Internet - The largest network in the World

1:20 PM Add Comment
Internet - The largest network in the World -

Computer engineers have been finding ways to connect computers and their devices together in different ways. Computer networking has come hand in hand with the other organs of knowledge, such as telecommunications, computer science and computer engineering. So many things have been made possible through computer networks. It helped people to live an easier life in many ways through the personal area network, local area network, metropolitan area network, and wide area network.

A great example of a wide area network is the champion of all networks, the Internet. And 'the largest network in the world, and billions of data (perhaps trillions) is being transferred every day. So much information is exchanged and has virtually changed the way we live our lives.

Online Training

The usual way to get your education is to enroll in a school, and go to classes on a fixed schedule. Nowadays, we can actually get a college and master the Internet. A lot of reputable universities now offer their courses online because they understand how difficult it is for some students to juggle a job and their schooling. Depending on the program, you can have your own program, and usually it was just required to submit work or before a certain deadline. Sometimes, you have to have real-time chat with you professor and "classmates", sometimes even with a webcam. What's great about this is that you no longer need to go through the hassle of commuting. The good news is that companies have been accepting a lot of candidates with this type of training, but there are still some that are too traditional.

Video games galore

What started as a simple game 2 size is now a multi-billion dollar industry, and has generated a new way of social interaction. Because of the Internet, players are now able to interact with people from all over the world, and play the same game at the same time. This is great because video games have been seen once as anti-social activities. This is no longer true, and now the players not only get to play the game together, but they are able to chat and make new friends as well. Internet gaming has also created a new genre of game called "massively multiplayer online role-playing games", or MMORPGs. This is a supercharged RPG type in which thousands of players can play together in a particular game at the same time.

Social Networking

A lot of websites today allow people to interact and socialize with others with their different instruments and services. Some of them are focused on dating, where users can create their own profile and specify their particular tastes. Other sites are dedicated to people uploading pictures and sharing them with other users as well. This was a great way of connecting with long lost friends and make new ones as well.

It 'nice that the computer network has helped in bringing the Internet. With it, life has become cheaper, and we can learn so many new things every day simply by linking to it. With the Internet, there are certainly more new things to come.

Streaming Technology explained in terms profane

12:19 PM Add Comment
Streaming Technology explained in terms profane -

Various films and on-demand television services that are rampant in recent years have introduced new terminology for many of us who are not experts in technology, and they're just beginning to explore the vast unexplored territory, known as the web worldwide. A term that is practically a household term is streaming. The concept of flow is not new. Radio and television are streaming. Streaming is, simply put, a delivery method for the media. We are able to transmit anything that can be digitized, including music, movies, sports and TV shows.

A statistic that may surprise many people is that 30% of all Internet traffic today is from Netflix stream alone. And over-the-top consumption (OTT) media from distributors like Netflix, Hulu Plus and SuperPass is expected to increase by 60% within the next two years.

To clarify, there are two types of streaming video - live and on-demand. Live streaming is seen on the internet at the same time as a camera captures and digitally encodes the event. progressive streaming is the type of flow that the streaming providers October use. On-demand video are compressed files that are provided by a streaming server. When an end user wants to stream a movie, for example, you select the movie and click a play button. The seller in October then deliver the film requested by specialized software called a streaming server. The streaming server will evaluate what is happening on the end user's media player and make adjustments called buffer to ensure a good viewing experience. The streaming content is not saved on the end user's hard drive. Once the content is streamed, it is not possible to regain access unless the file is requested again from streaming services provider.

also streaming, there is another method of delivery for these compressed files, which is called downloading. When you buy a movie, song or TV show, you download the file from a web server (instead of a streaming server), and save the file somewhere where you can access whenever you wish - usually on hard disk. In general, at least a part of the download must be complete before being able to start viewing the content without interruption.

Downloads can be either rent or purchase. If it is a car, then OTT provider generally gives a certain period of time from the time of rental, in which view the content before the file is deleted. It 'important to note that downloaded files can contain viruses and malware, so be sure that you trust any source from which you download a file.

The media players can take many forms in which streaming or check your booking downloaded. If you look at the contents of your computer, you probably use the media player included with the operating system, or you can download a free player or premium media that the streaming service provider recommends. If you want to watch on your TV, you must use a game console, Blu-ray players, Internet-enabled TV, or a streaming media player that is connected to your TV and your wireless home network. It 'important to ensure that the media player is supported by the intended OTT providers.

Streaming is undoubtedly here to stay as part of our entertainment options. Watch as the technology continues to improve and have more options available to consumers.

Microsoft Access Forms - associated or not associated?

11:18 AM Add Comment
Microsoft Access Forms - associated or not associated? -

Microsoft Access is designed for rapid development of applications. A wizard module enables the development of fast and easy application using the Bound modules. The bound form requires little or no programming, and is ideal for the amateur programmer.

The Unbound module requires the use of VBA (Visual Basic for Applications) and ADO (ActiveX Data Objects) or DAO (Data Access Objects) to retrieve and update records.

A Microsoft Access form can have a mixture of fields that are associated or not associated.

The bound form

The Bound form has fields that are connected directly to a database table. Any change to a bound control on a form is immediately updated in the corresponding field of the current record in a table.

The characteristics of the bound form include:

  • The module can be configured quickly and easily using the Form Wizard
  • The module is a Find, filtering and sorting facility
  • the module indicates the number of records and a navigation bar
  • module allows the selection, addition, deletion or modification of records
  • Under the modules can be installed to handle one-to-many

the disadvantages of bound form

the problems are:

  • the default behavior of access can be unacceptable to users - such as automatic saving of fields or records
  • cancellation of an update with the Esc key is not easy to use
  • there may be performance issues when handling data from the back-end database
  • there is the need to explicitly control record locking
  • Access error messages are user
  • It 'hard to convert to VB.Net bound form
  • E' difficult to extract the business rules from the module logic
  • Canceling a switch to a field or record may be difficult
  • there is no precise point at which a record is saved
  • loads network can become a problem
  • There is an overhead when combined form is kept open for long periods
  • the logic of a bound form can get pretty complex

the combined form validation is done field by field, using the first update event. When the validation involves multiple fields, this is not the easiest way to ensure that the clean data. Multiple events can very easily call each other several times, which can be difficult to cure.

The Form Unbound

The Unbound module provides a better solution and more professional. It is a need for greater efficiency, to extend the number of users and to provide a better control of the application.

The advantages of the unbound form are:

  • There is more control in reading and writing record
  • There is more control over editing, saving and deleting records
  • records can only be updated when all fields are valid
  • not user-friendly error handling
  • there is greater efficiency in the access logs
  • Reducing competition problems (record in problem drug use)
  • the integrity of the data can be guaranteed
  • the Unbound form is readily converted to a VB.Net project
  • Conversion of the back-end database to SQL Server will be easy

In summary

for simple or one-off applications, the bound form is ideal. It can be configured and running in minutes.

For a system of administration Company, in amulti-user environment, the additional work in authoring logic theVisual basis of an unbound form, it will be time well spent.

The advantages of a Personal Firewall

10:17 PM Add Comment
The advantages of a Personal Firewall -

Do you really believe that your computer is fully protected by the best antivirus program alone? Think again. Not all threats are viral in nature. In fact, computer viruses are just a fraction - albeit a large fraction - of the many forms of security threats these days.

It 'important to protect the system with the best antivirus firewall software, not just an antivirus program alone. The firewall component is as important as the antivirus component, since many other types of malware also pass through various vulnerable ports and openings on the computer.

Despite your efforts to update the anti-virus software and scan your entire computer every day, is undoubtedly considered to be lacking when it comes to ensuring the computer's security and other important information it contains. Many have already been victims of hackers without knowing what went wrong. Despite the awareness of the benefits of an antivirus program of the people, there are still some who are victims of identity theft.

Some might think that a virus is enough to avoid downloading malicious threats software and computers. But, in reality they are wrong. An antivirus program alone is not able to protect the computer user from cybercrime. You also need a firewall, which is a major information technology that protects computers from hackers and is specifically only for end users. With the firewall, the computer should be safe from intrusion by outsiders so that the personal data the user's entire is free.

Apart form the control of computer network traffic, a personal firewall also has many other advantages. For example, the computer will have total control of what comes in and out from the computer. The firewall will show the necessary data regarding a certain program and / or the server that is trying to connect with your computer. It will alert you of any attempt made by a certain application that tries to access the network or the local network.

Your personal firewall filters and possible malicious software scans and alerts the user if there is any outside malicious program that attempts to access the computer. It will act immediately upon detection of suspicious behavior, such as tampering with the user's computer. The personal firewall also hides your computer from scans of automatic doors blocking unauthorized network traffic.

Therefore, it is best not to rely solely on anti-virus scans and frequent computer. As a computer user, you are responsible over to know what the latest technology when it comes to computer protection and security. These days, the safest way to go is to use the best antivirus firewall software that suits your security needs.

Fax receiver Appliances Make Your received fax documents arrive in the mail box

9:16 PM Add Comment
Fax receiver Appliances Make Your received fax documents arrive in the mail box -

You are wasting money on paper and toner by fax SPAM and your time colleagues to look at them? Fax Appliance receiver could be the answer to saving costs and speeding up your workflow.

The era of the fax is coming to an end, but not so fast. Faxes are still used to receive orders by fax or by requests from customers.

Instead of having to maintain a full PC with anti-virus, a UPS that is to be replaced every few years and other support costs, a fax Appliance receiver connects directly to a telephone line and to the Ethernet network converting incoming faxes directly to an e-mail in PDF format to send it to a mailbox of a mail server.

A fax Appliance receiver reduces the direct waste significantly and often produces a return on investment of less than a year. This is based on about 20 SPAM faxes a day @ 0.08 cents per page for 365 days a year is equal to a direct savings of US $ 584 per device.

indirect savings from staff is no longer at the research and evaluation of advertising in the fax is likely to be even higher.

workflow faster because the documents no longer need to be collected from the car, but immediately comes to email administrators. e-mail servers can be configured to copy more than one person, so e-mail messages can be picked up while traveling.

A fax machine can be located more securely in the phone or the computer room, away from the dangers of everyday or ill-intent.

every page is an attachment in the mail that can be easily re-distributed or used for input into other applications.

Additional savings come from very low power consumption of the device and high reliability as there are no moving parts to be maintained or paper to be supplied. On average, only 20% of corporate communication in electronic format is actually printed that brings additional savings.

A configuration once the fax machine will run for life, maintenance free if you do not change the address of the mail server. The parameters are stored permanently in the Flash memory and the ignition sequence is less than 10 seconds. remote management via Telnet with login and password protection allows management in any network environment, such as Windows®, UNIX® or Apple®.

A fax Appliance receiver is always ready, does not depend on the operating system updates, antivirus solution Fax as a PC-based or Multi Function Copier It based that require maintenance and a lot of power. When your company has incoming faxes and especially do not want to beat a fax line to every copier / printer a fax Appliance receiver is the most cost efficient solution.

10 multiple choice questions Free - CCNA Practice Exam - 640-802

8:15 PM Add Comment
10 multiple choice questions Free - CCNA Practice Exam - 640-802 -

Cisco Certified Network Associate (CCNA)

After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams ....

- reinforce what you learned - fill in the gaps of what you missed
- Get you used to answering questions to build confidence and familiarity

Here are 10 different Choice exams questions for you to practice on:

question 1 # - Which of the following are ways to provide login access to a router? (Choose all that apply)

A. HTTP
B. Aux Port
C. Console
D. LLC
E. Telnet
F. SNMP

question # 2 - Which statement is true regarding the user exec and privileged exec mode?

A. They both require the enable password
B. User exec is a subset of the privileged exec
C. The '? 'Only works in privileged exec
D. They are identical

Question 3 # - This modem standard has a speed of 28.8k and has error-correction features.

AV42
BV32bis
CV0
DV34

Questions 4 # - What would be the proper command to set a DCE clock rate of 56k for a serial interface?

A. Router (config) # 500 clockrate
B. Router # clockrate 500.
C. Router (config-if) rate #clock 500
D. Router (config-if ) # clockrate 56k

question # 5 - What is an example of a MAC address?

A. Az32: 6362: 2434
B. BA: 281x: 8288
C. 101: 354: 665: 8734: ffd6: 8023
D. A625: cbdf: 6525

question # 6 - which command does not show that two devices can not route packets between them successfully?

A. show interface
B. track
C. telnet
D. Table

Question # 7 - you are designing a network which needs to support 0 users . You are not going to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer.

A. 255.255.0.0
B. 255.255.255.0
C. 255.0.0.0
D. 255.224.0.0
E. 255 255 255 0

Question # 8 - MAC is to Ethernet what ________ is to Frame Relay.

A. DLCI
B. LCI
C. PVC
D. None of the above

question 9 # - The 802.2 frame specifies a type whereas 802.3 frame specifies a length:

A. true
B. false

question # 10 - what which is used to see if a client is still connected to a NetWare server?

A. spoofing TCP / SAP
B. Watchdog package
C. GNS Round Robin
D. DNS Round Robin

REPLY

Question 1 - correct answers: B, C, E
question 2 - correct answers: B
question 3 - correct answers: A
question 4 - correct answers: C
question 5 - correct answers: D
question 6 - correct answers: A
question 7 - correct answers: B
question 8 - correct answers: A
question 9 - correct answers: A
question 10 - correct answers: B

What is Wardriving and how you can prevent

7:14 PM Add Comment
What is Wardriving and how you can prevent -

Imagine a car equipped with nothing more than a laptop, a handheld GPS receiver, and a wireless network card slowly strolls through your neighborhood. Unknown to any onlookers, this is not an ordinary vehicle; rather, it is a wardriving machine. As the car strolls homes and businesses of the past, a wireless network card (available at any electronics store as low as $ 25) scans for any wireless access points. Anyone with a wireless network (and there are many out there) is vulnerable. The computer is looking for what is called an SSID. An SSID is the name of the wireless network and is continuously transmitted from the access point, letting computers know of its presence. The wardriver uses software like Netstumbler (for Windows) or Cismet (for Linux) to scan the airwaves for SSIDs. The program can monitor various access points immediately and check the signal strength. These programs can also check to see if the network is encrypted. The wardriver generally configure your software to record any clear strong signal. Using the GPS receiver, the coordinates of the strong signal will be recorded. After this preliminary unit, wardriver can return to the positions that have been filed, and the connection to the access point. Once connected to an unencrypted network, the wardriver can use the Internet connection of the victim, and can also explore computers on the network. If the files are shared within someone's private network, all that information is susceptible of a wardriver. In addition, once in the network, a wardriver can intercept network traffic and can display all the information such as passwords and credit card numbers sent to the Internet - even SSL protected data. Wireless network vulnerability is a major problem, and as more and more households buy wireless technology, the problem of insecure networks increases. Sound scary? Well this happens every day, and it does not take an expert to pull out. It does not take an expert to protect against both, though.

steps you can take to protect against wardrivers:

There are a number of very simple steps you can take to protect your wireless network. For many of these, you will have to access the router's configuration utility (check your manual on how to do this, you usually have to type an IP address in the browser such as 192.168.0.1 or 192.168.1.1).

did not broadcast their SSID. If it is broadcasting the SSID, this is the first thing that a program will pickup and recognize. If you configure the router to not broadcast your SSID, it will be difficult to detect (but not impossible, for some software that can intercept wireless communications, so if you are using the wireless network, the SSID can be revealed). If you are not broadcasting the SSID, but it can be guessed (eg if you use a default SSID), cloaking it is pointless. Because of this, it changes your SSID from the factory default. This is not a 100 percent effective method to protect the network, but it is a good first line of defense.

Change the default password. When you buy a router, a default password is stored. People with experience in working with routers know the default passwords for different routers (and the brand of the router can be seen by a wardriver software like NetStumbler). It 'important that you secure your router with a good password.

encrypt wireless communication. I can not stress enough the importance of your wireless communication encryption. Enable encryption and enter a key. Most routers are only capable of WEP encryption, but if they permit, use EAP encryption, is more secure than WEP. How cloaking your SSID, encryption is not 100 percent. Given enough time and determination, if someone wants to hit you and access your network, WEP encryption can be circumvented by using software like AirSnort.

Filter the MAC addresses that are allowed to connect to the router. This would require that you enter the router configuration and enter the MAC address of each wireless card. This way restrict access so that only computers can connect to the router. You will need to obtain the MAC address (which is the individual identification address of a network card in the form of a 12-digit hexadecimal number). If someone sniffs traffic and detects the MAC address of a computer wirelessly using the network, the wardriver could emulate that address and connect to the router, but this takes time.

If you set up file sharing on your computer, make sure it is password protected. It is advisable not to share files on network computers unless they require an authenticated user access. Set the same user account on your machines so that your computers can share files.

With these relatively simple steps, users of the wireless network can protect their networks from wardrivers. Wireless networks are inherently insecure, and these tips will help you protect your network only increased. If someone is really determined to gain access to the network, given enough time, a good hacker can gain access. These tips will deter the wardriver media to access the network, though. Although these methods are not security measures defined, that will change your network from being something that can be hacked in a matter of seconds, something that will have a determined hacker days if not weeks of work, each of which will have to be made while in close proximity to the network.

Telephony - what is it, and why do I need to phone?

6:13 PM Add Comment
Telephony - what is it, and why do I need to phone? -

repeatedly been told over and over again it is time to upgrade the telephone infrastructure with telephony equipment. But no one has taken much time to explain why this is supposed to be done. So why is it done? It is a truthful query, but there is not much one right answer. Many companies are similar, but none is in particular identical, then a response that works for one organization may not work at all for another. There is no one-size-fits-all phone package that every company on the planet uses. There's a bunch of research that should be done before choosing what type of telephony answer is true for you and your company.

Internet Protocol telephony provides an approach to extend consistent communications services to all or your staff in their workplaces, whether they are in main campus areas, regional offices, working remotely, or they are movable. IP telephony transmits audio communications over the network using open-standards-based protocol for sharper.

IP telephony networks are an essential part of the telecommunications infrastructure of any organization, which unify voice, video, knowledge and programs wirelessly on mobile systems mounted and enabling employees to speak easily in any terminal using any media, device or operating system. Using the network as platform, Internet Protocol telephony systems facilitate companies of every notice greater security dimension, flexibility and adaptability in addition to the use innate edges of a converged network for transport and interconnection. Users can use Internet Protocol telephony solutions to deliver safe, reliable scalable communications that take advantage of your local area network (LAN) and Wide Area Network and improve dexterity and employee efficiency through assimilation with the programs innovative hardware features and third-party.

Usually, phone systems consist of two categories: the elaboration of the decision and Internet Protocol telephones. IP phones will be wired, wireless or based computers. There are various phone systems for small to mid-sized companies, more for larger medium-sized businesses and enterprise applications. These call processing systems provide audio, video, portability and presence of Internet protocol phones, media processing devices, voice-over-IP (VoIP) gateways, mobile devices, and multimedia applications. IP phones are offered in terms of functionality and style service for cable and wireless receiver for a wide range of programs developed by a number of the best known companies in the telecommunications sector. Softphone can also be found to increase the voice and rich multimedia features for buyers that run on PCs with Microsoft Windows or Mac OS.

: Many phone Product support from a wide selection of Session Initiation Protocol (SIP) -primarily based versions features including support for applications based on the presence versions, support for Web Internet protocol phones with enhanced SIP feature support, support for third-party versions of SIP-based mostly phones, SIP trunking, session Border Control, and simplified administration and maintenance.

This system provides a base intended for both wired and wireless IP telecommunications, and includes the power to support several highly proactive controller for simple and value - effective interconnection between independent VoIP systems and analog telephone connections using the existing telephone equipment.

There are totally different ways in which the addition of telephony technology especially for a company, so that it can become perplexed. Companies requirements are all very different, but there is a resolution out there for all kinds of companies. That's where we have a tendency to return. We tend to give the telephony hardware that is reasonable and highly functional. Visit us these days to find out about a number of advantages of this technology would possibly hold for you and your organization, as well as some of the elements to watch for the implementation of your new telephony solution company.

Networking ZigBee

5:12 PM Add Comment
Networking ZigBee -

wireless technologies like ZigBee offer many benefits, but they also present unique challenges when it comes to installation and commissioning. In a wired network, you can follow the wires to determine which switch has control lights. When there are no wires, it is necessary a different method and set of tools to get to the network to operate the way you want. A standards-based protocol

as ZigBee offers clear and significant benefits - interoperable building blocks, a wider range of options for application developers, and no danger of obsolescence due to the use of methods and proprietary solutions.

In addition to a standards-based protocol, the ZigBee Alliance has and continues to provide the controls and standards-based methodology for commissioning ZigBee systems. These will ensure that the instruments and devices can interoperate using the same over-the-air programming commands.

Under ZigBee, there are three major classes of parameters that can be ordered:

  • membership, which includes all aspects of how networks and devices to determine which devices are included (or excluded) from a specific network
  • groups and associations, which includes all aspects of how devices on the same network logically connected to each other or belong to groups in which logical one-to-many or -a many-many connections are needed.
  • Application, in which specific settings are set (as the thermostat levels or programs when the lights come on).

These parameters classes can also be commissioned in sequence. Adhesion occurs first, to ensure that devices together and form the correct network. Groups and associations to guarantee that the devices can connect to the right devices within this network. And finally, the application settings have a duty to ensure correct application behavior.

all the commands necessary to achieve belonging and Groups and Associations commissioning can be found in ZigBee Commissioning Cluster and ZigBee device profile.

ZigBee Commissioning Cluster

The ZigBee Alliance has specified a cluster startup, which provides a standard set of ZigBee over-the-air commands for membership commissioning.

The key control is used to reach the mass membership is the command request Restart device. This command, which can be sent either by a commissioning tool or through another device (such as the coordinator, or a gateway for remote commissioning), indicates a device to start again with a specific startup attributes set.

It 'important to note that a complete set of these attributes (called a boot attribute set or SAS) will determine how a device starts up and choose to be part of a network to join. The SAS can be placed in a device at the place of installation, but by definition, a SAS already exists (pre-programmed) in the device before it arrives.

The SAS includes the following attributes:

  • The launcher control, explained below
  • The extended PAN ID (or EPID) network (a global network unique identifier) ​​
  • the channel mask, which determines which channels the device should search for a network to join
  • security information, such as the network key and address of the trust center

the start command is used to determine how the device should join the network:

  • as a coordinator, and then start the network with the values ​​of the supplied attributes
  • Take any network
  • to return to the network with an accurate EPID
  • suppose that is already a part of a network with the specific setting values ​​(also known as the start mode connected)

for example, a device with the following values ​​SAS has the most flexibility in being able to join any network (but correspondingly , has the highest risk of entering the wrong network):

  • join any
  • With a channel mask that allows you to enter the "all channels"
  • No network security key

security is an important part of ZigBee, as it provides the means to prevent unwanted monitoring of the system by encrypting all packet communications protocols, 128-bit high-security AES.

An important requirement to provide, for example a secure system is the mass in function of security keys. In addition to ensuring that the devices have the right keys to encrypt and decrypt the exchange of packets, security can also be used to exclude the devices to a network (as a part of the commissioning States).

ZigBee Device Profile

The ZigBee Device Profile (ZDP) provides a set of standard commands can provide (or assist ) in commissioning in the following ways:

  • ZDP binding and Managers of the group to offer all the necessary commands to provide commissioning and binding group.
  • More Commands for ZDP management can be useful in helping to Mass. For example, the ZDP commands and network discovery service can be used to examine your network and take decisions put into service devices. The ZDP Node Manager can be used to control "Registration Permit" and the theme "Dare" commands to manage in a more direct membership.

Conclusions

In a perfect world, the devices would have commissioned themselves. You could simply turn on, turn them on, and then stand back and watch what network devices work should unite, as security has been working in the network, the device (or devices) that should bind, and which devices should communicate with.

Up to that perfect world comes, it is the commissioning functions can leverage based on standards set by the ZigBee Alliance to help and make the job a lot easier.