Rajendra

Friday, April 8, 2011

AMCU Software

1- Download dairry.dl folder
2-open this folder& we can use amcu software,antivirus.
3-For install amcu software open readme file.


HOW TO REPLACE DAIRY.DLL FILE IN SWEATADHAR  SOFTWARE
(WHY REPLACE THIS FILE BECAUSE DUE TO CORRUPT THIS FILE SHIFT END SUMMARY&FULLPRODUCER LIST IS NOT SHOW.)
1- open my computer, go to windows drive open program files then open default company name folder 
2- Then open amcu (7 oct) folder,then open bin folder.
3- now here find dairy.dll file.
4- now copy dairy.dll file download from internet specified add.
5- now delete dairy.dll file from bin folder, & Here  paste dairy.dll file download by internet. 

Monday, September 6, 2010

How to flash bios site

http://www.wikihow.com/Update-Your-Computer%27s-BIOS

How to update your pc BIOS

A computer's Basic Input-Output System (BIOS) is embedded software on a motherboard that will control attached hardware. It provides an operating system with information about hardware, and is designed to support a specific range of components. The BIOS itself is typically an EEPROM, or Electronically Erasable Programmable Read-Only Memory, that is programmed with "firmware" and has the ability to save small amounts of information specific to user configurations. BIOS components are often soldered to the motherboard and therefore not serviceable by the user. Still some of these can be inserted into a socket, allowing its replacement.




All BIOS components are serviceable via a firmware upgrade that is known as "flashing" this process is called "updating the BIOS". The process itself is fragile since any power fluctuation during a flash may irrevocably corrupt a BIOS' firmware. Great care will need to be taken in order to safely accomplish this.



This guide will help you flash your BIOS by taking precautions and walking you through each step. Not all computers will have the same BIOS manufacturer, let alone the same process, but many have similar steps and precautions.

edit Steps1Determine your needs. Did someone help you update the BIOS last month? Maybe the BIOS has never been updated since you purchased your PC years ago. Will an updated version fix a problem you are experiencing? Answers to these questions will help determine if you need to verify version numbers and whether an update is necessary. Not all BIOS updates are necessary, but for the hardware enthusiast, obtaining the latest BIOS may equate to better performance.

Ads by Google



File Backup ToolsSecure Remote Computer Access. Try it Free for 14 Days!

www.LogMeIn.com

2-Determine your system's origins. This is an important first step to determine where to locate and download the correct BIOS update version.

For Desktops, did you purchase this computer as a bundled, pre-built system, or was it assembled from purchased components? The larger, more popular manufacturers and builders include companies such as Dell/Alienware, HP/Compaq, IBM, Lenovo, Sun, Gateway,Acer, etc. For these, visit the manufacturer's site. For a custom system built from purchased components, visit the motherboard manufacturer's website.For laptops, visit the laptop manufacturer's site, such as Dell/Alienware, HP/Compaq, Acer, Toshiba, etc.3 Discover what update methods are available. Not all BIOS updates are performed in the same manner. The desktop or laptop system or motherboard manufacturer determined in the steps above provide support information about BIOS update methods they offer. Some motherboards can be updated by executing a program from the operating system level after booting from the hard disk. In other cases the system must be booted from a floppy disk; CD or USB thumb drive (using software supplied by the system or motherboard vendor). Some manufacturers will use their own custom application to update the BIOS, others will use a third party utility to update the BIOS while booted from the legacy DOS operating system. The latter may be split into two different files, or bundled together as a CD or floppy image with an extracting application. Download the appropriate updating software and BIOS from your manufacturer's website.4Backup your existing BIOS first! If using BIOS update software executed from Windows or another operating system, backup the existing BIOS image first. Some BIOS update software versions have this functionality built-in (e.g., "Save" or "Backup"), and will advise you to perform a backup first.5Perform the update. Run the downloaded installer or application executable for the BIOS updating software. If the software prompts you for a floppy, use a formatted 1.44MB 3.5" floppy disk. It doesn't matter if the floppy is blank or not because the data will be overwritten if you don't mind wiping the disk.





1 .If using a floppy, insert it into the drive and restart the system to boot from it. Some floppy images contain an "autoexec.bat" file to automatically run the BIOS update. Others will just have the update software, the updated BIOS image, and possibly a 'readme' text file containing directions. If there are no directions, but there are at least two files (ie: "A06_123.bin" and "awflash.exe"), follow this example: Enter a command such as "awflash A06_123.bin" and press enter. This will execute the update software and specify the A06_123.bin file to flash the BIOS.2.Compare the two versions. Most BIOS update software will read the existing BIOS image and determine its version, then compare this to the downloaded BIOS image. If the system's existing BIOS version is older, perform the update. The user interface of BIOS software may vary greatly, yet typically menu buttons or selections such as "Write", "Update", or "Confirm" will perform the BIOS update.6Power cycle the computer after the update is completed. Many update programs will automatically power cycle the computer. Some will request your permission to do so while others will warn about this before starting the update. A few will prompt you to power cycle the system yourself. If you're forced to handle this yourself:





1. Completely power down the PC by either pressing the power button or initiating the power off sequence from the operating system.2.Flip the master power switch on the back of your PC to the off position, if applicable.3.Wait a minute.4.Flip the master power switch back into the on position, if applicable.5.Power up the PC.7 Clear the existing BIOS settings. Only clear the BIOS if recommended. This is not always necessary, depending on what features have changed between the existing version and the updated version. When the PC is powering up, immediately initiate execution of the BIOS utility. For most systems, this is done by pressing

on the keyboard within the first 2 - 10 seconds of turning the computer on. Other systems might use other keys such as

,

,

, etc. If you don't know the keystroke sequence for entering the BIOS utility, watch the monitor to see if the computer displays it. To clear the BIOS settings, look for an option to "Restore Defaults" or "Load Fail-Safe Defaults". This may be on the main page of the BIOS utility or on the last page of a tabbed menu. Use the arrow keys to navigate, and follow the on-screen instructions. When complete, save the settings and exit the BIOS utility.8Configure the BIOS. If you know the settings you want, change them now. If you have never changed BIOS settings before, it is not required to do so. Most PCs will function just fine using the default BIOS settings.Ads by Google



Taiwan LaptopsBuy PC products from the expert makers! Excellent quality.

www.taiwanexcellence.com.tw

Buy Direct From Dell™Laptops with dazzling color options Now Powered by Intel® Core™ i3

Dell.co.in/Home/Laptops

SpeedUp your computerSmartCleaner will clean & speed up your computer. Great for beginners!

www.smartcleaner.net



edit TipsBIOS updates may be released to fix existing bugs, add support for new hardware and standards or add functionality. Read the release notes or other documentation for the BIOS update you're considering to see if the update will benefit your PC.

Ads by Google



Computer Jobs ListingsGet Jobs Personalized For You. Post Your Resume & Start Your Job Search

www.CareerBuilder.co.in/IT_Jobs

If your system is currently working well, perform a BIOS update only if you're willing to part with it (for an extended period of time) in the event of a critical failure. System builders and motherboard manufacturers will often repair systems and motherboards that failed to take a BIOS update, provided they are still under warranty. Yet, this process is a lengthy one, often involving the following steps:





Contact technical support and verify the problem is related to the BIOS update.

Obtain a Return Merchandise Authorization (RMA) or similar tracking number.

Ship the product back to the builder or manufacturer.

Wait for approval (testing) and repair or replacement.

Wait to receive the product shipped back to you.

If the BIOS firmware has become corrupted and you have a similar motherboard with the same CPU socket and a BIOS chip of the same type, you may be able to recover your corrupt BIOS if you are willing to risk the other BIOS chip. See How to Repair Corrupted BIOS Firmware



edit WarningsMake sure to obtain the BIOS upgrade software from a reliable source. Downloading a BIOS from sources other than the manufacturer's web site is risky. For example, versions from the same BIOS software developer for one manufacturer's motherboard may not work on a different manufacturer's motherboard. Using the wrong BIOS or version might "brick" the board, thereby requiring either a BIOS replacement or reprogramming of the BIOS by the manufacturer and rendering the computer unable to boot until that is done.

Make sure the electrical power source is reliable when flashing a BIOS. Any sizable fluctuation or loss of power during a flash process can corrupt the BIOS. Therefore, never power down or reset a PC when flashing the BIOS. If flashing the BIOS from a booted OS, first disable all unnecessary applications and background processes.

Avoid updating the BIOS unless you know exactly what you are doing. Failure to follow a manufacturer's directions and precautions may corrupt the BIOS as well.

Saturday, July 24, 2010

How To Trace An Email Address

Trace an email address in the most popular programs like Microsoft Outlook, Hotmail, Yahoo, Gmail, AOL, by finding the header

What is an email header?
Each email you receive comes with headers. The headers contain information about the routing of the message and the originating Internet Protocol address of the message. Not all electronic messeges you receive will allow you to track them back to the originating point and depending on how you send messages determines whether or not they can trace an email address back to you. The headers don't contain any personal information. At most, the results of the trace with show you the origination IP and the computer name that sent the email. After viewing the trace information, the initiating IP can be looked up to determine from where the message was sent. IP address location information DOES NOT contain your street name, house number, or phone number. The trace will most likely determine the city and the ISP the sender used.

How do I get the header to start the trace email process?
Each electronic messaging program will vary as to how you get to the message options. I'll cover the basics to start the trace...the rest is up to you.

Outlook - Right click the message while it's in the inbox and choose Message Options. A window will open with the headers in the bottom of the window.
Windows Live - Right click the correspondence while it's in the inbox, choose Properties, then click the Details tab.
GMail - Open the correspondence. In the upper right corner of the email you'll see the word Reply with a little down arrow to the right. Click the down arrow and choose Show Original.
Hotmail - Right click the memo and choose View Message Source.
Yahoo! - Right click the note and choose View Full Headers.
AOL - Click Action and then View Message Source.
You can see that no matter the program, the headers are usually just a right click away.

I've got the header, now how do I start the trace?
The next step to trace an email address is to find the first IP listed in the header. This is most likely the IP initiating point. However, there are exceptions to this. You'll have to look at the information logically to deduce the originating IP.

Can you trace any email address?
Yes and No. For example, someone who sends a message to your hotmail account shows in the X-Originating IP section of the headers. However, someone who sends you a message from GMail will ONLY trace back to Google IP addresses.



Read more: http://www.whatismyip.com/faq/how-to-trace-an-email.asp#ixzz0uZZodYCj

Wednesday, July 21, 2010

The Seven Layers of the OSI Model

The Open Systems Interconnection (OSI) Reference Model is a modular framework for developing standards that are based on a division of network operations into seven, sets of network services.

At one time, most vendors agreed to support OSI in one form or another, but the OSI was too loosely defined and proprietary standards were too entrenched. Except for the OSI-compliant X.400 and X.500 e-mail and directory standards, which are still widely used, what was once thought to become the universal communications standard now serves as the teaching model for all other protocols.

Most of the functionality in the OSI model exists in all communications systems, although two or three OSI layers may be incorporated into one.

Example of how the OSI Layers work using an e-mail sent from the computer on the left.

Data travels from the sending computer down through all the layers to the physical layer where the data is put onto the network cabling, and then sent to the physical layer of the receiving computer where the process reverses and the data travels up through the layers to the application layer of the receiving computer

Identify sender and intended receiver; is there an e-mail application available?

APPLICATION
layer 7

Identified sender and intended receiver; found e-mail application.

Encode data with X coding key; use ASCII characters.

PRESENTATION

layer 6

Decoded data with X decoding key; used ASCII characters.
Initiate and terminate the session according to X protocol.


SESSION

layer 5

Initiated and terminated the session according to X protocol.

Make sure all data is sent intact.

TRANSPORT

layer 4

Make sure all data has arrived intact.
Keep track of how many hops;

open shortest path First;

Go to IP address 255.65.0.123

NETWORK

layer 3

Keep track of how many hops;

opened the shortest path First;

Went to IP address 255.65.0.123
Is the initial connection set up? Put data into frames according to X standard.

DATA LINK

layer 2
The initial connection set up. Decoded data in frame according to X standard.
Send as electrical signal over the network cable at X voltage, and X Mbps.

PHYSICAL
layer 1

Receive electrical signal over the network cable at X voltage, and X Mbps.



A look at each of the OSI layers , and the role it plays.

APPLICATION

layer 7 Gives user applications access to network. This layer represents the services, that directly support the user applications such as software for file transfers, database access, and E-mail

PRESENTATION

layer 6 The presentation layer, usually part of an operating system, converts incoming and outgoing data from one presentation format to another. Presentation layer services include data encryption and text compression.

SESSION

layer 5 Opens manages, and closes conversations between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handling.

TRANSPORT

layer 4 This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Sequences data packets, and requests retransmission of missing packets. It also repackages messages for more efficient transmission over the network.

NETWORK

layer 3 Establishes, maintains and terminates network connections. Routes data packets across network segments. Translates logical addresses and names into physical addresses.

DATA LINK

layer 2 Transmits frames of data from computer to computer on the same network segment. Ensures the reliability of the physical link established at layer 1. Standards define how data frames are recognized and provide the necessary flow control and error handling at the frame set.

The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

PHYSICAL

layer 1 The Physical layer defines all the electrical and physical specifications for devices. This includes the layout of pins, voltages, and cable specifications. Hubs, repeaters and network adapters are physical-layer devices.

Defines cabling and connections. Transmits data over the physical media.


Some common network devices and protocols and where they are implemented in the OSI model.



OSI LAYER




DEVICES




PROTOCOLS



APPLICATION

layer 7 SNMP, SMTP, FTP, TELNET, HTTP, NCP, SMB, AppleTalk

PRESENTATION

layer 6 NCP, AFP, TDI
SESSION

layer 5 NetBIOS
TRANSPORT

layer 4 NetBEUI, TCP, SPX, NWlink
NETWORK

layer 3 Routers, layer 3 (or IP) switches. IP, IPX, NWlink, NetBEUI
DATA LINK

layer 2 Bridges and switches, Ethernet incorporates both this layer and the Physical layer. -
PHYSICAL

layer 1 Hubs, repeaters, network adapters, Parallel SCSI buses. Various physical-layer Ethernet incorporates both this layer and the data-link layer. Token ring, FDDI, and IEEE 802.11. -

The unofficial other OSI Layer 2.5

While not a part of the official OSI model, the term "Layer 2.5" has been used to categorize some protocols that operate between the data link layer 2 and the network layer 3. For example, Multiprotocol Label Switching (MPLS) operates on packets (layer 2) while working with IP addresses (layer 3) and uses labels to route packets differently.

Interfaces

In addition to standards for individual protocols in transmission, there are also interface standards for different layers to talk to the ones above or below, usually operating system specific. For example, Microsoft Winsock, and Unix's sockets and System V Transport Layer Interface, are interfaces between applications (layers 5 and above) and the transport (layer 4). NDIS and ODI are interfaces between the media (layer 2) and the network protocol (layer 3).

Layer Examples TCP/IP AppleTalk OSI Novell IPX
Application HL7

Modbus

SIP HTTP

SMTP

SMPP

SNMP

FTP

Telnet

NFS

NTP AFP

PAP FTAM

X.400

X.500

DAP
Presentation TDI

ASCII

EBCDIC

MIDI

MPEG XDR

SSL

TLS AFP

PAP ISO 8823

X.226
Session Named Pipes

NetBIOS

SAP

SDP Session establishment for TCP ASP

ADSP

ZIP ISO 8327

X.225 NWLink
Transport NetBEUI TCP

UDP

RTP

SCTP ATP

NBP

AEP

RTMP TP0

TP1

TP2

TP3

TP4

OSPF SPX

RIP
Network NetBEUI

Q.931 IP

ICMP

IPsec

ARP

RIP

BGP DDP X.25 (PLP)

CLNP IPX
Data Link Ethernet

Token Ring

FDDI

PPP

HDLC

Q.921

Frame Relay

ATM

Fibre Channel LocalTalk

TokenTalk

EtherTalk

Apple Remote Access

PPP X.25 (LAPB)

Token Bus IEEE 802.3 framing

Ethernet II framing
Physical RS-232

V.35

V.34

Q.911

T1

E1

100BASE-TX

ISDN

SONET

DSL Localtalk on shielded, Localtalk on unshielded (PhoneNet) X.25 (X.21bis)

EIA/TIA-232

EIA/TIA-449

EIA-530

G.703

notes:

X.400 An ISO and ITU standard for addressing and transporting e-mail messages. It conforms to layer 7 of the OSI model and supports several types of transport mechanisms, including Ethernet, X.25, TCP/IP, and dial-up lines.



--------------------------------------------------------------------------------


X.500 An ISO and ITU standard that defines how global directories should be structured. X.500 directories are hierarchical with different levels for each category of information, such as country, state, and city. X.500 supports X.400 systems.



--------------------------------------------------------------------------------


Media Access Control Layer is one of two sublayers that make up the Data Link Layer of the OSI model. The MAC layer is responsible for moving data packets to and from one Network Interface Card (NIC) to another across a shared channel.

The MAC sublayer uses MAC protocols to ensure that signals sent from different stations across the same channel don't collide.

Different protocols are used for different shared networks, such as Ethernets, Token Rings, Token Buses, and WANs.

Media and Topologies

1.1 Recognize the following logical or physical network topologies given a schematic diagram or description:
> Ethernet Networks

In the diagram below you will see two ethernet configurations. On the left the computers are connected together with a single cable coming from the router/switch, this is called a bus or thin ethernet configuration.

In bus topologies, all computers are connected to a single cable or "trunk or backbone", by a transceiver either directly or by using a short drop cable. All ends of the cable must be terminated, that is plugged into a device such as a computer or terminator. Most bus topologies use coax cables.

The number of computers on a bus network will affect network performance, since only one computer at a time can send data, the more computers you have on the network the more computers there will be waiting send data. A line break at any point along the trunk cable will result in total network failure.

Computers on a bus only listen for data being sent they do not move data from one computer to the next, this is called passive topology.

On the right side of the diagram each computer connects directly to the router/switch. this is how most ethernets are configured today. In this topology management of the network is made much easier (such as adding and removing devices), because of the central point. However because it is centralized more cable is required. If one computer fails the network will continue to function.


If computers are connected in a row, along a single cable this is called a bus topology, if they branch out from a single junction or hub this is known as a star topology. When computers are connected to a cable that forms a continuous loop this is called a ring topology.








--------------------------------------------------------------------------------


Star Topology


Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer which acts as a router to transmit messages. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.

The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected.

Advantages of a Star Network

Good performance.
Easy to set up and to expand.
Any non-centralised failure will have very little effect on the network, whereas on a ring network it would all fail with one fault.
Easy to detect faults
Data Packets are sent quickly as they do not have to travel through any unnecessary nodes.

Disadvantages of a Star Network

Expensive to install
Extra hardware required
If the host computer fails the entire system is affected.


--------------------------------------------------------------------------------

Hierarchical Topology (also known as Tree)



The type of network topology in which a central 'root' node (the top level of the hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link, the top level central 'root' node being the only node that has no other node above it in the hierarchy – the hierarchy of the tree is symmetrical, each node in the network having a specific fixed number, f, of nodes connected to it at the next lower level in the hierarchy, the number, f, being referred to as the 'branching factor' of the hierarchical tree.

Notes:

1.) A network that is based upon the physical hierarchical topology must have at least three levels in the hierarchy of the tree, since a network with a central 'root' node and only one hierarchical level below it would exhibit the physical topology of a star.

2.) A network that is based upon the physical hierarchical topology and with a branching factor of 1 would be classified as a physical linear topology.

3.) The branching factor, f, is independent of the total number of nodes in the network and, therefore, if the nodes in the network require ports for connection to other nodes the total number of ports per node may be kept low even though the total number of nodes is large – this makes the effect of the cost of adding ports to each node totally dependent upon the branching factor and may therefore be kept as low as required without any effect upon the total number of nodes that are possible.

4.) The total number of point-to-point links in a network that is based upon the physical hierarchical topology will be one less that the total number of nodes in the network.

5.) If the nodes in a network that is based upon the physical hierarchical topology are required to perform any processing upon the data that is transmitted between nodes in the network, the nodes that are at higher levels in the hierarchy will be required to perform more processing operations on behalf of other nodes than the nodes that are lower in the hierarchy.


--------------------------------------------------------------------------------

Bus Topology



In bus topologies, all computers are connected to a single cable or "trunk or backbone", by a transceiver either directly or by using a short drop cable. All ends of the cable must be terminated, that is plugged into a device such as a computer or terminator. Most bus topologies use coax cables.

The number of computers on a bus network will affect network performance, since only one computer at a time can send data, the more computers you have on the network the more computers there will be waiting send data. A line break at any point along the trunk cable will result in total network failure.

Computers on a bus only listen for data being sent they do not move data from one computer to the next, this is called passive topology.

Advantages
Easy to implement and extend
Requires less cable length than a star topology
Well suited for temporary or small networks not requiring high speeds(quick setup)
Initially less expensive than other topologies

Disadvantages

Difficult to administer/troubleshoot.
Limited cable length and number of stations.
If there is a problem with the cable, the entire network goes down.
Maintenance costs may be higher in the long run.
Performance degrades as additional computers are added or on heavy traffic.
Low security (all computers on the bus can see all data transmissions).
Proper termination is required.(loop must be in closed path).
If one node fails, the whole network will shut down.
If many computers are attached, the amount of data flowing causes the network to slow down.


--------------------------------------------------------------------------------

MeshTopology



A Mesh topology Provides each device with a point-to-point connection to every other device in the network. These are most commonly used in WAN's, which connect networks over telecommunication links. Mesh topologies use routers to determine the best path.

Mesh networks provide redundancy, in the event of a link failure, meshed networks enable data to be routed through any other site connected to the network. Because each device has a point-to-point connection to every other device, mesh topologies are the most expensive and difficult to maintain.

Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile. Mobile ad-hoc networking (MANET), featured in many consumer devices, is a subsection of mesh networking.

Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, a very reliable network is formed. This concept is applicable to wireless networks, wired networks, and software interaction.

There are three distinct generations of wireless mesh architectures. In the first generation one radio provides both backhaul (packet relaying) and client services (access to a laptop). In the second generation, one radio relayed packets over multiple hops while another provided client access. This significantly improved backhaul bandwidth and latency. Third generation wireless mesh products use two or more radios for the backhaul for higher bandwidth and low latency. Third generation mesh products are replacing previous generation products as more demanding applications like voice and video need to be relayed wirelessly over many hops of the mesh network.


--------------------------------------------------------------------------------

Ring


In a ring topology network computers are connected by a single loop of cable, the data signals travel around the loop in one direction, passing through each computer. Ring topology is an active topology because each computer repeats (boosts) the signal before passing it on to the next computer.

One method of transmitting data around a ring is called token passing. The token is passed from computer to computer until it gets to a computer that has data to send.

If there is a line break, or if you are adding or removing a device anywhere in the ring this will bring down the network. In an effort to provide a solution to this problem, some network implementations (such as FDDI) support the use of a double-ring. If the primary ring breaks, or a device fails, the secondary ring can be used as a backup.

Advantages

Data is quickly transferred without a ‘bottle neck’
The transmission of data is relatively simple as packets travel in one direction only.
Adding additional nodes has very little impact on bandwidth
It prevents network collisions because of the media access method or architecture required.

Disadvantages

Because all stations are wired together, to add a station you must shut down the network temporarily.
It is difficult to troubleshoot the ring.
Data packets must pass through every computer between the sender and recipient Therefore this makes it slower.
If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.


--------------------------------------------------------------------------------


Wireless

A wireless network consists of wireless NICs and access points. NICs come in different models including PC Card, ISA, PCI, etc. Access points act as wireless hubs to link multiple wireless NICs into a single subnet. Access points also have at least one fixed Ethernet port to allow the wireless network to be bridged to a traditional wired Ethernet network, such as the organization’s network infrastructure. Wireless and wired devices can coexist on the same network.

Switched-mode power supply

A switched-mode power supply, or SMPS, is an electronic power supply unit (PSU) that incorporates a switching regulator — an internal control circuit that switches the load current rapidly on and off in order to stabilise the output voltage. Switching regulators are used as replacements for simpler linear regulators when higher efficiency, smaller size or lighter weight are required. They are, however, more complicated and more expensive, their switching currents can cause noise problems if not carefully suppressed, and simple designs can have a poor power factor.

How an SMPS works
Rectifier stage
If the SMPS has an AC input, then its first job is to convert the input to DC. This is called rectification. The rectifier circuit is often the same as that in a linear power supply, and produces an unregulated DC voltage which is then smoothed by a filter capacitor. The current drawn from the mains supply by this rectifier circuit occurs in short pulses around the AC voltage peaks. These pulses have significant high frequency energy which reduces the power factor. Special control techniques can be employed by the following SMPS to force the average input current to follow the sinusoidal shape of the AC input voltage thus correcting the power factor. A SMPS with a DC input does not require this stage. A SMPS designed for AC input can often be run from a DC supply, as the DC passes through the rectifier stage unchanged. (The user should check the manual before trying this!)

~ ~ ~ ~ ~ ~ ~ ~ ~ ~

If an input range switch is used, the rectifier stage is usually configured to operate as a voltage doubler when operating on the low voltage (~120 VAC) range and as a straight rectifier when operating on the high voltage (~240 VAC) range. If an input range switch is not used, then a full-wave rectifier is usually used and the downstream inverter stage is simply designed to be flexible enough to accept the wide range of dc voltages that will be produced by the rectifier stage. In higher-power SMPSs, some form of automatic range switching may be used.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Inverter stage
The inverter stage converts DC, whether directly from the input or from the rectifier stage described above, to AC by switching it on and off ('chopping') at a frequency of tens or hundreds of kilohertz (kHz). The frequency is usually chosen to be above 20 kHz, to make it inaudible to humans. The switching is done by MOSFETs, which are a type of transistor with a low on-resistance and a high current-handling capacity. This section refers to the block marked "Chopper" in the block diagram.

Related Topics:
Kilohertz - MOSFET - Transistor - Resistance

~ ~ ~ ~ ~ ~ ~ ~ ~ ~

Voltage converter
If the output is required to be isolated from the input, as is usually the case in mains power supplies, the inverted AC is used to drive the primary winding of a high-frequency transformer. This converts the voltage up or down to the required output level on its secondary winding. The output transformer in the block diagram serves this purpose.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~
If a DC output is required, the AC output from the transformer is rectified and smoothed by a filter consisting of inductors and capacitors. The higher the switching frequency, the smaller these components can be made.

Related Topics:
Inductor - Capacitor

~ ~ ~ ~ ~ ~ ~ ~ ~ ~

Simpler, non-isolated power supplies contain an inductor instead of a transformer. This type includes boost converters, buck converters, and the so called "buck-boost converter". These belong to the simplest class of single input, single output converters which utilise one inductor and one active switch (MOSFET). The buck converter reduces the input voltage, in direct proportion, to the ratio of the active switch "on" time to the total switching period, called the Duty Ratio. For example an ideal buck converter with a 10V input operating at a duty ratio of 50% will produce an average output voltage of 5V. A feedback control loop is usually employed to maintain (regulate) the output voltage by varing the duty ratio to compensate for variations in input voltage. The output voltage of a boost converter is always greater than the input voltage and the buck-boost output voltage is inverted but can be greater than, equal to, or less than the magnitude of its input voltage. There are many variations and extensions to this class of converters but these three form the bases of almost all isolated and non-isolated DC to DC conveters. By adding a second inductor the Cuk and SEPIC converters can be implemented or by adding additional active switches various bridge converters can be realised.

Tuesday, July 20, 2010

How to configure Open Shortest Path First (OSPF)

The Open Shortest Path First (OSPF) protocol is a link state protocol that handles routing for IP traffic. Its newest implementation, version 2, which is explained in RFC 2328, is an open standard. Open Shortest Path First (OSPF) is an open standard (not proprietary) and it will run on most routers independent of make. Open Shortest Path First (OSPF) uses the Shortest Path First (SPF) algorithm, developed by Dijkstra, to provide a loop-free topology. Open Shortest Path First (OSPF) provides fast convergence with triggered, incremental updates via Link State Advertisements (LSAs). Open Shortest Path First (OSPF) is a classless protocol and allows for a hierarchical design with VLSM and route summarization

The main disadvantages of Open Shortest Path First (OSPF) are Open Shortest Path First (OSPF) requires more memory to hold the adjacency (list of OSPF neighbors), topology (a link state database containing all of the routers and their routes), and routing tables, Open Shortest Path First (OSPF) requires extra CPU processing to run the SPF algorithm and Open Shortest Path First (OSPF) is a complex routing protocol.

The two important concepts in case of OSPF are Autonomous Systems and Areas. Areas are used to provide hierarchical routing, within an Autonomous System. Areas are used to control when and how much routing information is shared across your network.

OSPF implements a two-layer hierarchy: the backbone (Area 0) and areas off of the backbone (Areas 1–65,535). Here the two different areas can summarize routing information between them. Route summerization helps to compact the routing tables. All areas should connect to Area 0 and all routers in an Area will have the same topology table.

Open Shortest Path First (OSPF) metric value
Open Shortest Path First (OSPF) uses cost as the value of metric and uses a reference bandwidth of 100 Mbps for cost calculation. The formula to calculate the cost is reference bandwidth divided by interface bandwidth. For example, in the case of Ethernet, it is 100 Mbps / 10 Mbps = 10.

Important Terms related with Open Shortest Path First (OSPF)
Router ID
Each router in an OSPF network needs a unique ID. The ID is used to provide a unique identity to the OSPF router.

• The highest IP address on its loopback interfaces (this is a logical interface on a router)

• The highest IP address on its active interfaces

Loopback Interfaces
A loopback interface is a logical, virtual interface on a router. By default, the router doesn’t have any loopback interfaces, but they can easily be created. These interfaces are treated as physical interfaces on a router and we can assign ip addresses to them.

Router(Config)#int loopback 2
Router(Config-if)#ip address 200.0.0.10 255.255.255.0


Area border router
An ABR is a router that connects one or more OSPF areas to the main backbone network. It is considered a member of all areas it is connected to.

Internal router
An IR is a router that has only OSPF neighbour relationships with routers in the same area.

Backbone router
Backbone Routers are part of the OSPF backbone. This includes all area border routers and also routers connecting different areas.

Designated Router (DR) and Backup Designated Router (BDR)
A Designated Router (DR) is the router interface elected among all routers on a network segment, and Backup designated (BDR) is a backup for the Designated Router (DR). Designated Routers (DRs) are used for reducing network traffic by providing a source for routing updates. The Designated Router (DR) maintains a complete topology table of the network and sends the updates to the other routers via multicast. All routers in an area will form a slave/master relationship with the Designated Router (DR).

OSPF Configuration
Router(config)# router ospf process_ID
Router(config-router)# network IP_address wildcard_mask area area_#

Note:

Process id: A value in the range 1–65,535 identifies the OSPF Process ID. OSPF Process ID is a unique number on this router that groups a series of OSPF configuration commands under a specific running process.

Wildcard Mask: A 0 octet in the wildcard mask indicates that the corresponding octet in the network must match exactly. On the other hand, a 255 indicates that you don’t care what the corresponding octet is in the network number. A network and wildcard mask combination of 192.168.10.0 0.0.0.0 would match 192.168.10.0 only, and nothing else

What is Routing Loop and how to avoid Routing Loop

A routing loop is a serious network problem which happens when a data packet is continually routed through the same routers over and over. The data packets continue to be routed within the network in an endless circle. A routing loop can have a catastrophic impact on a network, and in some cases, completely disabling the network. Normally Routing Loop is a problem associated with Distance Vector Protocols.

Routing Loop can happen in large internetworks when a second topology change emerges before the network is able to converge on the first change. Convergence is the term used to describe the condition when all routers in an internetwork have agreed on a common topology. Link state protocols tend to converge very quickly, while distance vector protocols tend to converge slowly.

The following methods are used to avoid Routing Loops.

Maximum hop Count

Maximum hop count mechanism can be used to prevent Routing Loops. Distance Vector protocols use the TTL (Time-to-Live) value in the IP datagram header to avoid Routing Loops. When an IP datagram move from router to router, a router keeps track of the hops in the TTL field in the IP datagram header. For each hop a packet goes through, the packet’s TTL field is decremented by one. If this value reaches 0, the packet is dropped by the router that decremented the value from 1 to 0.

Split Horizon

A split horizon is a routing configuration that stops a route from being advertised back in the direction from which it came. Split Horizon mechanism states that if a neighbouring router sends a route to a router, the receiving router will not propagate this route back to the advertising router on the same interface.

Route Poisoning

Route Poisoning is another method for avoiding routing loops. When a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it.

Hold-down Timers

Hold-down timer is another mechanism used to prevent bad routes from being restored and propagated by mistake. When a route is placed in a hold-down state, routers will neither advertise the route nor accept advertisements about it for a specific interval called the hold-down period.

What is Ethernet?

Ethernet is a standard communications protocol embedded in software and hardware devices, intended for building a local area network (LAN). Ethernet was designed by Bob Metcalfe in 1973, and through the efforts of Digital, Intel and Xerox (for which Metcalfe worked), "DIX" Ethernet became the standard model for LANs worldwide.

A basic hard-wired LAN consists of the following components:


Two or more computers to be linked together, or networked.
A network interface card (NIC) in each computer.
Ethernet cable to connect to each computer.
A networking switch or networking hub to direct network traffic.
Networking software.

Split Horizon

In computer networking, split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned

Example
In this example, network node A routes packets to node B in order to reach node C. The links between the nodes are distinct point-to-point links.


According to the split-horizon rule, node Athis seems redundant since B will never route via node A because the route costs more than the direct route from B to C. However, if the link between B and C goes down, and B had received a route from A, B could end up using that route via A. A would send the packet right back to B, creating a loop. With the split-horizon rule in place, this particular loop scenario cannot happen, improving convergence time in complex, highly-redundant environments.

[edit] Poison reverse