />The third device every whistleblower should have is a digital camera. Many times the violations are in manufacturing or packaging, which could be a public health concern. These can be very hard to document and prove, since the paper records may be manipulated. A picture says a thousand words though, and will help authorities uncover doctored documents. When taking pictures be very cautious as most companies prohibit camera’s on their premises. Many cell phones are now equipped with digital camera’s, so they are easier to conceal. Take as many pictures as you can and try to prove the date you took them. Some camera have a date stamp feature, even though this is easy to manipulate. The best option is to take a picture of the daily newspaper beside the offending subject. This is very hard for lawyers to argue against and disprove that the violations did occurred on that particular date.<br /><br />The last piece of equipment needed is a computer. When the authorities begin investigating your complaint, you will need to produce your evidence such as documents pointing to the issues. Most corporations are moving towards a paperless environment, which means that these documents will only be accessible by a computer. The other important part your computer plays, is to backup all of those images and audio recordings. Make sure your computer has a CD writer or DVD writer. Take these backups and put them somewhere secure, like a bank deposit box.<br /><br />One area of concern is the removal of corporate documents from the office. This can violate many legal agreements you may have signed. If you are worried about this, there is a very simple solution. Backup all of the evidence files at work and stash them somewhere in the office. In the ceiling or in duct work is a great place. Basically, anywhere nobody ever looks. When it is time to produce these documents, simply tell the authorities that you have stashed them in a safe place at the office. The evidence is kept safe and you haven’t violated any agreements, a win-win situation.<br /><br /><p>In the future, companies may begin banning digital devices from the workplace for the exact reasons being discussed here. However, if were are persistent, it may go the other way and corporate behaviour may change, which is the ultimate goal of being a whistleblower. The days of “plausible deniability” and “disgruntled employees” are disappearing quickly.</p><p>Writer : Darcy O'Neil<br />Source : <br /><code>http://www.articlecity.com/articles/computers_and_internet/article_1811.shtml</code></p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-32357169215518327682008-12-03T23:39:00.002+07:002008-12-03T23:41:50.532+07:00OpenOffice 3.0 Final<div align="center"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://softporal.ucoz.ru/Images4/PortableOpenOffice.org_wm.JPG"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 499px; height: 409px;" src="http://softporal.ucoz.ru/Images4/PortableOpenOffice.org_wm.JPG" border="0" alt="" /></a><br /></div><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p>OpenOffice.org 3 is the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more. It is available in many languages and works on all common computers. It stores all your data in an international open standard format and can also read and write files from other common office software packages. It can be downloaded and used completely free of charge for any purpose. <br /></p><br />Great Software requires great people. OpenOffice.org 3 is the result of over twenty years' continuous high quality software engineering. Designed from the start as a single piece of software, OpenOffice.org 3 has a consistency and a quality that is world class. Its open-source development model means there are no secrets. <br />Roll your mouse over the screenshots for more details of the main components (requires javascript). <br /><br />Easy to choose, easy to install, easy to learn - OpenOffice.org 3 is the easy choice for an office software suite. OpenOffice.org 3 is suitable for complete beginners, but if you have used any other office software, that's ok too. OpenOffice.org 3 will make full use of what you already know - through familiar screens and menus - and also what you have - by reading existing files with no retyping. <br /><br /><p>You may use OpenOffice.org 3 for any purpose without restriction: private, educational, public administration, commercial...</p><p>download link <code>http://rapidshare.com/files/152437306/OOo_3.0.0_Win32Intel_install_en-US.exe</code><br /></p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-6690989163938123012008-12-03T01:22:00.000+07:002008-12-03T01:24:14.249+07:00What is VPS??A Virtual Private Server (VPS) is a hosting environment that combines the benefits of both shared hosting and dedicated hosting. It does this by creating a virtual server that runs inside a hardware server via a specially designed partition.<br /><br />Each Virtual Private Server partition runs its own operating system in a secure and private environment and cannot be accessed or interrupted by its neighbours. This system gives you the same level of root access as a dedicated server whilst sharing the cost of the hardware. With a VPS you are virtually running your own server but at a fraction of the cost.<br />The flexibility of a dedicated server<br /><br />Users share system resources, such as the CPU and memory, but unlike shared hosting (a virtual host on a shared hardware server ) the file system is fully partitioned. This means that up-time is more consistent; while root access to the server provides the flexibility to add and change modules and to install your own software.<br />As cost effective as shared hosting<br /><br />Partitioning a single hardware server into multiple servers is nothing new. In fact, mainframe computers have long been partitioned into multiples. In 1996, Japanese giant Verio started to migrate the technique into hosting as a highly cost-effective storage solution.<br />How much technical knowledge do I need?<br /><br />All our VPS options include the Plesk control panel, which makes it easier to administer your websites and services.<br /><br />However, because a VPS gives you root-level access, allowing you to install whatever software you like, you will need some technical knowledge and understanding of how servers work to run a VPS effectively.<br />Why call it VPS 2.0?<br /><br />We've called our new VPS range VPS 2.0 because of our next generation improvements to both performance and hardware. Our servers are 9th generation Dell machines with embedded Intel® Virtualization (VT®) optimisation in the Intel® boards. They are designed by Dell specifically to ramp up VPS performance.<br /><br />The inclusion of the very latest range of software and control panels for Windows and Linux is accompanied by price reductions across the range so we're increasing performance, features and value at exactly the same time.<br />Powerful partnerships working for you<br /><br />We've partnered with SWsoft to offer you a choice between Ubuntu Linux and Microsoft Windows virtual private server systems, making us the first UK host to deliver Windows SQL Server 2005 VPS hosting using the latest Plesk 8 and Virtuozzo Power Panel technology.<br /><br />All VPS 2.0 systems are hosted on Dell PowerEdge 2950 servers with quad-core Intel® Xeon® processors for maximum multi-tasking performance and 15,000 RPM SCSI RAID 10 drives for data speed and integrity.<br /><br />As we're a certified Intel Server Centre of Excellence using a Tier 1 Network with 50,000 Mbit Connectivity, you can also trust we set the access, speed and safety benchmarks you need.<br /><p><br /></p><p><a href="http://www.webfusion.co.uk/virtual-private-servers/whatisvps.php">source</a></p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-51700125034995449422008-11-25T23:52:00.002+07:002008-11-26T00:00:37.547+07:00Carlsberg launches Web-TV<div style="text-align: center;"><img src="http://www.bloggerwave.com:8080/Bloggerwave/uploadImages/752653709_1226852311155_fanlife_shouting_3.jpg" style="border-style: none;" alt="" /><br />Who didnt know football?<br /><a rel="nofollow" href="http://www.bloggerwave.com/blog_ClickTrack.php?OpportunityId=86&BlogId=19833&LinkId=0">www.partofthegame.tv</a><br /><div style="text-align: left;">Almost every poeple in this world love this game. Oldman or youngman, man and women, has no different in this game. Maybe you loose your football club match? Don't worry about that, you can find it in Partofthegame.tv. Partofthegame.tv is one from a lot of web tv that give you what you want.<br /><br />Carlsberg web-tv has so much galery of various match around the world. Find and search what you want to see, especialy football moment.<br />Be sure not to miss the video clips about football funnies and rituals from the Football Magic.<br /><br /></div></div><a href="http://www.bloggerwave.com/" target="_blank" rel="nofollow"><img src="http://bloggerwave.com/blogviewcount.php?pic=sponsorlogo.gif&OpportunityId=86&BlogId=19833" /></a>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-45473960038686602362008-11-23T17:00:00.003+07:002008-11-23T17:11:38.632+07:00Routing Versus Bridging<div style="font-family: arial;font-family:courier new;" class="Section1"><i><span style="font-size:12;"><span style="font-size:100%;">When Connecting to the Wireless, xDSL or Cable Network</span><o:p></o:p></span></i> <p class="MsoNormal" style=""><span style="font-size:11;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="font-size:100%;"><b>Summary:<o:p></o:p></b></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;"><b><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></b></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;">As <span style="font-weight: bold;">wireless</span>, <span style="font-weight: bold;">cable</span> and<span style="font-weight: bold;"> xDSL</span> technologies emerge, a growing consideration is how to connect to the network. Although much can be said about different methods, it really boils down to two: bridging or routing.<span style=""> </span>Now for those experienced in networking, they will know that this question has been around since routing and bridging technologies have been. However the new element here is that the discussions always centered on <span style="font-weight: bold;">LAN</span>’s and/or private <span style="font-weight: bold;">WAN</span>’s. When connecting to the Internet there are new considerations to keep in mind when making your decision. This technical document is geared for those who need assistance in the decision for choosing what equipment and how to connect to the cable or xDSL network.<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="font-size:100%;"><b>Background:<o:p></o:p></b></span></p> <p class="MsoNormal" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;">Now before we can argue routing versus bridging (or vice versa for that matter) we need to be clear on what both devices are and how they behave. So let’s define each one:<o:p></o:p></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;"><u><span style="font-weight: bold;">Bridge:</span><o:p></o:p></u></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;">A bridge is a device that connects two segments of the same network. The two networks being connected can be alike or dissimilar. Unlike routers, bridges are protocol-independent. They simply forward packets without analyzing and re-routing messages. <o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><u><span style="font-weight: bold;">Router:</span><o:p></o:p></u></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;">A router is a device that connects two distinct networks. Routers are similar to bridges, but provide additional functionality, such as the ability to filter messages and forward them to different places based on various criteria. The Internet uses routers extensively to forward packets from one host to another. <o:p></o:p></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;">Based on these definitions we can see that key difference between a bridge and router is that a bridge does not look at protocols and a router does. A bridge does not look at traffic for the purpose of allowing or disallowing it, and it does not decide what to do with certain types of traffic; it simply moves data from one network to another. Whereas a router examines protocols and decides what to do with each packet based on defined criteria.<o:p></o:p></span></p> <p class="MsoBodyText" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="font-size:100%;"><b>Router vs. Bridge in Cable & DSL Environments<o:p></o:p></b></span></p> <p class="MsoBodyText" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;">When you order Internet access either via a cable or xDSL connection, they will offer you a bridge (although it may often be called a “modem,” it is a bridge). These are very low cost (usually around $200,) and will connect your machine to the ISP’s network. Now this is a cost-effective solution, however there are some very apparent reasons on why you should consider a router over a bridge. Let’s look at an example to illustrate this point<o:p></o:p></span></p> <p class="MsoBodyText" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <div style=""><div style="text-align: center;"> </div><table cellpadding="0" cellspacing="0" height="390" hspace="0" vspace="0" width="537"> <tbody><tr> <td style="padding: 0in;" align="left" height="390" valign="top"><div style="text-align: center;"> </div><p style="text-align: center;" class="MsoBodyText"><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" spt="75" preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f"> <v:stroke joinstyle="miter"> <v:formulas> <v:f eqn="if lineDrawn pixelLineWidth 0"> <v:f eqn="sum @0 1 0"> <v:f eqn="sum 0 0 @1"> <v:f eqn="prod @2 1 2"> <v:f eqn="prod @3 21600 pixelWidth"> <v:f eqn="prod @3 21600 pixelHeight"> <v:f eqn="sum @0 0 1"> <v:f eqn="prod @6 1 2"> <v:f eqn="prod @7 21600 pixelWidth"> <v:f eqn="sum @8 21600 0"> <v:f eqn="prod @7 21600 pixelHeight"> <v:f eqn="sum @10 21600 0"> </v:formulas> <v:path extrusionok="f" gradientshapeok="t" connecttype="rect"> <o:lock ext="edit" aspectratio="t"> </v:shapetype><v:shape id="_x0000_i1025" type="#_x0000_t75" style="'width:457.5pt;" fillcolor="window"> <v:imagedata src="./Routing_v_Bridging_files/image001.png" title=""> </v:shape><![endif]--><!--[if !vml]--><span style="font-size:100%;"><img src="http://www.winncom.com/add/Routing_v_Bridging_files/image002.gif" shapes="_x0000_i1025" height="442" width="610" /></span><!--[endif]--><span style="font-size:100%;"><o:p></o:p></span></p> </td> </tr> </tbody></table> </div> <!--[if !supportTextWrap]--><span style="font-size:100%;"><br /></span> <!--[endif]--> <p class="MsoBodyText" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style=""><span style="font-size:100%;"><b><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></b></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><b>Security Risk: </b></span><span style="font-size:100%;">In this example, we have two different customers bridged to the Internet using the same ISP. You can see that both customers have IP addresses on the same IP network. This means that broadcast from Customer A’s network will propagate to Customer’s B network. For example if machines on both networks are utilizing file and print services through the Windows Network, it is perfectly plausible (and has happened) that machines from Customer A can show up in the Network Neighborhood of Machines on Customer B’s network. Now for security reasons alone this is a very undesirable situation.<o:p></o:p></span></p> <p class="MsoBodyText" style=""><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;">Everyone is talking about firewalls, filtering, etc. Many people connecting to the Internet today do not realize how vulnerable they are to attacks from the Internet. When utilizing a dial up connection, the exposure is only for the time you are connected, however, along with the all the benefits of a permanent connection, there is a big drawback: your network is exposed to the Internet 24 hours a day, 7 days a week. When you are at home asleep, it could be quite possible someone out there is working away at your network in the hopes of destroying or stealing data. Although this is not a pleasant thought there are very simple means to prevent this happening. <o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;">The first thing is have a routed account. With a routed account you have a device examining all traffic before it enters your network. This means that traffic not destined for your network will not be routed to your LAN, broadcast storms, and other network related issues on other networks connecting to your ISP will not effect your network. Now the biggest gain from a routed account is security. A Router has the ability to filter Internet traffic. This means the router connecting you to the Internet can discriminate which traffic it will allow into your network, and which traffic it will not. A Router also has the ability to “hide” all of the IP addresses on your network and make them appear as if the were only one IP address out on the Internet. By doing this, you have just eliminated 90% of all security threats.<o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><b>Other Benefits: </b></span><span style="font-size:100%;">Aside from security other benefits of using a<span style=""> </span>Router over a bridge include: <o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="margin-left: 0.25in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size:100%;">·<span style=""> </span></span><!--[endif]--><span style="font-size:100%;">You will have a contiguous block of IP addresses, rather than sporadic address across a network.<o:p></o:p></span></p> <p class="MsoBodyText" style="margin-left: 0.25in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size:100%;">·<span style=""> </span></span><!--[endif]--><span style="font-size:100%;">A<span style=""> </span>Router can use DHCP to assign workstations addresses on the LAN, preventing specific configuration in each device.<o:p></o:p></span></p> <p class="MsoBodyText" style="margin-left: 0.25in; text-align: justify; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size:100%;">·<span style=""> </span></span><!--[endif]--><span style="font-size:100%;">A<span style=""> </span>router has the ability to use NAT (Network Address Translation), thus only requiring you to obtain 1 IP address from your ISP. Cost saving as well as security enhancement<o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;">For the above reasons it seems quite clear that a routed account has distinct advantages over a bridged connection.<span style=""> </span>For wireless bridge connections an Ethernet broadband router can be placed between the bridge and the LAN, thus providing all the benefits of routing to cable, ADSL and other environments.</span></p><span style="font-size:100%;"><br /></span><p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><br /></span></p><p class="MsoBodyText" style="text-align: justify;"><span style="font-size:100%;"><a href="http://www.winncom.com/add/Routing_v_Bridging.htm">source</a></span><br /><span style="font-size:11;"><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:11;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> <p class="MsoBodyText" style="text-align: justify;"><span style="font-size:11;"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p> </div>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-79379584728147218642008-05-28T10:18:00.000+07:002008-05-28T10:18:00.376+07:00What is the purpose of Wi-Fi ad-hoc mode? Why would I use it?<p>The 802.11 standard defines two modes of operation: Infrastructure mode, where all stations communicate through an access point, and ad-hoc mode, where stations communicate directly without the help of an intermediary. Ad-hoc mode can be useful for temporary peer-to-peer applications, such as when two laptop users want to exchange files over Wi-Fi. </p><p>Most businesses discourage use of ad-hoc mode because they prefer to enforce corporate security policy at the access point and gateway or switch connected to the access point. Users that communicate directly over ad-hoc mode essentially bypass those security measures. Ad-hoc mode can even be used as an attack method. For example, a Windows XP PC that previously associated to an access point with a given name (SSID) can be tricked into automatically re-associating in Ad-hoc mode to an attacker's laptop that advertises that SSID. You avoid this attack by <a href="http://www.nmrc.org/pub/advise/20060114.txt">configuring XP</a> (or any other wireless client software) to associate to preferred SSIDs in infrastructure mode only. </p><p>On the other hand, several vendors are now using ad-hoc mode as the foundation for building <a href="http://research.microsoft.com/mesh/">wireless mesh networks</a>. Mesh networks have many applications, including outdoor metropolitan networks and mobile ad-hoc networks (MANETs). To learn more about Ad-hoc mode and its use in mesh networks, visit this <a href="http://w3.antd.nist.gov/wctg/manet/adhoclinks.html">NIST</a> resource page. A standard for mesh networks is now under development, designated IEEE 802.11s. </p><p>In short, ad-hoc mode has many constructive uses, but unless you have a specific reason for enabling, your safest best today is to disable ad-hoc mode to prevent unwanted or risky associations.<br /><br /><br /><a href="http://searchnetworking.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid7_gci1198955,00.html">source</a><br /></p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-77126665703046274092008-05-28T10:07:00.000+07:002008-05-28T10:07:00.209+07:00What is Hub<p> In general, a hub is the central part of a wheel where the spokes come together. The term is familiar to frequent fliers who travel through airport "hubs" to make connecting flights from one point to another. In data communications, a hub is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. A hub usually includes a <a href="http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci213079,00.html" class="inline">switch</a> of some kind. (And a product that is called a "switch" could usually be considered a hub as well.) The distinction seems to be that the hub is the place where data comes together and the switch is what determines how and where data is forwarded from the place where data comes together. Regarded in its switching aspects, a hub can also include a <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212924,00.html" class="inline">router</a>. </p><p> 1) In describing network topologies, a hub <term>topology</term> consists of a <a href="http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci211629,00.html" class="inline">backbone</a> (main circuit) to which a number of outgoing lines can be attached ("dropped"), each providing one or more connection <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212807,00.html" class="inline">port</a> for <a href="http://whatis.techtarget.com/definition/0,,sid9_gci211937,00.html" class="inline">device</a> to attach to. For Internet users not connected to a local area network, this is the general topology used by your access provider. Other common network topologies are the <a href="http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci211718,00.html" class="inline">bus</a> network and the <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212902,00.html" class="inline">ring</a> network. (Either of these could possibly feed into a hub network, using a <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211705,00.html" class="inline">bridge</a>.) </p><p> 2) As a network product, a hub may include a group of <a href="http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212583,00.html" class="inline">modem</a> cards for dial-in users, a gateway card for connections to a local area network (for example, an <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212080,00.html" class="inline">Ethernet</a> or a <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213154,00.html" class="inline">Token Ring</a>), and a connection to a <term></term> line (the main line in this example). </p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-68381588408408182652008-05-28T09:10:00.000+07:002008-05-28T09:10:00.643+07:00What is bridge in network worldIn telecommunication networks, a bridge is a product that connects a local area network (<a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212495,00.html" class="inline">LAN</a>) to another local area network that uses the same <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212839,00.html" class="inline">protocol</a> (for example, <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212080,00.html" class="inline">Ethernet</a> or <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213154,00.html" class="inline">Token Ring</a>). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs). <p> In bridging networks, computer or <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212665,00.html" class="inline">node</a> addresses have no specific relationship to location. For this reason, messages are sent out to every address on the network and accepted only by the intended destination node. Bridges learn which addresses are on which network and develop a <i>learning table</i> so that subsequent messages can be forwarded to the right network. </p><p> Bridging networks are generally always interconnected local area networks since broadcasting every message to all possible destinations would flood a larger network with unnecessary traffic. For this reason, <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212924,00.html" class="inline">router</a> networks such as the Internet use a scheme that assigns addresses to nodes so that a message or packet can be forwarded only in one general direction rather than forwarded in all directions. </p><p> A bridge works at the data-link (physical network) level of a network, copying a data <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212152,00.html" class="inline">frame</a> from one network to the next network along the communications path. </p><p> A bridge is sometimes combined with a router in a product called a <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211707,00.html" class="inline">brouter</a>.<br /></p><br /><a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211705,00.html">source</a>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-3779092044493003342008-05-27T09:05:00.001+07:002008-05-27T09:10:10.344+07:00Switch is .....<p> In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination. In the traditional <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211787,00.html" class="inline">circuit-switched</a> telephone network, one or more switches are used to set up a dedicated though temporary connection or <a href="http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci211786,00.html" class="inline">circuit</a> for an exchange between two or more parties. On an <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212080,00.html" class="inline">Ethernet</a> local area network (<a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212495,00.html" class="inline">LAN</a>), a switch determines from the physical device (<term>Media Access Control</term> or MAC) address in each incoming message <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212152,00.html" class="inline">frame</a> which output port to forward it to and out of. In a wide area <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212737,00.html" class="inline">packet-switched</a> network such as the <a href="http://searchwindevelopment.techtarget.com/sDefinition/0,,sid8_gci212370,00.html" class="inline">Internet</a>, a switch determines from the <a href="http://searchwindevelopment.techtarget.com/sDefinition/0,,sid8_gci212381,00.html" class="inline">IP address</a> in each <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212736,00.html" class="inline">packet</a> which output port to use for the next part of its trip to the intended destination. </p><p> In the Open Systems Interconnection (<a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212725,00.html" class="inline">OSI</a>) communications model, a switch performs the <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci214603,00.html" class="inline">layer 2</a> or <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211899,00.html" class="inline">Data-Link layer</a> function. That is, it simply looks at each packet or data unit and determines from a physical address (the "MAC address") which device a data unit is intended for and switches it out toward that device. However, in wide area networks such as the Internet, the destination address requires a look-up in a routing table by a device known as a <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212924,00.html" class="inline">router</a>. Some newer switches also perform routing functions (<a href="http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci214604,00.html" class="inline">layer 3</a> or the <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212637,00.html" class="inline">Network layer</a> functions in OSI) and are sometimes called <term>IP switch</term>es. </p><p> On larger networks, the trip from one switch point to another in the network is called a <a href="http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212253,00.html" class="inline">hop</a>. The time a switch takes to figure out where to forward a data unit is called its <a href="http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci212456,00.html" class="inline">latency</a>. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the <a href="http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci211629,00.html" class="inline">backbone</a> and <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212176,00.html" class="inline">gateway</a> levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as <i>core switches</i> and the latter as <i>desktop switches</i>. </p><p> In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213154,00.html" class="inline">Token Ring</a> or <a href="http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci211718,00.html" class="inline">bus</a> arrangement in which each possible destination inspects each message and reads any message with its address. </p><h4>Circuit-Switching version Packet-Switching</h4> A network's paths can be used exclusively for a certain duration by two or more parties and then switched for use to another set of parties. This type of "switching" is known as <i>circuit-switching</i> and is really a dedicated and continuously connected path for its duration. Today, an ordinary voice phone call generally uses circuit-switching. <p> Most data today is sent, using <a href="http://searchcio-midmarket.techtarget.com/sDefinition/0,,sid183_gci211948,00.html" class="inline">digital</a> signals, over networks that use <i>packet-switching</i>. Using packet-switching, all network users can share the same paths at the same time and the particular route a data unit travels can be varied as conditions change. In packet-switching, a <a href="http://whatis.techtarget.com/definition/0,,sid9_gci212552,00.html" class="inline">message</a> is divided into packets, which are units of a certain number of bytes. The network addresses of the sender and of the destination are added to the packet. Each network point looks at the packet to see where to send it next. Packets in the same message may travel different routes and may not arrive in the same order that they were sent. At the destination, the packets in a message are collected and reassembled into the original message.<br /></p><br /><p><a href="http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci213079,00.html">source</a><br /></p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-59826381063493156492008-05-27T09:03:00.000+07:002008-05-27T09:04:45.886+07:00Router is ......<p>In <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212737,00.html" class="inline">packet-switched</a> networks such as the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212736,00.html" class="inline">packet</a> should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212176,00.html" class="inline">gateway</a> (where one network meets another), including each <a href="http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci212802,00.html" class="inline">point-of-presence</a> on the Internet. A router is often included as part of a network <a href="http://searchtelecom.techtarget.com/sDefinition/0,,sid103_gci213079,00.html" class="inline">switch</a>. </p><p>A router may create or maintain a table of the available routes and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through a number of network points with routers before arriving at its destination. Routing is a function associated with the <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212637,00.html" class="inline">Network layer</a> (<a href="http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci214604,00.html" class="inline">layer 3</a>) in the standard model of network programming, the Open Systems Interconnection (<a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212725,00.html" class="inline">OSI</a>) model. A <term>layer-3 switch</term> is a switch that can perform routing functions.</p><p>An <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212031,00.html" class="inline">edge router</a> is a router that interfaces with an asynchronous transfer mode (<a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213790,00.html" class="inline">ATM</a>) network. A <a href="http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci211707,00.html" class="inline">brouter</a> is a network <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211705,00.html" class="inline">bridge</a> combined with a router.</p><p>For home and business computer users who have high-speed Internet connections such as cable, satellite, or DSL, a router can act as a hardware <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html" class="inline">firewall</a>. This is true even if the home or business has only one computer. Many engineers believe that the use of a router provides better protection against hacking than a software firewall, because no computer <term>Internet Protocol address</term> are directly exposed to the Internet. This makes <a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214054,00.html" class="inline">port scan</a>s (a technique for exploring weaknesses) essentially impossible. In addition, a router does not consume computer resources as a software firewall does. Commercially manufactured routers are easy to install, reasonably priced, and available for hard-wired or wireless networks. </p>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-44310171047154107852008-04-10T14:37:00.001+07:002008-04-10T14:39:08.476+07:00RAM Overview<b class="author">by : Christophe Catesson</b><br /><br />There are two big categories of random access memories:<br /><br />* Dynamic memories (DRAM, Dynamic Random Access Module), not very costly. They are in most cases used for the central memory of the computer<br /><br />* Static memories (SRAM, Static Random Access Module), quick and expensive. SRAM is notably used for cache memories of the processor<br /><br />Functioning of the random access memory<br /><br />The random access memory is constituted of hundred of thousand small condensers storing charges. When it is loaded, the logical state of the condenser is equal to 1, otherwise it belongs to 0, what means that every condenser represents one bit of memory.<br /><br />Given that condensers off-load, it is always necessary to recharge them in a space of regular time called cycle of refreshment. Memory DRAM requires cycles of refreshment for instance (Ns) is about 15 nanoseconds.<br /><br />Every condenser is coupled with a transistor allowing to "recover « or to change the state of the condenser. These transistors are lined up in form of matrix, that is they achieve a hut memory (so called memory) by a line and a column.<br /><br />So, for a memory of type DRAM, the time of access is of 60 nanoseconds (35ns of delay of cycle and 25 ns of time of latency). On a computer, the time of cycle corresponds contrary to the frequency of the clock, for instance for a computer pulsated in 200 MHz, the time of cycle is 5 ns (1 / (200*106)).<br /><br />As a result a computer having a frequency well brought up and using memories the time of access of which is much longer than the time of cycle of the processor must perform cycles of wait to access to the memory. In the case of a computer pulsated in 200 MHz using memories of types DRAM (which the time of access is of 60ns), there are 11 cycles of wait as a cycle of transfer. The performances of the computer are of as much diminished as there are cycles<br /><br />Formats of Random Access Memory (RAM)<br /><br />There are numerous types of random access memories. These all come in the form of barrettes of memory attachable on the motherboard.<br /><br />* SIMM (Single Inline Memory Module): it is about printed circuits among which one of the faces has fleas of memory. There are two types of barrettes SIMM, according to the number of connector cables (30 or 72)<br /><br />* DIMM (Dual Inline Memory Modulates) are from memories 64 bits, what explains why it is not necessary to match them. Barrettes DIMM have fleas of memory on both sides of printed circuit and have also 84 connector cables on each side, what endows them with a total of 168 brooches. They have bigger dimensions than barrettes SIMM (130x25mm).<br /><br />* RIMM (Rambus Inline Memory Module, conscripts also RD-RAM or DRD-RAM) are from memories 64 bits developed by the society Rambus. They have 184 brooches. These barrettes have two notches of location (détrompeurs), avoiding very risk of confusion with the previous modules. Considering their well brought up speed of transfer, barrettes RIMM have a thermal film made responsible for ameliorating the clearing up of warmth. As in the case of DIMM, there are modules of smaller size, called SO RIMM (Small Outline RIMM), intended for laptop computers. Barrettes SO RIMM include only 160 brooches.<br /><br />* DRAM (Dynamic RAM, dynamic RAM) is the type of memo most spread at the beginning of the millennium. It is about a memory from which transistors are lined up in a matrix according to lines and of columns. A transistor, coupled with a condenser gives the information of a bit. 1 byte consisting of 8 bits, a barrette of memory 256 Mb DRAM will contain 256 therefore * 2^10 * 2^10 = 256 * on 1024 * on 1024 = 268 435 456 bytes = 268 435 456 * 8 = 2 147 483 648 bits = 2 147 483 648 transistors. A 256 Mb barrette has so in reality a capacity of 268 435 456 bytes, that is 268 Mb! These are memories from which the time of access is 60 ns. On the other hand, accesses memory are made in general on data lined up consecutively in memory. So the mode of access in gust (burst mode) allows to achieve the three successive data in the first one without time of additional latency.<br /><br />* DRAM FPM to speed up accesses to DRAM, there is a technology, called pagination consisting in achieving data located on the same column by changing the address of the line only, what allows to avoid the repetition of the number of column between the reading of each of the lines. They speak then about DRAM FPM (Fast Page Mode). FPM allows to acquire time of access in the order of 70 - 80 nanoseconds for a frequency of functioning that can go from 25 to 33 Mhz.<br /><br />* DRAM EDO (Extended Data Out, Goes out of data ameliorated sometimes also called "hyper-page") appears in 1995. The technology used with this type of memory consists in addressing the following column during the reading of the data of a column. It creates an overlapping of accesses allowing to save time on every cycle. The time of access to memory EDO is therefore about 50 - 60 nanoseconds for a frequency of functioning going 33 - 66 Mhz. So, RAM EDO, when it is used in mode gust allows to acquire cycles of form 5-2-2-2, that is a benefit of 4 cycles on the access to 4 data. As much as memory EDO did not accept the upper frequencies in 66 Mhz, it disappeared in aid of SDRAM.<br /><br />* SDRAM (Synchronous DRAM, translate synchronous RAM), appeared in 1997, allows a reading of data synchronized with the bus of the card-mother, contrary to memories EDO and FPM (qualified as asynchronous) having their own clock. SDRAM allows therefore to free itself from time of wait owed to synchronization with the card-mother. This one allows to acquire a cycle in mode gust of form 5-1-1-1, that is to say benefit of 3 cycles in comparison with RAM EDO. In that way SDRAM is able of working with a cadenza going until 150 Mhz, allowing him to acquire from time of access about 10 ns.<br /><br />* DR-SDRAM (Direct Rambus DRAM or else RDRAM) is a type of memory allowing to transfer data on a bus of 16 wide bits to a cadenza of 800Mhz, what confers on him a band passer-by of 1,6 Go / s. As SDRAM, this type of memory is synchronized with the clock of the bus to ameliorate exchanges of data.<br /><br />* DDR-SDRAM (Double Dated Miss SDRAM) is a memory based on technology SDRAM, allowing to double the rate of transfer of SDRAM with equal frequency. Reading or writing of data in memory am accomplished on the basis of a clock. Standard memory DRAM uses a method conscript SDR (Single Data Fails) consisting in reading or writing data in every forehead going up. DDR allows to double the frequency of reading / writings, with a clock pulsated in the same frequency, by sending data in every forehead going up, as well as in every downward forehead. Memory DDR has in general a commercial appellation of type PCXXXX where "XXXX " represent the debit side in Mb / s.<br /><br />* DDR2 (or DDR-II) allows to attain twice as well brought up debit sides as DDR with equal external frequency. They speak about QDR (Quadruple Dated Fail or quad-pumped) to indicate the method of reading and used writing. Memory DDR2 uses in effect two channels separated for reading and for writing, so it is able of sending or of accepting twice more data than DDR.<br /><br /><a href="http://www.articlecity.com/articles/computers_and_internet/article_4059.shtml">source</a>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-30014396164609895802008-04-02T22:41:00.002+07:002008-04-02T22:52:22.464+07:00Microsoft Server 2008 Certification: Routing's Not Just For Cisco Exams Anymore!by: <b class="author">Chris Bryant</b><br /><br />Knowing routing theory and routing protocols has always been a big part of earning your CCNA and CCNP certifications. According to Microsoft's exam blueprints for the Server 2008 certification exams, that knowledge will also serve you well on your Microsoft exams.<br /><br />The topic outline for the Configuring Windows Server 2008 Network Infrastructure exam (70-642) specifically mentions routing and routing protocols as exam topics. Specifically mentioned are RIP, OSPF, and static routing - three topics every CCNA and CCNP candidate will be well prepared to handle!<br /><br />IPSec isn't part of the CCNA exam, but you'll see it on at least one CCNP exam, and it's also listed as a 70-642 exam topic. IPv6 and IPv4 addressing are both covered on the 70-642 as well.<br /><br />Microsoft's website lists the following major skills you should expect to see on this exam:<br /><br />Configuring IP addresses and Services (routing with RIP and OSPF, static routing, persistent routing, addressing, DHCP and DHCP options including relay agents, IPSec policies, Authentication Header and Encapsulating Security Payload, subnetting, supernetting)<br /><br />Configuring Name Resolution (DNS configuration, zones, records, replication, and integration with Active Directory, and client computer name resolution techniques)<br /><br />Configuring Network Access (includes NAT, VPNs, RADIUS, 802.1x authentication, MS-CHAP, firewalls, and remote authentication)<br /><br />Configuring File And Print Services (self-explanatory)<br /><br />Monitoring And Managing A Network Infrastructure (includes SNMP and Windows Server Update Services)<br /><br />Your CCNA and CCNP preparation will not quite be enough to get you past this exam, but as you can see, it'll give you a great head start!<br /><br /><a href="http://www.articlecity.com/articles/computers_and_internet/article_4056.shtml">source: </a>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-1435762895524993332008-03-24T16:24:00.001+07:002008-03-24T16:26:54.505+07:00What's WiMAX?<span style="font-family:Verdana;font-size:85%;">WiMAX is a short name for <span style="">Worldwide Interoperability of Microwave Access. WiMAX is described in IEEE 802.16 Wireless Metropolitan Area Network (MAN) standard. It is expected that WiMAX compliant systems will provide fixed wireless alternative to conventional DSL and Cable Internet.<o:p> </o:p> </span></span> <p><span style="font-family:Verdana;font-size:85%;">Typically, a WiMAX system consists of two parts:</span></p> <ul type="disc"><li class="MsoNormal" style=""><span style="font-family:Verdana;font-size:85%;">A <b>WiMAX Base Station: </b>Base station consists of<span style=""> </span>indoor electronics and a WiMAX tower. Typically, a base station can cover up to 10 km radius (Theoretically, a base station can cover up to 50 kilo meter radius or 30 miles, however practical considerations limit it to about 10 km or 6 miles). Any wireless node within the coverage area would be able to access the Internet.</span> </li><li class="MsoNormal" style=""><span style="font-family:Verdana;font-size:85%;">A <b>WiMAX receiver</b> - The receiver and antenna could be a stand-alone box or a PCMCIA card that sits in your laptop or computer.<span style=""> </span>Access to WiMAX base station is similar to accessing a Wireless Access Point in a WiFi network, but the coverage is more.</span></li></ul> <p class="MsoNormal" style=""><span style="font-family:Verdana;font-size:85%;">Several base stations can be connected with one another by use of high-speed backhaul microwave links. This would allow for roaming by a WiMAX subscriber from one base station to another base station area, similar to roaming enabled by Cellular phone companies.</span></p> <pre><span style="font-family:Verdana;font-size:85%;">Important Wireless MAN IEEE 802.16 (WiMAX) Specifications<br /><br />Range - 30-mile (50-km) radius from base station<br />Speed - Up to 70 megabits per second<br />Non-Line-of-sight (NLoS) between user and base station<br />Frequency bands - 2 to 11 GHz and 10 to 66 GHz (licensed and unlicensed bands)<br />Defines both the MAC and PHY layers and allows multiple PHY-layer specifications. </span></pre>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com1tag:blogger.com,1999:blog-3775529151436047310.post-55058914617428254122007-12-27T08:55:00.000+07:002007-12-27T08:58:46.489+07:00Why It’s Crucial To Have A Dedicated Serverby: <b class="author">Stu Pearson</b> <br /><br />A dedicated server is a single web server or computer on the internet that hosts websites and shows pages as viewers request. A dedicated server is within a network of computers, exclusively dedicated to one costumer or a large business, since it can meet many needs.<br /><br />Dedicated servers are most commonly used in the web hosting industry; hundreds of sites are hosted under one dedicated server. A dedicated server is considered to be the next step on from shared hosting environments. Having your own dedicated server makes you free of worry about other websites slowing you down or crashing your server. Dedicated servers also give you total control, and allows for installing software on your website that opens doors for gaining extra performance.<br /><br />The advantage of having a dedicated server is that the clients of the server can customize both hardware and software setup so they meet needs like faster data access and effortless accommodation of traffic on the site.<br /><br />These dedicated servers come with good costumer service. The web host works with the client in making sure that the dedicated server meets the needs of the client. In cases of companies having several divisions like a chain of outlets, it is still crucial for each to have their own dedicated server because they can create many domains on a single server easily, which results in more efficiency rather than having to lease host space on different web servers for each division or outlet individually.<br /><br />For large companies having websites for every dealership such as motorcycle manufacturers, the advantage of having a dedicated server is that the parent company can put all of the websites for each dealership under the same server.<br /><br />Here’s how it works. Assume a company named “Taurus Cars Corp.” is running a series of dealerships, the parent company could host an individual website for every dealership. Each website may look like this; for the parent company “www.taurusmotorscorp.com”, for the dealership in Florida “www.taurusmotorsflorida.com “, for the dealership in Colorado “www.taurusmotorscolorado.com” and so on.<br /><br />The advantage of this setup is the dealership in Florida is using the same online tools as the dealership in Colorado. Making the online presence of the company Taurus Motors Corp. very streamlined and cost-efficient, while making things significantly easier for the company’s administration and support, also known as customization and uniform of point of sale software. Considering the websites of each of the different divisions or dealerships residing on one dedicated server, makes this advantage beneficial in terms of increasing sales.<br /><br />In some cases other business want to use dedicated servers for the sole purpose of customization, costumer service, and fast access. They host websites themselves or better yet sub-lease the extra space for interested companies to set up their websites and domains. The advantage derived by any business under a dedicated server is the ability to enhance security.<br /><br />All these advantages imply that dedicated servers are the best option for most large companies or businesses. Hosting personal websites or small business websites in general doesn’t require a dedicated server, instead for this purpose you can lease from a standard web host.<br /><br />source : <a href="http://www.articlecity.com/articles/computers_and_internet/article_4018.shtml">articlecity</a>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-37822487479934022972007-12-27T08:53:00.000+07:002007-12-27T08:54:43.291+07:00NetSuite IPO generates $185 millionNetSuite's initial public offering raised $185.4 million, close to double the amount the company originally forecast the IPO would generate and a positive sign for the market of hosted, software-as-a-service business applications.<br /><br /><br />NetSuite, a provider of hosted applications for small and midsize organizations, sold 6.2 million shares of common stock at $26 per share via auction and its underwriters acted on their option to buy an additional 930,000 shares, the company said Wednesday.<br /><br />The $185.4 million is a gross amount from which underwriting discounts and expenses will be deducted, the company said. Moreover, 365,000 of the shares bought by the underwriters were owned by stockholders like NetSuite's CEO and chief technology officer, so the proceeds from those shares -- about $9.5 million -- won't go to the company.<br /><br />In the final IPO prospectus, NetSuite had estimated that, if the underwriters exercised their option in full -- as they did -- NetSuite's IPO net proceeds would be approximately $161.9 million.<br /><br />NetSuite initially set a range of $13 to $16 per share for its IPO but subsequently raised it and eventually set the price at $26 per share on Thursday of last week, the day when the stock started trading on the New York Stock Exchange under the "N" symbol.<br /><br />At midmorning Wednesday, the stock was trading at $34.85, down about 10 percent from its previous close. Its highest point so far is $45.98.<br /><br />Incorporated in 1998, NetSuite sells ERP (enterprise resource planning), CRM (customer relationship management) and e-commerce applications on a hosted, subscription-based model, in which customers access the software via the Internet and don't need to install it on their premises.<br /><br />This software-as-a-service model, championed by companies like Salesforce.com and Google, is considered a significant threat to the traditional approach from vendors like Microsoft of having customers implement software on their own PCs and servers.<br /><br />As of Sept. 30 of this year, NetSuite had over 5,400 active customers, according to its IPO prospectus . In 2006, the company had revenue of $67.2 million and a net loss of $35.7 million. In the first nine months of this year, it generated $76.8 million in revenue and racked up a net loss of $20.6 million, according to the prospectus.<br /><br />NetSuite plans to use its IPO proceeds to pay off an $8 million balance on a line of credit with Tako Ventures, an entity controlled by Oracle CEO Larry Ellison, and to possibly make acquisitions.<br /><br />As of Nov. 30, Ellison controlled about 60 percent of NetSuite's outstanding stock -- some 31.9 million shares -- but Ellison transferred those shares into a holding company, NetSuite Restricted Holdings. The move is meant to "effectively eliminate" Ellison's voting power and avoid potential conflicts of interests, according to the prospectus.<br /><br />NetSuite also plans to devote between $10 million and $15 million for capital expenditures, including the purchase of property, plant and equipment and the addition of a second data-center facility, and for working capital and other general purposes, including its international expansion. NetSuite currently provides its hosted applications out of a single data center, which the company admits in the prospectus is a risk that could harm its business should there be any service disruption at this facility.<br /><br />NetSuite also said it may use a portion of the net proceeds to acquire other businesses, products or technologies, although it doesn't have any agreements or commitments for any specific acquisitions at the moment. The money it doesn't spend will be invested in short-term, interest-bearing investment grade securities.milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-23887951374227188982007-12-27T08:44:00.000+07:002007-12-27T08:50:05.858+07:00<span class="mdTitleGen">Tropos Networks has set up a network of about 70 meshed Wi-Fi routers in<span style="font-weight: bold;"> Mecca</span>, providing <span style="font-weight: bold;">Hajjis</span> with free Internet connectivity during their annual gathering<br /><br /></span><span class="artText"> <p page="1" class="ArticleBody">The millions of pilgrims in Mecca this week for the Hajj, an annual gathering of Muslims, can stay connected thanks to a temporary Wi-Fi mesh network covering a large part of the city. </p> <!--end div embedContainer--> <p page="1" class="ArticleBody">Hajjis, as the pilgrims are called, come to the city in Saudi Arabia from around the world for several days of religious rituals. More than 2 million gather each year. A network of about 70 meshed routers from Tropos Networks has been set up to provide free Internet connectivity, according to Denise Barton, director of marketing at Tropos. Users only have to register before using it. Barton believes it is the first public Wi-Fi network set up for the Hajj. </p> <p page="1" class="ArticleBody">Mesh networks are well-suited to temporary deployments because they need fewer fixed-line connections than do traditional Wi-Fi systems. Packets can hop from one router to another until they reach one that's connected to a landline. The technology has also been used for permanent municipal Wi-Fi networks, including the one Google had built with Tropos equipment in its hometown of Mountain View, California. </p> <p page="1" class="ArticleBody">Saudi Arabia's Communications and Information Technology Commission appointed an Internet service provider, Bayanat Al-Oula, to provide the temporary network. It was rolled out in less than 60 days with no help from Tropos personnel, Barton said. Aptilo Networks, a wireless-management software and services company based in Stockholm, is running the network as a managed service from its offices in Malaysia. This also helped Bayanat get the infrastructure up and running quickly, said Per Knutsson, Aptilo's co-founder and director of product development. Aptilo is handling user authentication, security, customer-support calls and other features, as well as setting up the portal visitors use to register for the network. </p> <p page="1" class="ArticleBody">Aptilo and Tropos are no strangers to temporary Wi-Fi networks. Aptilo has managed systems for large sporting events, and in 2004 Tropos built a network in downtown Redwood City, California, for a high-profile murder case. The trial of Scott Peterson, who was convicted of killing his wife and their unborn child, drew massive public and media attention. The county court where the trial took place set up a temporary network with five surveillance cameras and five meshed routers for its own security needs and for reporters who descended on the area for several months. </p> <p page="1" class="ArticleBody">The Mecca network is made up of Tropos 5210 mesh routers, which use IEEE 802.11a for mesh connections and can support users with 802.11a, b and g devices, Barton said. Such networks typically require between 20 and 40 routers per square mile, she said. </p></span><br /> By Stephen Lawson, IDG News Service<br />December 19, 2007<br />http://www.infoworld.com/article/07/12/19/Wi-Fi-mesh-lights-up-Mecca-for-Hajj_1.htmlmilda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-25218599154333629862007-12-27T08:31:00.000+07:002007-12-27T08:43:53.935+07:00Cisco green plan looks beyond routers<span style="font-weight: bold;">Cisco Systems</span> wants to turn the enterprise data network into an electricity meter.<br />InfoWorld InfoClipz<br /><br /><br />Using open standards, the company wants to get server and storage vendors to collect and share information about their equipment and send it to Cisco routers and switches. The data could include power consumption, operating temperature and more. It's becoming a critical job, and because the network touches all IT resources across the enterprise, data collection should happen there, according to Paul Marcoux, vice president of green engineering.<br /><br />Marcoux joined Cisco from American Power Conversion only about six weeks ago after Cisco created the position to overlook energy issues across all parts of the company. Networking gear itself makes up a much smaller portion of IT power consumption than do servers or storage, but Cisco plans to go beyond just making its own products more efficient.<br /><br />Power is a growing issue in datacenters as the cost of energy rises and concerns about global climate change increase. Being able to collect and analyze information about power usage is a big part of the battle and becoming more crucial in the age of virtualization, according to Marcoux. Distributing storage and processing cycles without regard for power issues is not just inefficient, it's dangerous, he said.<br /><br />If virtualization software looks at a process that requires more computing power or storage space, then enlists servers or storage devices that are near to overheating or running out of power, it could send a rack of servers over the edge and shut it down, Marcoux said. For that reason, the virtualization system needs to know the power status of all the resources it may call upon, he said.<br /><br />By the same token, consolidated datacenters typically serve many departments of an enterprise and consume a lot of power, but those groups generally don't have to pay for their part of the power. In fact, the electricity bill often bypasses even the IT department, going to building management instead, Marcoux said. Collecting data about the power consumed by each device, and eventually by individual transactions, would allow enterprises to bill each department for the power it uses, he said.<br /><br />Software on routers and switches would collect the information and then take actions or forward it on to separate building management, energy management or virtualization control systems, Marcoux said. Given the large amount of energy data to be processed, Cisco may introduce daughtercards for its platforms to provide extra computing power, he said. He hopes the technology will be in place and collecting information in enterprises within three years.<br /><br />Because datacenters contain gear from so many vendors, open standards are the only way to make such a system work, according to Cisco. Fortunately, there already are several available standards, Marcoux said. Having standards already in place will help speed up adoption, Marcoux said.<br /><br />"We're not trying to reinvent the wheel, we're just trying now to utilize the wheel," Marcoux said.<br /><br />Cisco's proposal would represent a whole new role for networks beyond communications, said Burton Group analyst Dave Passmore. Server vendors might go along with the plan, but Cisco can't count on smooth sailing, he said. Centralized power regulation would play a role in overall management of the datacenter, an area where Cisco is attempting to make inroads with other initiatives as well.<br /><br />"Who controls virtualization in the data center is going to be the new battleground," Passmore said.<br /><br /><br />source : http://www.infoworld.com/article/07/12/24/Cisco-green-plan-looks-beyond-routers_1.htmlmilda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-21530351310672288992007-10-08T16:18:00.000+07:002007-10-08T16:22:55.785+07:00Playstation 3 New Face<img src="http://reviews.digitaltrends.com/images/reviews/simple/2604/20061115_1451491.gif" /><br /><span style="font-weight: bold;font-size:130%;" >Introduction</span><br /><br />Lagging a full year behind the release of Microsoft's Xbox 360 and lacking the immediately attention-grabbing hook of Nintendo's 360-degree motion-sensing Wii, Sony's long-awaited PlayStation 3 has recently been the subject of much heated debate. Despite its obvious appeal to diehard gamers and fans of the world's most popular console brand – not to mention home theater enthusiasts, what with 1080p HDMI output and extensive online music/video download capabilities – questions have been plentiful.<br /><br />For example: Is the system, available in 20GB ($499, sans WiFi and a built-in combination Memory Stick product lineup, Compact Flash and SD/MMC card reader) or $599 chrome-trimmed wireless-ready 60GB hard drive models, worth the hefty asking price, the highest since early-'90s systems like CDi and 3DO? Can Sony, who's recently cut back North American November 17th launch date ship projections to just 400,000 units (with some analysts predicting actual distribution of half this number or fewer machines), manage to avoid aggravating a soon-to-be-device-deprived buying public while still keeping up with the competition? And, of course, with so much power and hardware combined in a single unit catered to the highest-end luxury users, is there even a point to upgrading?<br /><br />The short answer to all: Yes, depending which of school of thought you fall into, your game playing habits and how much disposable income you've got to burn. However, let's get one thing out of the way up-front, before you freeze your poor behind off spending all night camped out in front of the local electronics retailer hoping to score one of the severely under-stocked devices. For a host of reasons ranging from technical niggles to launch lineup shortfalls to pure common sense, it's perfectly fine – and in most cases, even advisable – to skip buying one this holiday season and wait until the dust settles sometime early in 2007.<br /><br />Right from the get-go, it's important to consider the following fact: You're not actually buying a videogame console here (although surely, that's the machine's strength and the chief function most prospective buyers intend to employ it towards) so much as a full-fledged digital media hub. As slick as everything from cutting-edge digital diversions and Blu-ray movies – video resolutions ranging all the way from 480i up to an eye-popping 1080p are supported – it's what you personally make of the machine that gives the gizmo its true value. So for all of you who've been pestered since, oh, 2004 by your wide-eyed little pride and joys, remember: Dropping $599 just so kids can use the beast as an overgrown Atari may be a little much. They'll be just as entertained by lower-resolution outings for other systems like Nintendo's Wii or Sony's own PlayStation 2. And, in truth, most PlayStation 3 titles right now are simply enhanced ports of existing products anyway (see offerings like Tony Hawk's Project 8 or NHL 2K7). What's more, unless you plan on clocking in time behind the controller yourself, investing in a library of next-generation movies, browsing the Web on your TV, purchasing extra levels/cars/characters/songs/films online or are intent on building the ultimate technophile's living room setup, it's the sort of holiday gift that may be little extravagant for anyone younger than 15.milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-56309965796780780732007-09-27T10:44:00.001+07:002007-09-27T11:00:52.681+07:00Virtual Local Area Network<span style="font-size:130%;">Virtual LAN<br /></span>From Wikipedia, the free encyclopedia<br /><br /><br />A virtual <a title="Local area network" href="http://en.wikipedia.org/wiki/Local_area_network">LAN</a>, commonly known as a vLAN or as a VLAN, is a method of creating independent logical <a title="Computer network" href="http://en.wikipedia.org/wiki/Computer_network">networks</a> within a physical network. Several VLANs can co-exist within such a network. This helps in reducing the <a title="Broadcast domain" href="http://en.wikipedia.org/wiki/Broadcast_domain">broadcast domain</a> and aids in network administration by separating logical segments of a LAN (like company departments) that should not exchange data using a LAN (they still can exchange data by <a title="Routing" href="http://en.wikipedia.org/wiki/Routing">routing</a>).<br />A VLAN consists of a network of computers that behave as if connected to the same link layer network - even though they may actually be physically connected to different <a title="Network segment" href="http://en.wikipedia.org/wiki/Network_segment">segments</a> of a LAN. Network administrators configure VLANs through software rather than hardware, which makes them extremely flexible. One of the biggest advantages of VLANs emerges when physically moving a computer to another location: it can stay on the same VLAN without the need for any hardware reconfiguration.<br /><a id="Advantages" name="Advantages"></a><br /> <strong>Advantages<br /></strong>Increase the number of broadcast domains but reduce the size of each broadcast domain, which in turn reduces network traffic and increases network security (both of which are hampered in cases of single large broadcast domains).<br />Reduce management effort to create subnetworks.<br />Reduce hardware requirement, as networks can be separated logically instead of physically.<br />Increase control over multiple traffic types.<br />Create multiple logical switches in a physical switch.<br /><a id="Protocols_and_design" name="Protocols_and_design"></a><br /><strong>Protocols and design</strong><br />The primary protocol currently used in configuring virtual LANs is <a title="IEEE 802.1Q" href="http://en.wikipedia.org/wiki/IEEE_802.1Q">IEEE 802.1Q</a>, which describes how traffic on a single physical network can be partitioned into virtual LANs by tagging each frame or packet with extra bytes to denote which virtual network the packet belongs to.<br />Prior to the introduction of the 802.1Q standard, several proprietary protocols existed, such as <a title="Cisco Systems" href="http://en.wikipedia.org/wiki/Cisco_Systems">Cisco</a>'s <a title="Cisco Inter-Switch Link" href="http://en.wikipedia.org/wiki/Cisco_Inter-Switch_Link">ISL</a> (Inter-Switch Link, a variant of <a title="IEEE 802.10" href="http://en.wikipedia.org/wiki/IEEE_802.10">IEEE 802.10</a>) and <a title="3Com" href="http://en.wikipedia.org/wiki/3Com">3Com</a>'s VLT (<a class="new" title="Virtual LAN Trunk" href="http://en.wikipedia.org/w/index.php?title=Virtual_LAN_Trunk&action=edit">Virtual LAN Trunk</a>). ISL is no longer supported by Cisco.<br />Early network designers often configured VLANs with the aim of reducing the size of the <a title="Collision domain" href="http://en.wikipedia.org/wiki/Collision_domain">collision domain</a> in a large single <a title="Ethernet" href="http://en.wikipedia.org/wiki/Ethernet">Ethernet</a> segment and thus improving performance. When Ethernet <a title="Network switch" href="http://en.wikipedia.org/wiki/Network_switch">switches</a> made this a non-issue (because each switch port is a collision domain), attention turned to reducing the size of the <a title="Broadcast domain" href="http://en.wikipedia.org/wiki/Broadcast_domain">broadcast domain</a> at the <a title="MAC layer" href="http://en.wikipedia.org/wiki/MAC_layer">MAC layer</a>. Virtual networks can also serve to restrict access to network resources without regard to physical topology of the network, although the strength of this method remains debatable as <a title="VLAN hopping" href="http://en.wikipedia.org/wiki/VLAN_hopping">VLAN Hopping</a> is a common means of bypassing such security measures.<br />Virtual LANs operate at Layer 2 (the <a title="Data link layer" href="http://en.wikipedia.org/wiki/Data_link_layer">data link layer</a>) of the <a title="OSI model" href="http://en.wikipedia.org/wiki/OSI_model">OSI model</a>. However, administrators often configure a VLAN to map directly to an IP network, or <a title="Subnetwork" href="http://en.wikipedia.org/wiki/Subnetwork">subnet</a>, which gives the appearance of involving Layer 3 (the <a title="Network layer" href="http://en.wikipedia.org/wiki/Network_layer">network layer</a>).<br />In the context of VLANs, the term "trunk" denotes a network link carrying multiple VLANs, which are identified by labels (or "tags") inserted into their packets. Such trunks must run between "tagged ports" of VLAN-aware devices, so they are often switch-to-switch or switch-to-<a title="Router" href="http://en.wikipedia.org/wiki/Router">router</a> links rather than links to hosts. (Confusingly, the term 'trunk' is also used for what Cisco calls "channels" : <a title="Port trunking" href="http://en.wikipedia.org/wiki/Port_trunking">Link Aggregation or Port Trunking</a>). A <a title="Router" href="http://en.wikipedia.org/wiki/Router">router</a> (Layer 3 device) serves as the <a title="Internet backbone" href="http://en.wikipedia.org/wiki/Internet_backbone">backbone</a> for network traffic going across different VLANs.<br />On Cisco devices, <a title="VTP" href="http://en.wikipedia.org/wiki/VTP">VTP</a> (VLAN Trunking Protocol) allows for <a class="new" title="VLAN Domain" href="http://en.wikipedia.org/w/index.php?title=VLAN_Domain&action=edit">VLAN domains</a>, which can aid in administrative tasks. VTP also allows "pruning", which involves directing specific VLAN traffic only to switches which have ports on the target VLAN.<br /><a id="Assigning_VLAN_memberships" name="Assigning_VLAN_memberships"></a><br /><strong>Assigning VLAN memberships</strong><br />The four methods of assigning VLAN memberships that are in use are:<br />Port-based: A switch port is manually configured to be a member of a VLAN. In order to connect a port to several VLANs (for example, a link with VLANs spanning over several switches) the port has to be member of a <a title="Trunking" href="http://en.wikipedia.org/wiki/Trunking">trunk</a>. Only one VLAN on a port can be set untagged (3Com's term) or access mode (Cisco's term); the switch will add this VLAN's tags to untagged received frames and remove this VLAN's tag from transmitted frames.<br />MAC-based: VLAN membership is based on the <a title="MAC address" href="http://en.wikipedia.org/wiki/MAC_address">MAC address</a> of the workstation. The switch has a table listing the MAC address of each machine, along with the VLAN to which it belongs.<br />Protocol-based: Layer 3 data within the frame is used to determine VLAN membership. For example, IP machines can be classified as the first VLAN, and <a title="AppleTalk" href="http://en.wikipedia.org/wiki/AppleTalk">AppleTalk</a> machines as the second. The major disadvantage of this method is that it violates the independence of the layers, so an upgrade from <a title="IPv4" href="http://en.wikipedia.org/wiki/IPv4">IPv4</a> to <a title="IPv6" href="http://en.wikipedia.org/wiki/IPv6">IPv6</a>, for example, will cause the switch to fail.<br />Authentication based: Devices can be automatically placed into VLANs based on the authentication credentials of a user or device using the <a title="802.1x" href="http://en.wikipedia.org/wiki/802.1x">802.1x</a> protocol.<br /><a id="Port-based_VLANs" name="Port-based_VLANs"></a><br /><strong>Port-based VLANs<br /></strong>A port based VLAN switch determines the membership of a data frame by examining the configuration of the port that received the transmission or reading a portion of the data frame’s tag header. A four-byte field in the <a title="IEEE 802.1Q" href="http://en.wikipedia.org/wiki/IEEE_802.1Q#Frame_format">header</a> is used to identify the VLAN. This VLAN identification indicates what VLAN the frame belongs to. If the frame has no tag header, the switch checks the VLAN setting of the port that received the frame.<br /><br /><br /><a href="http://en.wikipedia.org/wiki/Virtual_LAN">source</a>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-68284890937923730072007-09-12T13:46:00.000+07:002007-09-12T13:50:40.305+07:00WirelessWireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used in the telecommunications industry to refer to telecommunications systems (e.g., radio transmitters and receivers, remote controls, computer networks, network terminals, etc.) which use some form of energy (e.g. radio frequency (RF), infrared light, laser light, visible light, acoustic energy, etc.) to transfer information without the use of wires . Information is transferred in this manner over both short and long distances.<br />Wireless communication may be via:<br />radio frequency communication,<br />microwave communication, for example long-range line-of-sight via highly directional antennas, or short-range communication, or<br />infrared (IR) short-range communication, for example from remote controls or via IRDA,<br />Applications may involve point-to-point communication, point-to-multipoint communication, broadcasting , cellular networks and other wireless networks.<br />The term "wireless" should not be confused with the term "cordless", which is generally used to refer to powered electrical or electronic devices that are able to operate from a portable power source (e.g., a battery pack) without any cable or cord to limit the mobility of the cordless device through a connection to the mains power supply. Some cordless devices, such as cordless telephones, are also wireless in the sense that information is transferred from the cordless telephone to the telephone's base unit via some type of wireless communications link. This has caused some disparity in the usage of the term "cordless", for example in Digital Enhanced Cordless Telecommunications.<br />In the last 50 years, wireless communications industry experienced drastic changes driven by many technology innovationsmilda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0tag:blogger.com,1999:blog-3775529151436047310.post-49991901083360823282007-07-25T16:49:00.000+07:002007-07-25T16:50:59.940+07:00System console<p style="text-align: justify;">The <b>system console</b>, <b>root console</b> or simply <b>console</b> is the text entry and display device for system administration messages, particularly those from the BIOS or boot loader, the kernel, from the init system and from the system logger.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">On traditional minicomputers, the console was a <b>serial console</b>, an RS-232 serial link to a terminal such as a DEC VT100. This terminal was usually kept in a secured room since it could be used for certain privileged functions such as halting the system or selecting which media to boot from. Large midrange systems, e.g. those from Sun Microsystems, Hewlett-Packard and IBM, still use serial consoles. In larger installations, the console ports are attached to multiplexers or network-connected multiport serial servers that let an operator connect his terminal to any of the attached servers.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">On PCs, the computer's attached keyboard and monitor have the equivalent function. Since the monitor cable carries video signals, it cannot be extended very far. Often, installations with many servers therefore use keyboard/video multiplexers (KVM switches) and possibly video amplifiers to centralize console access. In recent years, KVM/IP devices have become available that allow a remote computer to view the video output and send keyboard input via any TCP/IP network and therefore the Internet.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">Some PC BIOSes, especially in servers, also support serial consoles, giving access to the BIOS through a serial port so that the simpler and cheaper serial console infrastructure can be used. Even where BIOS support is lacking, some operating systems, e.g. FreeBSD and Linux, can be configured for serial console operation either during bootup, or after startup.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">It is usually possible to log in from the console. Depending on configuration, the operating system may treat a login session from the console as being more trustworthy than a login session from other sources.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">Routers and Managed Switches (as well as other networking and telecoms equipment) may also have console ports in particular Cisco Systems routers and switches that use Cisco IOS are normally configured via their console ports.</p><br /><h3 id="siteSub"><span style="font-size:78%;">From Wikipedia, the free encyclopedia</span></h3>milda dzohrahttp://www.blogger.com/profile/17407842843406957145noreply@blogger.com0