<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3849507132481915952</atom:id><lastBuildDate>Fri, 25 Oct 2024 07:34:05 +0000</lastBuildDate><category>4G Technology</category><category>AIRTEL Success Story</category><category>AREA NETWORKS</category><category>Apple 3G iPhones Improving Networking</category><category>BSNL DATAONE broadband disconnect problem</category><category>Basic Concept Of TELECOMMUNICATIONS SYSTEM</category><category>Basic and Simple Definition to 3G</category><category>Business Network</category><category>Business Strategy for Growth</category><category>Business Wireless Planning Strategy</category><category>CCTV IP camera</category><category>CISCO : how IGRP make large INTERNETWORKS in organizations</category><category>CISCO Solutions Provide</category><category>CTT6800+ -JPEG 2000 Compressed Transport Transceiver</category><category>Change of IP Address</category><category>Connectionless packet switching and routing</category><category>Core Network of 3G</category><category>Core Networking In MICROSOFT WINDOWS SERVER 2003</category><category>Current Protocols Essential Laboratory Techniques (CPET)</category><category>Difference between 2G - 3G - 4G &amp; What is 4G &amp; its Advantages ?</category><category>Different Business Networking Types</category><category>DirectX proportional to Networking</category><category>FREE Wi-Fi</category><category>Finisar :Traffic Generation</category><category>Fox Business Network</category><category>GPRS Core Network</category><category>HBR Technologies (HBR)</category><category>HOW TELEPHONE NETWORK SYSTEM WORKS</category><category>History of packet switching</category><category>How To Setup Wireless Connection(APPLY SAFETY SETTINGS FIRST)</category><category>How to Network 2 Computers Without a Hub or Router</category><category>How to Use a Wireless Network Connection with a Windows XP Portable Computer at Home and Work</category><category>How to make a proper website on NETWORKING</category><category>How to troubleshoot wireless network connections in Windows XP Service Pack 2</category><category>IP Addresses</category><category>Importance of BANDWIDTH in DSL Internet Connections</category><category>Internet and its Component</category><category>Introduction to LAN</category><category>Is Your Networking Caught A Virus?</category><category>Long Term Evolution (LTE)</category><category>MICROSOFT the WORLD WIDE LEADER in NETWORKING</category><category>Multi-Core Processing</category><category>Multi-core networking</category><category>NETWORKING CORE</category><category>NETWORKING IN MEDICAL APPLIANCES</category><category>NORTELVisitor-Based Networking Solution</category><category>Network Design</category><category>Network Protocols</category><category>Nokia Dual Sim Phones</category><category>OPTICAL CHARACTERISTICS OF LEDS</category><category>Packet switching in networks</category><category>Pressure Swing Adsorption(PSA)</category><category>Proxy Servers HIDE  IP address from WEB NOT other INFORMATION</category><category>Purpose of Business Network or Networking</category><category>Role of EGP and BGP in the TCP/IP (Exterior Routing Protocols)</category><category>SOLUTION Providers to NETWORK Companies</category><category>STP topology of a Switched Network</category><category>STRUCTURED CABLES IN TELECOMMUNICATION</category><category>SeaTalk NG network</category><category>Setting Priorities for Next-Generation Web Apps - MICROSOFT</category><category>Social Network Services</category><category>Social Networking Services to Expand Business</category><category>Speed UP Your PC in 3 Easy Steps</category><category>Spyware affecting Networking</category><category>Sysinternals File and Disk Utilities</category><category>Sysinternals Networking Utilities</category><category>Sysinternals Security Utilities</category><category>TENA and NetAcquire</category><category>UNIX Network Security Architecture</category><category>WAN and Home Networking</category><category>What Network Administrators Think of NETWORKS</category><category>What Nortel Solutions can Provide? Case Study</category><category>Why Not Reserved IPs on Internet</category><category>WiMAX</category><category>Wireless Code Division Multiple Access (CDMA)</category><category>koollage-blogs-news</category><category>~ (DDBMS) DISTRIBUTED DATABASE MANAGEMENT SYSTEM</category><category>~ ActiveVideo system</category><category>~ Advanced Shellcoding Techniques</category><category>~ Cisco VTP: VLAN Trunking Protocol</category><category>~ Features of the Web</category><category>~ How Core Networking Solve Problems?( Solutions provided by Core Networking)</category><category>~ Modulation Techniques for Wireless</category><category>~ Trillium Multi-Core Software</category><category>~ Wi-Fi Networking News</category><title>Core Networking</title><description>Explore Networking</description><link>http://corenetworking.blogspot.com/</link><managingEditor>noreply@blogger.com (Manpreet Singh Bindra)</managingEditor><generator>Blogger</generator><openSearch:totalResults>89</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-1010766044624220947</guid><pubDate>Wed, 29 Mar 2017 18:00:00 +0000</pubDate><atom:updated>2017-03-29T23:30:11.666+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Difference between 2G - 3G - 4G &amp; What is 4G &amp; its Advantages ?</category><title>Difference between 2G - 3G - 4G &amp; What is 4G &amp; its Advantages ?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRSElaZ15VE2V55rV2UFmnySYwqW8S3ZSrp1KY80XobPahbe1w6t5SgppS9n_zkHVz65GIDlX-F1e8Ac9tUCosP2jFgIiqYrVbZ6d772hEl207GDXOl3kJp8RsQDgDoLrQmaTw4jlQxs0/s1600/2g-3g-4g.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRSElaZ15VE2V55rV2UFmnySYwqW8S3ZSrp1KY80XobPahbe1w6t5SgppS9n_zkHVz65GIDlX-F1e8Ac9tUCosP2jFgIiqYrVbZ6d772hEl207GDXOl3kJp8RsQDgDoLrQmaTw4jlQxs0/s320/2g-3g-4g.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;This is how technology is improving.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;4G is stand for ‘Fourth Generation’, it is a wireless
 network system or packet switched wireless system with extensive area 
exposure &amp;amp; soaring throughput. It is intended to be cost efficient 
&amp;amp; to supply high phantom effectiveness. The data rate or velocity of 20Mbps is working. The mobile
 velocity will be up to ‘200Km/Hr’ &amp;amp; the elevated presentation is 
accomplished by the utilization of extensive term channel in both 
instance term channel in both instance &amp;amp; occurrence, preparation 
among users.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Advantages:&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;ul style=&quot;text-align: justify;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;It speedily downloads the files over wireless network system or form.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Particularly elevated voice excellence.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;It can simply reach Internet, Instant Messaging (IM), common networks, video calling, and many more things.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;It continues connected to the Internet devoid of any disturbance.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;It has simpler approach to the services &amp;amp; consumption.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2017/03/difference-between-2g-3g-4g-what-is-4g.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRSElaZ15VE2V55rV2UFmnySYwqW8S3ZSrp1KY80XobPahbe1w6t5SgppS9n_zkHVz65GIDlX-F1e8Ac9tUCosP2jFgIiqYrVbZ6d772hEl207GDXOl3kJp8RsQDgDoLrQmaTw4jlQxs0/s72-c/2g-3g-4g.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-968041320787309635</guid><pubDate>Sun, 22 Jul 2012 15:26:00 +0000</pubDate><atom:updated>2012-07-22T21:24:10.162+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet and its Component</category><title>Internet and its Component</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
The internet is a
computer network made up of thousands of networks worldwide. No one knows
exactly how many computers are connected to the Internet. It is certain,
however, that these number in the millions.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
No one is in charge of the Internet. There are
organizations which develop technical aspects of this network and set standards
for creating applications on it, but no governing body is in control. The
Internet backbone, through which Internet traffic flows, is owned by private
companies.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
All computers on the Internet communicate with one
another using the Transmission Control Protocol/Internet Protocol suite,
abbreviated to TCP/IP. Computers on the Internet use a client /server
architecture. This means that the remote server machine provides files and
services to the user&#39;s local client machine. Software can be installed on a
client computer to take advantage of the latest access technology.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
An Internet user has access to a wide variety of
services: electronic mail, file transfer, vast information resources, interest
group membership, interactive collaboration, multimedia displays, real-time
broadcasting, shopping opportunities, breaking news, and much more.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; text-align: justify;&quot;&gt;
The Internet consists primarily of a variety of access
protocols. Many of these protocols feature programs that allow users to search
for and retrieve material made available by the protocol.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: 18pt;&quot;&gt;COMPONENTS OF THE INTERNET&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;WORLD WIDE WEB&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
The World Wide Web (abbreviated as the Web or WWW) is a
system of Internet servers that supports hypertext to access several Internet
protocols on a single interface. Almost every protocol type available on the
Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and
Usenet News. In addition to these, the World Wide Web has its own protocol:
HyperText Transfer Protocol, or HTTP. These protocols will be explained later
in this document.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
The World Wide Web provides a single interface for
accessing all these protocols. This creates a convenient and user-friendly
environment. It is no longer necessary to be conversant in these protocols
within separate, command-level environments. The Web gathers together these
protocols into a single system. Because of this feature, and because of the
Web&#39;s ability to work with multimedia and advanced programming languages, the
Web is the fastest-growing component of the Internet.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
The operation of the Web relies primarily on hypertext as
its means of information retrieval. HyperText is a document containing words
that connect to other documents. These words are called links and are
selectable by the user. A single hypertext document can contain links to many
documents. In the context of the Web, words or graphics may serve as links to
other documents, images, video, and sound. Links may or may not follow a
logical path, as each connection is programmed by the creator of the source
document. Overall, the Web contains a complex virtual web of connections among
a vast number of documents, graphics, videos, and sounds.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Producing hypertext for the Web is accomplished by
creating documents with a language called HyperText Markup Language, or HTML.
With HTML, tags are placed within the text to accomplish document formatting,
visual features such as font size, italics and bold, and the creation of
hypertext links. Graphics and multimedia may also be incorporated into an HTML
document. HTML is an evolving language, with new tags being added as each
upgrade of the language is developed and released. The World Wide Web
Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts
of standardizing HTML. The W3C now calls the language XHTML and considers it to
be an application of the XML language standard.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
The World Wide Web consists of files, called pages or
home pages, containing links to documents and resources throughout the
Internet.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
The Web provides a vast array of experiences including
multimedia presentations, real-time collaboration, interactive pages, radio and
television broadcasts, and the automatic &quot;push&quot; of information to a
client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold
Fusion and XML are extending the capabilities of the Web. A growing amount of
information on the Web is served dynamically from content stored in databases.
The Web is therefore not a fixed entity, but one that is in a constant state of
development and flux.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
For more complete information about the World Wide Web,
see Understanding The World Wide Web.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;E-MAIL&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Electronic mail, or e-mail, allows computer users locally
and worldwide to exchange messages. Each user of e-mail has a mailbox address
to which messages are sent. Messages sent through e-mail can arrive within a
matter of seconds.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
A powerful aspect of e-mail is the option to send
electronic files to a person&#39;s e-mail address. Non-ASCII files, known as binary
files, may be attached to e-mail messages. These files are referred to as MIME
attachments.MIME stands for Multimedia Internet Mail Extension, and was
developed to help e-mail software handle a variety of file types. For example,
a document created in Microsoft Word can be attached to an e-mail message and
retrieved by the recipient with the appropriate e-mail program. Many e-mail
programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer
the ability to read files written in HTML, which is itself a MIME type.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;TELNET&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Telnet is a program that allows you to log into computers
on the Internet and use online databases, library catalogs, chat services, and
more. There are no graphics in Telnet sessions, just text. To Telnet to a
computer, you must know its address. This can consist of words (locis.loc.gov)
or numbers (140.147.254.3). Some services require you to connect to a specific
port on the remote computer. In this case, type the port number after the
Internet address. Example: telnet nri.reston.va.us 185.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Telnet is available on the World Wide Web. Probably the
most common Web-based resources available through Telnet have been library catalogs,
though most catalogs have since migrated to the Web. A link to a Telnet
resource may look like any other link, but it will launch a Telnet session to
make the connection. A Telnet program must be installed on your local computer
and configured to your Web browser in order to work.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
With the increasing popularity of the Web, Telnet has
become less frequently used as a means of access to information on the
Internet.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;FTP&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
FTP stands for File Transfer Protocol. This is both a
program and the method used to transfer files between computers. Anonymous FTP
is an option that allows users to transfer files from thousands of host
computers on the Internet to their personal computer account. FTP sites contain
books, articles, software, games, images, sounds, multimedia, course work, data
sets, and more.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
If your computer is directly connected to the Internet
via an Ethernet cable, you can use one of several PC software programs, such as
WS_FTP for Windows, to conduct a file transfer.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
FTP transfers can be performed on the World Wide Web
without the need for special software. In this case, the Web browser will
suffice. Whenever you download software from a Web site to your local machine,
you are using FTP. You can also retrieve FTP files via search engines such as
FtpFind, located at /http://www.ftpfind.com/. This option is easiest because
you do not need to know FTP program commands.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;E-MAIL DISCUSSION
GROUPS&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
One of the benefits of the Internet is the opportunity it
offers to people worldwide to communicate via e-mail. The Internet is home to a
large community of individuals who carry out active discussions organized
around topic-oriented forums distributed by e-mail. These are administered by
software programs. Probably the most common program is the listserv.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
A great variety of topics are covered by listservs, many
of them academic in nature. When you subscribe to a listserv, messages from
other subscribers are automatically sent to your electronic mailbox. You
subscribe to a listserv by sending an e-mail message to a computer program
called a listserver. Listservers are located on computer networks throughout
the world. This program handles subscription information and distributes
messages to and from subscribers. You must have a e-mail account to participate
in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an
example of a site that offers a searchablecollection of e-mail discussion
groups.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Majordomo and Listproc are two other programs that
administer e-mail discussion groups. The commands for subscribing to and
managing your list memberships are similar to those of listserv.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;USENET NEWS&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Usenet News is a global electronic bulletin board system
in which millions of computer users exchange information on a vast range of
topics. The major difference between Usenet News and e-mail discussion groups
is the fact that Usenet messages are stored on central computers, and users
must connect to these computers to read or download the messages posted to
these groups. This is distinct from e-mail distribution, in which messages
arrive in the electronic mailboxes of each list member.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Usenet itself is a set of machines that exchanges
messages, or articles, from Usenet discussion forums, called newsgroups. Usenet
administrators control their own sites, and decide which (if any) newsgroups to
sponsor and which remote newsgroups to allow into the system.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
There are thousands of Usenet newsgroups in existence.
While many are academic in nature, numerous newsgroups are organized around
recreational topics. Much serious computer-related work takes place in Usenet
discussions. A small number of e-mail discussion groups also exist as Usenet
newsgroups.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
The Usenet newsfeed can be read by a variety of
newsreader software programs. For example, the Netscape suite comes with a
newsreader program called Messenger. Newsreaders are also available as
standalone products.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;FAQ, RFC, FYI&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
FAQ stands for Frequently Asked Questions. These are
periodic postings to Usenet newsgroups that contain a wealth of information
related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are
available by subscribing to individual Usenet newsgroups. A Web-based
collection of FAQ resources has been collected by The Internet FAQ Consortium
and is available at /http://www.faqs.org/.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
RFC stands for Request for Comments. These are documents
created by and distributed to the Internet community to help define the nuts
and bolts of the Internet. They contain both technical specifications and
general information.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
FYI stands for For Your Information. These notes are a
subset of RFCs and contain information of interest to new Internet users.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Links to indexes of all three of these information
resources are available on the University Libraries Web site at
/http://library.albany.edu/reference/faqs.html.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;CHAT &amp;amp; INSTANT
MESSENGING&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Chat programs allow users on the Internet to communicate
with each other by typing in real time. They are sometimes included as a
feature of a Web site, where users can log into the &quot;chat room&quot; to
exchange comments and information about the topics addressed on the site. Chat
may take other, more wide-ranging forms. For example, America Online is well
known for sponsoring a number of topical chat rooms.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Internet Relay Chat (IRC) is a service through which
participants can communicate to each other on hundreds of channels. These
channels are usually based on specific topics. While many topics are frivolous,
substantive conversations are also taking place. To access IRC, you must use an
IRC software program.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
A variation of chat is the phenomenon of instant
messenging. With instant messenging, a user on the Web can contact another user
currently logged in and type a conversation. Most famous is America Online&#39;s
Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
Other types of real-time communication are addressed in
the tutorial Understanding the World Wide Web.&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;MUD/MUSH/MOO/MUCK/DUM/MUSE&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNoSpacing&quot; style=&quot;text-align: justify;&quot;&gt;
MUD stands for Multi User Dimension. MUDs, and their
variations listed above, are multi-user virtual reality games based on
simulated worlds. Traditionally text based, graphical MUDs now exist. There are
MUDs of all kinds on the Internet, and many can be joined free of charge. For
more information, read one of the FAQs devoted to MUDs available at the FAQ
site at&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2012/07/internet-its-component.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-2487695338029000106</guid><pubDate>Sat, 05 May 2012 19:28:00 +0000</pubDate><atom:updated>2012-05-06T00:58:35.669+05:30</atom:updated><title>Politics at Workplace: Evil or Beneficial?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;redtext&quot;&gt;Avoiding politics at workplace&lt;/span&gt;&lt;br /&gt;
Although it is practically impossible to make your workplace free from  the politics, but the organisation and the employees can follow certain  ethics for themselves to make their workplace healthier:&lt;br /&gt;
&lt;br /&gt;
&lt;ul class=&quot;text&quot;&gt;
&lt;li&gt;Avoid distorting or manipulating the truth and the facts.&lt;/li&gt;
&lt;li&gt;Be yourself. Don’t have different faces to suit different people and different situations.&lt;/li&gt;
&lt;li&gt;Be fair in your dealings. Take decisions based on other’s performance and not on the basis of your relations with them.&lt;/li&gt;
&lt;li&gt;Be flexible, approachable and accessible to others. Rigidity can isolate you.&lt;/li&gt;
&lt;li&gt;Communicate – Lack of proper communication is the root cause of most  of the problems. Therefore, ensure a timely and open communication  system. Hiding information, rumors or distorted information can  aggravate the situation and problem. Proper communication will also help  to combat the effect of gossip.&lt;/li&gt;
&lt;li&gt;Have a broader perspective. Don’t work to satisfy your ego every  time. Give a fair chance to everyone to put forward their thoughts.&lt;/li&gt;
&lt;li&gt;Last but not the least; be clear in your conscious. Don’t compromise  on your morals and ethics and, don’t hesitate to apologize if you  realize that you are wrong.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2012/05/politics-at-workplace-evil-or.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-48219843935426548</guid><pubDate>Sun, 11 Mar 2012 11:12:00 +0000</pubDate><atom:updated>2012-03-11T16:48:17.141+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Multi-Core Processing</category><title>Multi-Core Processing</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;Multi-core processing is a disruptive technology. Network packets can be processed much more efficiently with multi-core systems, but only if software is carefully optimized.Existing networking stacks will not perform well in multi-core environments; a new paradigm is needed to harness the potential of multi-core networking. Expertise is required in processor device programming, operating systems internals, and networking internals. Remember, two out of three isn’t good enough.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Today multi-core packet processing is utilized in edge, aggregation, and core devices where multi-gigabit performance is required. But multi-core packet processing promises to bring performance enhancements to the entire range of networking devices, from the core to end user.&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2012/03/multi-core-processing.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-4993102077200421970</guid><pubDate>Sat, 02 Apr 2011 14:50:00 +0000</pubDate><atom:updated>2011-04-02T20:37:32.322+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Pressure Swing Adsorption(PSA)</category><title>Pressure Swing Adsorption(PSA)</title><description>PSA  (Pressure Swing Adsorption) technology permits producing oxygen by   pressurization with low-pressure compressed air of two towers filled  with  zeolite molecular sieve in cyclic alternation. While one of the  towers is in  adsorption phase, the other one is regenerated by reducing  the pressure.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2011/04/pressure-swing-adsorptionpsa.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-6047670447148964737</guid><pubDate>Sun, 20 Feb 2011 18:51:00 +0000</pubDate><atom:updated>2011-02-21T00:27:33.898+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business Strategy for Growth</category><title>Business Strategy for Growth</title><description>&lt;p class=&quot;maintext&quot;&gt;Business strategy depend on whether it markets &lt;strong&gt;new or existing&lt;/strong&gt; products in &lt;strong&gt;new or existing     markets.&lt;/strong&gt;&lt;br /&gt; &lt;br /&gt; &lt;img style=&quot;width: 279px; height: 208px;&quot; src=&quot;http://tutor2u.net/business/images/Ansoff%20Matrix%20w500.gif&quot; /&gt;  &lt;/p&gt;   &lt;p class=&quot;maintext&quot;&gt;Result from Ansoff Model&lt;br /&gt;   &lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Market penetration&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;•      Maintain or increase the market share of current products – this       can be achieved by a combination of competitive pricing strategies, advertising,     sales promotion and perhaps more resources dedicated to personal selling&lt;/p&gt;   &lt;p&gt;• Secure dominance of growth markets&lt;/p&gt;   &lt;p&gt;• Restructure a mature market by driving out competitors; this would require         a much more aggressive promotional campaign, supported by a pricing strategy       designed to make the market unattractive for competitors&lt;/p&gt;   &lt;p&gt;•      Increase usage by existing customers – for example by introducing         loyalty schemes&lt;br /&gt;   A market penetration marketing strategy is very much about “business         as usual”. The business is focusing on markets and products it knows         well. It is likely to have good information on competitors and on customer         needs. It is unlikely, therefore, that this strategy will require much       investment in new market research.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Market development&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;•      New geographical markets; for example exporting the product to a new country&lt;/p&gt;   &lt;p&gt;•      New product dimensions or packaging: for example &lt;/p&gt;   &lt;p&gt;•      New distribution channels&lt;/p&gt;   &lt;p&gt;•      Different pricing policies to attract different customers or create new market     segments&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Product development&lt;/strong&gt;&lt;/p&gt;   &lt;p&gt;This strategy may         require the development of new competencies and requires the business     to develop modified products which can appeal to existing markets.&lt;/p&gt;   &lt;p&gt;&lt;strong&gt;Diversification&lt;/strong&gt;&lt;/p&gt;      &lt;p&gt;This is an inherently       more risk strategy because the business is moving into markets in which   it has little or no experience.&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2011/02/business-strategy-for-growth.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-4758397649312599024</guid><pubDate>Fri, 18 Feb 2011 10:46:00 +0000</pubDate><atom:updated>2011-02-18T16:25:59.757+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Long Term Evolution (LTE)</category><title>Long Term Evolution (LTE)</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Talking about Long Term Evolution (LTE) ,it is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&quot;Long Term Evolution&quot; because it represents the next step (4G) in a progression from GSM, a 2G standard, to UMTS, the 3G technologies based upon GSM. LTE provides significantly increased peak data rates, with the potential for 100 Mbps downstream and 30 Mbps upstream.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;LTE support mixed data, voice, video and messaging traffic and use OFDM (Orthogonal Frequency Division Multiplexing) and MIMO (Multiple Input Multiple Output) antenna technology similar to that used in the IEEE 802.11n wireless local area network (WLAN) standard. The higher signal to noise ratio (SNR) at the receiver enabled by MIMO, along with OFDM, provides improved coverage and throughput, especially in dense urban areas.&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2011/02/talking-about-long-term-evolution-lte.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-5514968921859420674</guid><pubDate>Tue, 23 Nov 2010 17:32:00 +0000</pubDate><atom:updated>2010-11-27T00:16:07.164+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Core Network of 3G</category><title>Core Network of 3G</title><description>&lt;div style=&quot;font-family: times new roman,new york,times,serif; font-size: 14pt; color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt; The Core Network of 3G is divided in circuit switched and packet switched  domains. Some of the circuit switched elements are Mobile services  Switching Centre (MSC), Visitor location register (VLR) and Gateway MSC.  Packet switched elements are Serving GPRS Support Node (SGSN) and  Gateway GPRS Support Node (GGSN). Some network elements, like EIR, HLR,  VLR and AUC are shared by both domains.&lt;br /&gt;&lt;br /&gt;The Asynchronous Transfer Mode (ATM) is defined for UMTS core  transmission. ATM Adaptation Layer type 2 (AAL2) handles circuit  switched connection and packet connection protocol AAL5 is designed for  data delivery.&lt;br /&gt;&lt;br /&gt;The architecture of the Core Network may change when new services and  features are introduced. Number Portability DataBase (NPDB) will be used  to enable user to change the network while keeping their old phone  number. Gateway Location Register (GLR) may be used to optimise the  subscriber handling between network boundaries.  MSC, VLR and SGSN can  merge to become a UMTS MSC. &lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:times new roman,new york,times,serif;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family:times new roman,new york,times,serif;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Dr. Jasleen&lt;/span&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;BDS&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt; &lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2010/11/core-network-of-3g.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-5810976098600221096</guid><pubDate>Tue, 23 Nov 2010 17:24:00 +0000</pubDate><atom:updated>2010-11-27T00:16:44.084+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Basic and Simple Definition to 3G</category><title>Basic &amp; Simple Definition to 3G</title><description>&lt;div style=&quot;font-family: times new roman,new york,times,serif; font-size: 14pt; color: rgb(0, 0, 0);&quot;&gt;For common man 3G means&lt;br /&gt;&lt;br /&gt;1. Video Call And&lt;br /&gt;2. Fast Speed to download data.&lt;br /&gt;&lt;br /&gt;a. The transfer rate for 3G networks is between 128 and 144 kbps (kilobits  per second) for devices that are moving fast and 384 kbps for slow  ones(like for pedestrians).&lt;br /&gt;&lt;br /&gt;b. For fixed wireless LAN, the speed goes beyond 2 Mbps.&lt;br /&gt;&lt;br /&gt;c. The  first thing you require is a device (e.g. a mobile phone) that is 3G  compatible. This is where the name 3G phone comes from - a phone that  has 3G functionality; nothing to do with the number of cameras or the  memory it has. An example is the iPhone 3G.&lt;br /&gt;&lt;br /&gt;At Last 3G provides&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Several times higher data speed; &lt;/li&gt;&lt;li&gt;Enhanced audio and video streaming; &lt;/li&gt;&lt;li&gt;Video-conferencing support; &lt;/li&gt;&lt;li&gt;Web and WAP browsing at higher speeds; &lt;/li&gt;&lt;li&gt;IPTV (TV through the Internet) support. &lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Operators launching 3G by 2010 end :&lt;br /&gt;&lt;br /&gt;1. Tata Teleservices  Ltd.&lt;br /&gt;2. Vodafone Essar Ltd.&lt;br /&gt;3. Airtel&lt;br /&gt;&lt;br /&gt;India&#39;s largest mobile service provider, Bharti Airtel has announced  that it will Launch its 3G Services in  13 Circles across India by 2010  End. Airtel becoming the third private operator after Tata Teleservices  Ltd. and  Vodafone Essar Ltd. to announce 3G service plans  in  the  world&#39;s fastest growing telecommunications market. In May 2010, Airtel  succesfully won the bid for 13 telecom zones for INR122.95 billion  ($2.77 billion).&lt;div&gt; &lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman,new york,times,serif;&quot; &gt;Er. Manpreet Singh Bindra&lt;br /&gt;India &lt;/span&gt;&lt;span style=&quot;font-family:times new roman,new york,times,serif;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family:times new roman,new york,times,serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt; &lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2010/11/basic-simple-definition-to-3g.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-6697912246131990451</guid><pubDate>Wed, 22 Sep 2010 08:00:00 +0000</pubDate><atom:updated>2010-11-27T00:17:01.900+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business Wireless Planning Strategy</category><title>Business Wireless Planning Strategy</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;font: inherit;&quot; valign=&quot;top&quot;&gt;&lt;h4&gt;Business Wireless Planning Strategy&lt;/h4&gt; &lt;h4&gt;Business Planning&lt;/h4&gt; &lt;div&gt;New entrants to wireless have the daunting task of attracting marketshare in an increasingly competitive environment. Identifying the coverage footprint that will deliver the target ROI hinges on many variables, such as the underlying demographics, competitor footprint, technology capability and target service offering. Subscriber projections, churn, and average revenue per unit (ARPU) are tied closely to system performance and device capabilities. The Wireless Strategy team has built new markets from the ground up, and can turn the multivariate view of technical, marketing, and competitive data into a coherent financial and operational plan. We understand the business of wireless technology.&lt;/div&gt; &lt;h4&gt;Spectrum Valuation&lt;/h4&gt; &lt;div&gt;The value of spectrum depends on both business and technical factors. FCC regulations, interference concerns, and existing and future uses of the spectrum and adjacent blocks all affect its viability for various technologies. The technology&#39;s true performance will impact the services that can be offered, which will impact the revenue opportunity. Wireless Strategy understands both sides of the equation and can solve for the true value.&lt;/div&gt; &lt;h4&gt;Strategic Analysis&lt;/h4&gt; &lt;div&gt;The wireless sector offers unlimited investment opportunities. But which new wireless technologies will be adopted by operators, and which ones will be left by the wayside? Which new wireless entrants or traditional operators will be capable of growing to the next level of performance and deliver significant returns on investment? Wireless Strategy&#39;s partners have years of experience in analyzing new technologies and assessing their value to the wireless operator.&lt;/div&gt; &lt;h4&gt;Technology Briefings&lt;/h4&gt; &lt;div&gt;We have years of experience in briefing wireless executives on technical subjects, providing clear, concise summaries of the relevant information affecting their business. Investors benefit from our unbiased assessments of technologies and operator performance. Whether explaining the basics of wireless operations or identifying the impact of a new technology on a business, we are ready to brief executives and investors on the best path forward.&lt;/div&gt; &lt;h4&gt;Executive Services&lt;/h4&gt; &lt;div&gt;The wireless industry has seen numerous mergers and turbulence in recent years. Wireless Strategy can provide stability through management change by teaming with the business organizations and delivering continuity and focus on company performance. Our partners are well qualified to fill technology and operations executive positions on a temporary or longer term basis.&lt;/div&gt; &lt;div&gt; &lt;/div&gt; &lt;div&gt;Karl &lt;/div&gt; &lt;div&gt;USA&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2010/09/business-wireless-planning-strategy.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-7888294873282521278</guid><pubDate>Wed, 22 Sep 2010 07:56:00 +0000</pubDate><atom:updated>2010-11-27T00:17:27.429+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Nokia Dual Sim Phones</category><title>Nokia Dual Sim Phones</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;font: inherit;&quot; valign=&quot;top&quot;&gt;&lt;div class=&quot;buzzup_para&quot;&gt;Nokia Dual Sim Phones&lt;/div&gt; &lt;div class=&quot;buzzup_para&quot; align=&quot;left&quot;&gt;The new dual SIM phones, Nokia C1 (C1-00) and Nokia C2 (C2-00), were affordable entry level phones which will give maximum battery back up. Company claimed that these models, especially Nokia C1, will provide a standby battery time of up to six weeks, the longest ever for a Nokia phone.&lt;/div&gt; &lt;p align=&quot;left&quot;&gt;&lt;br /&gt;&lt;br /&gt;The Nokia C1 was a basic model without much multimedia features. The users can only use this type for voice and SMS. It has a FM radio, a flashlight and colour screen. The &#39;call divert&#39; feature will help the users not to miss a call from either of the two SIMs.&lt;br /&gt;&lt;br /&gt;The users can switch between the two SIM cards by simply holding down a key. Users can buy Nokia C1 at just Rs 1999.&lt;br /&gt;&lt;br /&gt;Nokia C2 has features like Ovi Mail and Ovi Life Tools, which provides information on healthcare, agriculture, education and entertainment. The memory capacity can be expanded upto 32 GB using Micro SD cards. Users can buy this dual SIM phone at just Rs 2500.&lt;br /&gt;&lt;/p&gt;&lt;p align=&quot;left&quot;&gt;Puneet Tripathi&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2010/09/nokia-dual-sim-phones.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-3671784870116511027</guid><pubDate>Sat, 28 Aug 2010 11:51:00 +0000</pubDate><atom:updated>2010-08-28T17:23:44.143+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">4G Technology</category><title>4G Technology : 4th Generation Technology</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;The fourth generation of mobile networks will truly turn the current mobile phone networks, in to end to end IP based networks, couple this with the arrival of IPv6, every device in the world will have a unique IP address, which will allow full IP based communications from a mobile device, right to the core of the internet, and back out again. If 4G is implemented correctly, it will truly harmonise global roaming, super high speed connectivity, and transparent end user performance on every mobile communications device in the world.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;4G is set to deliver 100mbps to a roaming mobile device globally, and up to 1gbps to a stationary device. With this in mind, it allows for video conferencing, streaming picture perfect video and much more.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;It wont be just the phone networks that need to evolve, the increased traffic load on the internet as a whole (imagine having 1 billion 100mb nodes attached to a network over night) will need to expand, with faster backbones and oceanic links requiring major upgrade.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;4G wont happen over night, it is estimated that it will be implemented by 2010, and if done correctly, should take off rather quickly. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2010/08/4g-technology-4th-generation-technology.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-324940874133394260</guid><pubDate>Sat, 06 Feb 2010 19:53:00 +0000</pubDate><atom:updated>2010-11-27T00:19:38.010+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">WiMAX</category><title>WiMAX Introduction</title><description>&lt;!--[if !mso]&gt; &lt;style&gt; v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} &lt;/style&gt; &lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; latentstylecount=&quot;156&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal  {mso-style-parent:&quot;&quot;;  margin:0in;  margin-bottom:.0001pt;  mso-pagination:widow-orphan;  font-size:12.0pt;  font-family:&quot;Times New Roman&quot;;  mso-fareast-font-family:&quot;Times New Roman&quot;;} h1  {mso-margin-top-alt:auto;  margin-right:0in;  margin-bottom:6.0pt;  margin-left:0in;  mso-pagination:widow-orphan;  mso-outline-level:1;  font-size:15.5pt;  font-family:&quot;Times New Roman&quot;;  font-weight:bold;} p  {margin-top:6.0pt;  margin-right:0in;  margin-bottom:.15in;  margin-left:0in;  mso-pagination:widow-orphan;  font-size:12.0pt;  font-family:&quot;Times New Roman&quot;;  mso-fareast-font-family:&quot;Times New Roman&quot;;} @page Section1  {size:8.5in 11.0in;  margin:1.0in 1.25in 1.0in 1.25in;  mso-header-margin:.5in;  mso-footer-margin:.5in;  mso-paper-source:0;} div.Section1  {page:Section1;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable  {mso-style-name:&quot;Table Normal&quot;;  mso-tstyle-rowband-size:0;  mso-tstyle-colband-size:0;  mso-style-noshow:yes;  mso-style-parent:&quot;&quot;;  mso-padding-alt:0in 5.4pt 0in 5.4pt;  mso-para-margin:0in;  mso-para-margin-bottom:.0001pt;  mso-pagination:widow-orphan;  font-size:10.0pt;  font-family:&quot;Times New Roman&quot;;  mso-ansi-language:#0400;  mso-fareast-language:#0400;  mso-bidi-language:#0400;} &lt;/style&gt; &lt;![endif]--&gt;  &lt;h1&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:12.5pt;color:black;&quot;   &gt;WiMAX Introduction&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;WiMax (Worldwide Interoperability for Microwave Access) is a wireless broadband technology, which supports point to multi-point (PMP) broadband wireless access. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;/div&gt;&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;WiMax is basically a new shorthand term for IEEE Standard 802.16, which was designed to support the European standards. 802.16&#39;s predecessors (like 802.11a) were not very acc ommodative of the European standards, per se. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;/div&gt;&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;The IEEE wireless standard has a range of up to 30 miles, and can deliver broadband at around 75 megabits per second. This is theoretically, 20 times faster than a commercially available wireless broadband. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;/div&gt;&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;The 802.16, WiMax standard was published in March 2002 and provided updated information on the Metropolitan Area Network (MAN) technology. The extension given in the March publication, extended the line-of-sight fixed wireless MAN standard, focused solely on a spectrum from 10 GHz to 60+ GHz.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;/div&gt;&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;This extension provides for non-line of sight access in low frequency bands like 2 - 11 GHz. These bands are sometimes unlicensed. This also boosts the maximum distance from 31 to 50 miles and supports PMP (point to multipoint) and mesh technologies. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;/div&gt;&lt;p align=&quot;left&quot;&gt;&lt;span style=&quot;font-family:Comic Sans MS;font-size:16pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;The IEEE approved the 802.16 standards in June 2004, and three working groups were formed to evaluate and rate the standards. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; align=&quot;left&quot;&gt;&lt;span style=&quot;font-size: 16pt;font-family:Comic Sans MS;font-size:130%;&quot;  &gt;&lt;span style=&quot;;font-family:Arial;font-size:9.5pt;color:black;&quot;   &gt;WiMax can be used for wireless networking like the popular WiFi. WiMax, a second-generation protocol, allows higher data rates over longer distances, efficient use of bandwidth, and avoids interference almost to a minimum. WiMax can be termed partially a successor to the Wi-Fi protocol, which is measured in feet, and works, over shorter distances.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;  &lt;span style=&quot;font-size: 16pt;font-family:Comic Sans MS;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: 16pt;font-family:Comic Sans MS;font-size:130%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 16pt;font-family:Comic Sans MS;font-size:130%;&quot;  &gt;&lt;span&gt;Manpreet Singh Bindra&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;          &lt;br /&gt;&lt;hr /&gt;Hotmail: Free, trusted and rich email service. &lt;a href=&quot;https://signup.live.com/signup.aspx?id=60969&quot; target=&quot;_new&quot;&gt;Get it now.&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2010/02/wimax-introduction.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-2239312778322957352</guid><pubDate>Mon, 28 Sep 2009 19:04:00 +0000</pubDate><atom:updated>2009-09-29T00:42:44.416+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">OPTICAL CHARACTERISTICS OF LEDS</category><title>OPTICAL CHARACTERISTICS OF LEDS</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;The radiation from an LED can be characterized by radiometric and spectroradiometric&lt;br /&gt;quantities. If the LED emits visible radiation, then photometric and colorimetric quantities&lt;br /&gt;are also required to quantify its effect on the human eye. Note that for every radiometric&lt;br /&gt;quantity there is a photometric analog. The only difference is that, for radiometric quantities&lt;br /&gt;the radiation is evaluated in energy units, while for photometric quantities the radiation is&lt;br /&gt;weighted against the photopic response of the human eye.&lt;br /&gt;&lt;br /&gt;3.1 Spectral Properties of Light Emitting Diodes&lt;br /&gt;&lt;br /&gt;The spectral distribution of the optical radiation emitted by LEDs distinguish them from&lt;br /&gt;typical element sources. The radiant power is neither monochromatic (as emitted by lasers),&lt;br /&gt;nor broadband (as found with incandescent lamps), but rather something between the two.&lt;br /&gt;The light output of a typical LED has a narrowband spectral bandwidth between 20nm and&lt;br /&gt;50nm and a peak wavelength somewhere in the near UV, the visible, or near infrared regions&lt;br /&gt;of the spectrum.&lt;br /&gt;&lt;br /&gt;Sample LED Spectral Distributions&lt;br /&gt;&lt;br /&gt;The spectral properties of an LED are important to aid&lt;br /&gt;manufacturers in their design efforts and process control.&lt;br /&gt;End-users use these values in determining the correct LED&lt;br /&gt;for their application. An overview of the spectral parameters&lt;br /&gt;of an LED is listed below:&lt;br /&gt;Peak Wavelength λp:&lt;br /&gt;Wavelength at the maximum spectral power . The peak wavelength has little significance for&lt;br /&gt;practical purposes since two LEDs may have the same peak&lt;br /&gt;wavelength but different color perception.&lt;br /&gt;Full Width Half Max (FWHM):&lt;br /&gt;The spectral bandwidth at half peak λ 0.5 is calculated from&lt;br /&gt;the two wavelengths λ&#39;0.5 and λ&#39;&#39;0.5 on either side of λp.&lt;br /&gt;λ 0.5 = λ&#39;0.5 - λ&#39;&#39;0.5 (Reference Figure 3.0).&lt;br /&gt;Center Wavelength λ m:&lt;br /&gt;The center wavelength is the wavelength halfway between the half-wavelengths λ&#39;0.5 - λ&#39;&#39;0.5.&lt;br /&gt;Centroid Wavelength λc:&lt;br /&gt;The centroid wavelength is the center of moment or the mean of the spectral power&lt;br /&gt;distribution.&lt;br /&gt;Dominant Wavelength:&lt;br /&gt;The dominant wavelength is determined from drawing a straight line through the color&lt;br /&gt;coordinates of the reference illuminant (usually arbitrarily chosen as illuminant E) and&lt;br /&gt;the measured chromaticity coordinates of the LED in the International Commission on&lt;br /&gt;Illumination (CIE) 1931 chromaticity diagram. The intersection of this straight line on&lt;br /&gt;the boundary of the chromaticity diagram gives the dominant wavelength. It is a measure&lt;br /&gt;of the hue sensation produced in the human eye by the LED.&lt;br /&gt;Purity:&lt;br /&gt;Purity is defined as the ratio of the distance from reference illuminant (usually arbitrarily&lt;br /&gt;chosen as Illuminant E) to the measured chromaticity coordinates and the distance from&lt;br /&gt;reference illuminant to the intersection with the boundary of the chromaticity diagram.&lt;br /&gt;Most LEDs are narrow band radiators, with a purity of nearly 100%, i.e. the color cannot&lt;br /&gt;be distinguished from a monochromatic beam. Polychromatic sources have low purity&lt;br /&gt;approaching zero.&lt;br /&gt;Full Width Half Max Angle , Viewing Angle or Beam Angle:&lt;br /&gt;The total cone apex angle in degrees encompassing the central, high luminous intensity&lt;br /&gt;portion of a directional beam, from the on-axis peak out to the off-axis angles in both&lt;br /&gt;directions at which the source&#39;s relative intensity is 1/2.&lt;br /&gt;Half-Angle:&lt;br /&gt;The included angle in degrees between the peak and the point on one side of the beam&lt;br /&gt;axis at which the luminous intensity is 50% of maximum or half of the beam angle.&lt;br /&gt;Note: Peak Wavelength, Full Width Half Max, Center Wavelength, and Centroid&lt;br /&gt;Wavelength are all plotted on a scale of (power / λ) vs. (λ).&lt;br /&gt;0.5&lt;br /&gt;(2θ1/2)&lt;br /&gt;4&lt;br /&gt;&lt;br /&gt;Theoretical V(λ) function, relative&lt;br /&gt;spectral flux output of a blue LED,&lt;br /&gt;relative spectral distribution of a&lt;br /&gt;typical tungsten incandescent lamp,&lt;br /&gt;typical response of photopic detector&lt;br /&gt;with f1’ response of 4%.&lt;br /&gt;3.2 Comparison of Photometers and Spectroradiometers&lt;br /&gt;Photometers use a broadband detector in conjunction with an optical filter in an effort to&lt;br /&gt;simulate the spectral luminous efficiency curve of the human eye, V(λ), which is referenced&lt;br /&gt;using CIE 15.2 Colorimetry. The detection process involves a change in the&lt;br /&gt;characteristics of the detector caused by the absorption of visible photons. The electrical&lt;br /&gt;signal generated by the detector is a response to the visible radiation incident on the detector&lt;br /&gt;active area. For example, a photometer designed to measure illuminance may be calibrated&lt;br /&gt;in photocurrent per lux.&lt;br /&gt;Spectroradiometers can be calibrated to measure the radiant energy or radiant flux from an&lt;br /&gt;LED as a function of wavelength. These instruments separate or disperse polychromatic light&lt;br /&gt;into its constituent monochromatic components usually by means of prisms or gratings. The&lt;br /&gt;photometric value may then be computed (usually by software) from this measured spectrum.&lt;br /&gt;This basic difference between spectroradiometers and photometers is extremely important in&lt;br /&gt;LED metrology.&lt;br /&gt;A disadvantage of a photometer is the difficulty in designing a filter that, when combined&lt;br /&gt;with a detector, fits the spectral luminous efficiency curve of the eye exactly. Because of&lt;br /&gt;available filter materials, a mismatch is particularly prevalent in the blue portion of the&lt;br /&gt;spectrum. Though corrections can be applied, these corrections require knowledge of the&lt;br /&gt;LED spectral distribution and are usually approximations. Figure 3.1 shows the theoretical&lt;br /&gt;V(λ) function, the relative spectral flux output of a blue LED, the relative spectral distribution&lt;br /&gt;of a typical tungsten incandescent lamp, and the typical response of a photopic detector.&lt;br /&gt;A typical photopic detector with an f1&#39; response of 4% can have a spectral mismatch as great&lt;br /&gt;as a factor of 2 at 470nm between the V(λ) function and the response of a photopic detector.&lt;br /&gt;If an incandescent source or a source similar in spectral content is measured, the correction&lt;br /&gt;for the slopes of the photopic detector to the V(λ) curve is minimal since the light is&lt;br /&gt;continuous and there is relatively little light in the&lt;br /&gt;blue portion of the spectrum in relation to the&lt;br /&gt;higher wavelengths. A mismatch in the response&lt;br /&gt;curves results in only a slight error of the measured&lt;br /&gt;photometric value.&lt;br /&gt;LEDs, however, have a completely different spectral&lt;br /&gt;power distribution, which tends to be narrowband&lt;br /&gt;Gaussian with a specific peak and a FWHM of a&lt;br /&gt;couple of tens of nanometers. The relatively poor&lt;br /&gt;match of the photopic detector to the V(λ) function,&lt;br /&gt;can result in large deviations in the measured photometric&lt;br /&gt;quantities. This is particularly true for blue&lt;br /&gt;and red LEDs. Errors exceeding a hundred percent&lt;br /&gt;are not unusual for blue LEDs. Spectroradiometers&lt;br /&gt;avoid these errors because the photometric quantities&lt;br /&gt;are calculated from the spectral data and defined CIE&lt;br /&gt;functions. It should be noted that photometers can&lt;br /&gt;be used to compare sources having identical spectral&lt;br /&gt;distribution, or to measure illumination of the same spectral distribution as that of the source&lt;br /&gt;with which it was calibrated. LEDs can have so much variation from one to another, spectroradiometers&lt;br /&gt;or photometers fabricated with specially designed filtering should be used for&lt;br /&gt;LED metrology.&lt;br /&gt;5&lt;br /&gt;3.3 Color and Dominant Wavelength&lt;br /&gt;Often used for determining the color of an LED, dominant wavelength is actually a&lt;br /&gt;measure of the hue sensation produced in the human eye. Hue designates the basic color&lt;br /&gt;being referenced; such as, red, yellow or blue-green. The hue refers to the color impression&lt;br /&gt;that a sample makes. Two LEDs can have the same hue, but it is possible for one to appear&lt;br /&gt;washed out. For example, one can look red and one can look pink.&lt;br /&gt;In order to guarantee a match in color from one LED to another both dominant wavelength&lt;br /&gt;and purity should be referenced. Purity is a characteristic of chroma (also referred to as&lt;br /&gt;saturation), which is the degree of color saturation, or the amount of pure color added to&lt;br /&gt;obtain the sample. The purer colors of a particular hue sample are placed nearer to the&lt;br /&gt;boundary of the chromaticity diagram.&lt;br /&gt;In order to calculate the color properties of an LED, the spectral properties of the LED&lt;br /&gt;must be known. Therefore, a photometer cannot be used. In choosing a spectroradiometer&lt;br /&gt;with which to calculate these values, it should be noted that the optical bandwidth of a&lt;br /&gt;spectroradiometer artificially broadens the spectral shape of any source. For LEDs, this&lt;br /&gt;can introduce errors, especially in the calculated chromaticity coordinates and dominant&lt;br /&gt;wavelength. A 10nm bandwidth spectroradiometer, measuring 20nm full width half max&lt;br /&gt;LEDs, can cause errors as high as:&lt;br /&gt;0.005 in x&lt;br /&gt;0.007 in y&lt;br /&gt;2nm in λd&lt;br /&gt;On the other hand, error contributions on color for spectroradiometers with bandwidths&lt;br /&gt;of 5nm have been documented to be less than about 0.002 in x,y (0.001 in u&#39;,v&#39;) and 0.2nm&lt;br /&gt;in dominant wavelength. Bandwidths of 1nm or less have no appreciable error contribution.&lt;br /&gt;In choosing a spectroradiometer one should be aware of these errors. Spectroradiometers&lt;br /&gt;with bandwidths of 5nm or less are accepted for most practical measurements of LEDs&lt;br /&gt;of all colors.&lt;br /&gt;3.4 Influence of Temperature on Radiation&lt;br /&gt;Initial Light-up:&lt;br /&gt;The light output of an LED is a function of Vf and If,&lt;br /&gt;where the LED junction temperature under constant current&lt;br /&gt;operation heavily influences Vf. At constant current.&lt;br /&gt;the forward voltage of an LED stabilizes as the junction&lt;br /&gt;temperature (Tj) stabilizes. The junction temperature of&lt;br /&gt;the LED is determined by Tj =Ta + Pd * Rth (j-a). Where&lt;br /&gt;Ta is ambient temperature, Pd is power dissipation (Vf *I f)&lt;br /&gt;and Rth(j-a) is the thermal resistance (junction to ambient&lt;br /&gt;temperature). During initial light-up, the temperature of&lt;br /&gt;the junction increases due to electrical power consumed&lt;br /&gt;by the LED chip and then stabilizes at a temperature&lt;br /&gt;value &gt; Ta. Because of this effect, the emitted light is not&lt;br /&gt;stabilized until thermal equilibrium has been reached.&lt;br /&gt;After thermal equilibrium, the junction value is governed&lt;br /&gt;by the heat transfer to the surroundings, which takes&lt;br /&gt;place through the leads of the LED. As a consequence,&lt;br /&gt;the thermal properties of the electrical contacts used to&lt;br /&gt;supply the LED, the length of the wires between the chip, and when used the heat sink can&lt;br /&gt;significantly affect the output. Figure 3.2 shows the stabilization over time of a green LED.&lt;br /&gt;The relative spectral flux and the forward voltage is measured every 5 seconds with a constant&lt;br /&gt;current of 20ma flowing through the LED, until a near constant forward voltage is achieved. The stabilization procedure can take several minutes and will be&lt;br /&gt;influenced by the properties of the specific LED measured. Depending on the LED type,&lt;br /&gt;spectral distribution effects from junction temperature, as presented in the graph, can create&lt;br /&gt;6 shifts in dominant wavelength&lt;br /&gt;&lt;br /&gt;Example of LED&lt;br /&gt;Stabilization Over Time&lt;br /&gt;as great as 0.7nm and decreases in luminous flux as great as&lt;br /&gt;3.5%. Since the dominant wavelength is dependent upon&lt;br /&gt;the intersection on the spectrum locus of the 1931 CIE&lt;br /&gt;chromaticity diagram, small spectral distribution changes&lt;br /&gt;in &quot;red&quot; and &quot;blue&quot; LEDs can create relatively large changes&lt;br /&gt;in dominant wavelength.&lt;br /&gt;Thermal Equilibrium:&lt;br /&gt;Once thermal equilibrium has been reached, the spectral&lt;br /&gt;distribution of an LED is dependent upon the ambient&lt;br /&gt;temperature surrounding the chip. For a typical LED as the&lt;br /&gt;power is stabilized and the ambient temperature rises, there&lt;br /&gt;will be a slight change in the shape of the spectrum, and the&lt;br /&gt;peak wavelength will shift about 0.1 to 0.3nm/K. For blue&lt;br /&gt;LEDs, the shift in most cases is towards shorter wavelengths.&lt;br /&gt;For other LEDs, the whole distribution will shift in the&lt;br /&gt;direction of longer wavelengths. The luminous efficacy and color of LEDs can be changed by&lt;br /&gt;relatively small ambient temperature changes, making it difficult to achieve constant photometric&lt;br /&gt;or radiometric measurement results. Figure 3.3 depicts the spectral radiant flux output&lt;br /&gt;of a &quot;green&quot; LED run at 23°C and 30°C. For this example, a 1.1nm shift in peak wavelength&lt;br /&gt;resulted in a 0.2nm change in dominant wavelength. As previously described, shifts in the&lt;br /&gt;spectra of red and blue LEDs, because of their location on the color curve, will create greater&lt;br /&gt;changes in dominant wavelength. Since the spectral distribution of an LED depends on both&lt;br /&gt;the junction temperature of the chip and stabilization of current, temperature offers the best&lt;br /&gt;way of controlling the operating conditions and maintaining a constant spectral distribution.&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/09/optical-characteristics-of-leds.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-8494045627339558692</guid><pubDate>Mon, 28 Sep 2009 18:53:00 +0000</pubDate><atom:updated>2009-09-29T00:25:24.338+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">STRUCTURED CABLES IN TELECOMMUNICATION</category><title>STRUCTURED CABLES IN TELECOMMUNICATION</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Ukr7kzdg940gjXY0uI47ZkGMg243mJbPPR91DWN36sJxg_EAj8aTiMRE2ik_dvXgC3ssyGCgkYpCvbPZzdOdoSgHSc4vnxj55fCDM3zAmVqt20YUc1OY77MEEIsxSwelqb6u0TZNniE/s1600-h/cables.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 170px; height: 220px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Ukr7kzdg940gjXY0uI47ZkGMg243mJbPPR91DWN36sJxg_EAj8aTiMRE2ik_dvXgC3ssyGCgkYpCvbPZzdOdoSgHSc4vnxj55fCDM3zAmVqt20YUc1OY77MEEIsxSwelqb6u0TZNniE/s400/cables.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5386593621537991346&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;color:#000000;&quot;&gt;Cable&lt;/span&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;&quot;&gt;                                is the highway used to deliver all of you organization&#39;s                                information. A system that is poorly designed, ineffectively                                installed, or out of date hinders the performance,                                profitability and client satisfaction in your organization                                &lt;/span&gt;                             &lt;p&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;&quot;&gt;                                TNSI has the experience and capability to tie your                                cabling needs together for maximum efficiency in                                a cost effective manner, in your building or in                                a campus environment.&lt;br /&gt;                              &lt;/span&gt;&lt;/p&gt;                             &lt;p&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;&quot;&gt;&lt;a name=&quot;voice&quot;&gt;&lt;/a&gt;Voice:                                Structured wiring for voice, modem, terminal, fax                                and other applications.&lt;/span&gt;&lt;/p&gt;                             &lt;p&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;&quot;&gt;&lt;a name=&quot;data&quot;&gt;&lt;/a&gt;Data:                                Structured wiring systems for local area networks,                                host terminal, data collection, factory automation.                                Category 5 and 6 copper twisted pair, patch panels,                                ladder and system racks, network services access,                                building connection, and many other applications.&lt;/span&gt;&lt;/p&gt;                             &lt;p&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;&quot;&gt;&lt;a name=&quot;fiber&quot;&gt;&lt;/a&gt;Fiber                                Optics: Backbone and workstation cable systems using                                single or mutimode fiber. We offer a variety of                                fiber optic systems for unique applications.&lt;/span&gt;&lt;/p&gt;                             &lt;p&gt;&lt;span style=&quot;font-family:Georgia, Times New Roman, Times, serif;&quot;&gt;&lt;a name=&quot;highspeed&quot;&gt;&lt;/a&gt;High                                Speed Internet Access: Access the information Super                                Highway using a high speed internet connection.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/09/structured-cables-in-telecommunication.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Ukr7kzdg940gjXY0uI47ZkGMg243mJbPPR91DWN36sJxg_EAj8aTiMRE2ik_dvXgC3ssyGCgkYpCvbPZzdOdoSgHSc4vnxj55fCDM3zAmVqt20YUc1OY77MEEIsxSwelqb6u0TZNniE/s72-c/cables.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-1088541383638711090</guid><pubDate>Fri, 12 Jun 2009 18:29:00 +0000</pubDate><atom:updated>2009-06-13T00:09:59.893+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">AIRTEL Success Story</category><title>AIRTEL Success Story</title><description>&lt;p style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Airtel’s solutions provider, Bharti Telesoft, designed a unique televoting application that uses Short Messages as the media for polling votes. The application was developed on open standards. Televoting effectively enables Airtel’s mobile subscribers to participate in various SMS contests aired on both KBC &amp;amp; Indian Idol. The system handles tremendous peak loads of mobile-originated (MO) messages generated by subscribers and processes it according to a pre-configured format specified by the two TV programs. The application caters to subscriber traffic across millions of users in seven different Airtel Circles over a pre-defined short code (646).&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;“When we first decided to evaluate Linux, apprehensions were raised immediately. People began to say that the system would choke and not be able to handle the load,” explains Vatsal.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;“But in our simulations, Linux proved its detractors completely wrong. The pilot Enterprise Linux server could handle a peak load of 1000 TPS with superb ease. People soon began to realize that Linux is in fact ideally suited for high throughputs. Since our transactions needed to be recorded into a log file on-the-fly, Linux, with its high performance, was the perfect fit,” he adds.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Security was also another critical factor that swung the decision in the favor of Enterprise Linux. “Microsoft Windows is prone to viruses that affect its filesystem easily, whereas Linux remains unaffected,” he adds. In fact, Windows was never on the selection radar at all. “We didn’t even evaluate it for our server requirements,” adds Vatsal.&lt;/span&gt;&lt;/p&gt; &lt;p style=&quot;font-family: arial; color: rgb(51, 0, 153);&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;At Airtel, Enterprise Linux runs on low cost, dual Intel Xeon servers. The servers run both the Televoting application and a MySQL database at each of the seven different locations across the country. A central server, again powered by Red Hat Enterprise Linux, functions as a host. “The central server generates MIS reports and also acts as an FTP server for the other seven distributed machines,” explains Uttam Kumar, Project Head, Airtel.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/06/airtel-success-story.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-3326705391608298866</guid><pubDate>Fri, 12 Jun 2009 18:26:00 +0000</pubDate><atom:updated>2009-06-12T23:58:47.792+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Wireless Code Division Multiple Access (CDMA)</category><title>Wireless Code Division Multiple Access (CDMA)</title><description>&lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;Code Division Multiple Access (CDMA)&lt;/strong&gt; is a radically new concept in wireless communications. It has gained widespread international acceptance by cellular radio system operators as an upgrade that will dramatically increase both their system capacity and the service quality. It has likewise been chosen for deployment by the majority of the winners of the United States Personal Communications System spectrum auctions. It may seem, however, mysterious for those who aren&#39;t familiar with it. This site is provided in an effort to dispel some of the mystery and to disseminate at least a basic level of knowledge about the technology. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;CDMA is a form of spread-spectrum , a family of digital communication techniques that have been used in military applications for many years. The core principle of spread spectrum is the use of noise-like carrier waves, and, as the name implies, bandwidths much wider than that required for simple point-to-point communication at the same data rate. Originally there were two motivations: either to resist enemy efforts to jam the communications (anti-jam, or AJ), or to hide the fact that communication was even taking place, sometimes called low probability of intercept (LPI). It has a history that goes back to the early days of World War II.&lt;br /&gt;&lt;br /&gt;The use of CDMA for civilian mobile radio applications is novel. It was proposed theoretically in the late 1940&#39;s, but the practical application in the civilian marketplace did not take place until 40 years later. Commercial applications became possible because of two evolutionary developments. One was the availability of very low cost, high density digital integrated circuits, which reduce the size, weight, and cost of the subscriber stations to an acceptably low level. The other was the realization that optimal multiple access communication requires that all user stations regulate their transmitter powers to the lowest that will achieve adequate signal quality.&lt;br /&gt;&lt;br /&gt;CDMA changes the nature of the subscriber station from a predominately analog device to a predominately digital device. Old-fashioned radio receivers separate stations or channels by filtering in the frequency domain. CDMA receivers do not eliminate analog processing entirely, but they separate communication channels by means of a pseudo-random modulation that is applied and removed in the digital domain, not on the basis of frequency. Multiple users occupy the same frequency band. This universal frequency reuse is not fortuitous. On the contrary, it is crucial to the very high spectral efficiency that is the hallmark of CDMA. Other discussions in these pages show why this is true. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;CDMA is altering the face of cellular and PCS communication by: &lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Dramatically improving the telephone traffic capacity &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Dramatically improving the voice quality and eliminating the audible effects of multipath fading &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Reducing the incidence of dropped calls due to handoff failures &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Providing reliable transport mechanism for data communications, such as facsimile and internet traffic &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Reducing the number of sites needed to support any given amount of traffic &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Simplifying site selection &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Reducing deployment and operating costs because fewer cell sites are needed &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Reducing average transmitted power &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Reducing interference to other electronic devices &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Reducing potential health risks &lt;/p&gt;   &lt;/li&gt;&lt;/ul&gt; &lt;p align=&quot;justify&quot;&gt;Commercially introduced in 1995, CDMA quickly became one of the world&#39;s fastest-growing wireless technologies. In 1999, the International Telecommunications Union selected CDMA as the industry standard for new &quot;third-generation&quot; (3G) wireless systems. Many leading wireless carriers are now building or upgrading to 3G CDMA networks in order to provide more capacity for voice traffic, along with high-speed data capabilities. &lt;/p&gt; &lt;p style=&quot;font-weight: bold;&quot; align=&quot;justify&quot;&gt;CDMA is a form of Direct Sequence Spread Spectrum communications. In general, Spread Spectrum communications is distinguished by&lt;strong&gt; three key elements&lt;/strong&gt;: &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;1. The signal occupies a bandwidth much greater than that which is necessary to send the information. This results in many benefits, such as immunity to interference and jamming and multi-user access, which we&#39;ll discuss later on. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt; 2. The bandwidth is spread by means of a code which is independent of the data. The independence of the code distinguishes this from standard modulation schemes in which the data modulation will always spread the spectrum somewhat. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt; 3. The receiver synchronizes to the code to recover the data. The use of an independent code and synchronous reception allows multiple users to access the same frequency band at the same time. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;In order to protect the signal, the code used is pseudo-random. It appears random, but is actually deterministic, so that the receiver can reconstruct the code for synchronous detection. This pseudo-random code is also called pseudo-noise (PN). &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;There are three ways to spread the bandwidth of the signal: &lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Frequency hopping. The signal is rapidly switched between different frequencies within the hopping bandwidth pseudo-randomly, and the receiver knows before hand where to find the signal at any given time. &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Time hopping. The signal is transmitted in short bursts pseudo-randomly, and the receiver knows beforehand when to expect the burst. &lt;/p&gt;   &lt;/li&gt;&lt;li&gt;     &lt;p align=&quot;justify&quot;&gt;Direct sequence. The digital data is directly coded at a much higher frequency. The code is generated pseudo-randomly, the receiver knows how to generate the same code, and correlates the received signal with that code to extract the data.&lt;/p&gt;   &lt;/li&gt;&lt;/ul&gt; &lt;p align=&quot;justify&quot;&gt;&lt;strong&gt;How spread spectrum works: &lt;/strong&gt;&lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features are why the military has used Spread Spectrum for so many years. Spread signals are intentionally made to be much wider band than the information they are carrying to make them more noise-like. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;Spread Spectrum signals use fast codes that run many times the information bandwidth or data rate. These special &quot;Spreading&quot; codes are called &quot;Pseudo Random&quot; or &quot;Pseudo Noise&quot; codes. They are called &quot;Pseudo&quot; because they are not real gaussian noise. &lt;/p&gt; &lt;p align=&quot;justify&quot;&gt;Spread Spectrum transmitters use similar transmit power levels to narrow band transmitters. Because Spread Spectrum signals are so wide, they transmit at a much lower spectral power density, measured in Watts per Hertz, than narrowband transmitters. This lower transmitted power density characteristic gives spread signals a big plus. Spread and narrow band signals can occupy the same band, with little or no interference. This capability is the main reason for all the interest in Spread Spectrum today. &lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/06/wireless-code-division-multiple-access.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-7350841999278400222</guid><pubDate>Wed, 13 May 2009 14:57:00 +0000</pubDate><atom:updated>2009-05-17T02:26:31.817+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">BSNL DATAONE broadband disconnect problem</category><title>BSNL DATAONE broadband disconnect problem</title><description>Hello&lt;br /&gt;folks....Internet now spreading its roots deep n further deep inside&lt;br /&gt;the Indian households.BSNL has come up with Broadband service Dataone&lt;br /&gt;with really awesome price plans 500 bucks for 1 GB thing....sounds&lt;br /&gt;koool...no???&lt;br /&gt;But many of us are facing problems with Dataone&lt;br /&gt;service that the Green Light of DSL in broadband modem switches off&lt;br /&gt;time to time rendering you off the net for long time afterwards.&lt;br /&gt;So im giving you a solution here which is a by-mistake discovery by in-house research team:-) and its 100% working:&lt;br /&gt;When ever your DSL light goes off...&lt;br /&gt;pick&lt;br /&gt;up the phone co-attached to your modem and dial any number and the DSL&lt;br /&gt;light will switch ON[blinking]...that moment only you drop back the&lt;br /&gt;phone reciever.And reconnect the Broadband connection.Simple!!!&lt;br /&gt;NOTE: DSL light may not switch on in one Dial attempt only..so try 2-3 times and it will work...&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/bsnl-dataone-broadband-disconnect.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-3720651835743541706</guid><pubDate>Sun, 19 Apr 2009 15:20:00 +0000</pubDate><atom:updated>2009-05-17T02:25:13.578+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Setting Priorities for Next-Generation Web Apps - MICROSOFT</category><title>Setting Priorities for Next-Generation Web Apps - MICROSOFT</title><description>&lt;span style=&quot;font-size:130%;&quot;&gt;Through the use of new development environments, combined with Web services and an emerging set of collaboration technologies, Web applications are matching and threatening to exceed the capabilities of their shrink-wrapped antecedents. It&#39;s safe to say that the days of classical offline desktop applications and simple informational Web sites are rapidly drawing to a close. It&#39;s also safe to say that while the next generation of Web applications will combine both the richness of the desktop and the networking of the Internet, there are still a number of concerns that need to be addressed around security, transition costs, and other factors. &lt;/span&gt; &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; For this report, &lt;em&gt;InformationWeek&lt;/em&gt; Analytics polled both technical decision makers (TDMs) and business decision makers (BDMs) for their interest in, and concerns about, next-generation Web applications in three areas: advancements in user interface; the integration of business intelligence and event processing with collaboration tools; and their interest in hosting some application functions in the cloud. One result of the survey that shouldn&#39;t surprise anyone is the popularity of &quot;eye candy&quot; rich Internet applications (RIAs) with both TDMs and BDMs.The consensus of our survey of 415 business technology professionals indicates that RIAs are widely accepted and are now the technology of choice for many new Web development projects. &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Although not as far along as most corporate RIA initiatives, there is similar interest in the use of combined business intelligence, event processing, and collaboration tools to kick off complex tasks, such as bringing appropriate teams together to make critical decisions and alerting stake holders of key developments.While there is some interest among smaller companies and startups for hosting applications in the cloud—as a way to add robust IT infrastructure at minimal cost, for example—enterprise decision makers by and large are much more skeptical about cloud computing, citing issues such as security, governance, privacy, and control.That skepticism is reflected in the 50% negative response from both TDMs and BDMs who said they do not expect to host any application functions in the cloud over the next 24 months. &lt;/span&gt;&lt;/p&gt; &lt;p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;This point was made more vociferously by Scott Wentzka, a senior architect with Paisley Consulting, a Minnesota provider of governance, risk, and compliance software. &quot;Cloud computing is an over-priced fraud,&quot; says Wentzka. &quot;If you actually figure out the real TCO, it&#39;s about four times as expensive as internally hosted applications. On the other hand, RIA technology is the real deal—faster, more interactive, and less painful to develop than the ancient kludge that is HTML and JavaScript.&quot; &lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/setting-priorities-for-next-generation.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-6680642753216430763</guid><pubDate>Mon, 13 Apr 2009 15:02:00 +0000</pubDate><atom:updated>2009-04-13T20:33:06.748+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Social Network Services</category><title>Social Network Services</title><description>Social network services allow people to come together online around shared interests, hobbies, or causes. For example, some sites provide dating services where users post personal profiles, locations, ages, gender, etc, and are able to search for a partner. Other services enable business networking (Ryze, XING, and LinkedIn) and social event meetups (Meetup).&lt;br /&gt;&lt;br /&gt;Some large wikis effectively become social network services by encouraging user pages and portals.&lt;br /&gt;&lt;br /&gt;Anyone can create their own social networking service using hosted offerings like Ning or rSitez, or more flexible, installable software like Elgg.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Social network search engines::&lt;br /&gt;&lt;br /&gt;Social network search engines are a class of search engines that use social networks to organize, prioritize, or filter search results. There are two subclasses of social network search engines: those that use explicit social networks, and those that use implicit social networks:&lt;br /&gt;Explicit social network search engines allow people to find each other according to explicitly stated social relationships such as XFN social relationships. XHTML Friends Network, for example, allows people to share their relationships on their own sites, thus forming a decentralized/distributed online social network, in contrast to centralized social network services listed in the previous section.&lt;br /&gt;Implicit social network search engines allow people to filter search results based upon classes of social networks they trust, such as a shared political viewpoint. This was called an epistemic filter in a United Nations University report from 1993 which predicted that this would become the dominant means of search for most users.&lt;br /&gt;&lt;br /&gt;Lacking trustworthy explicit information about such viewpoints, this type of social network search engine mines the web to infer the topology of online social networks. For example, the NewsTrove search engine infers social networks from content - sites, blogs, pods, and feeds - by examining, among other things, subject matter, link relationships, and grammatical features to infer social networks.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Deliberative social networks&lt;br /&gt;&lt;br /&gt;Deliberative social networks are webs of discussion and debate for decision-making purposes. They are built for the purpose of establishing sustained relationships between individuals and their government. They rely upon informed opinion and advice that is given with a clear expectation of outcomes.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Commercial social networks&lt;br /&gt;&lt;br /&gt;Commercial social networks are designed to support business transaction and to build a trust between an individual and a brand, which relies on opinion of product, ideas to make the product better, enabling customers to participate with the brands in promoting development, service delivery, and a better customer experience.[citation needed]. an example of these networks is Dell IdeaStorm.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Social guides&lt;br /&gt;&lt;br /&gt;A social guide recommending places to visit or contains information about places in the real world such as coffee shops, restaurants, and wifi hotspots, etc. One such application is WikiTravel.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Social bookmarking&lt;br /&gt;Main article: Social bookmarking&lt;br /&gt;&lt;br /&gt;Some Web sites allow users to post their list of bookmarks or favorites websites for others to search and view them. These sites can also be used to meet others sharing common interests. Examples include digg, del.icio.us, StumbleUpon, reddit, Netvouz, and furl.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Social cataloging&lt;br /&gt;&lt;br /&gt;In Social cataloging much like social bookmarking, this software is aimed towards academics, and allows the user to post a citation for an article found on the internet or a website, online database like Academic Search Premier or LexisNexis Academic University, a book found in a library catalog, and so on. These citations can be organized into predefined categories or a new category defined by the user through the use of tags. This allows academics researching or interested in similar areas to connect and share resources. Examples for those services include CiteULike, Connotea, BibSonomy and refbase.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Social libraries&lt;br /&gt;&lt;br /&gt;This applications allows visitors to keep track of their collectibles, books, records, and DVDs. Users can share their collections. Recommendations can be generated based on user ratings, using statistical computation and network theory. Some sites offer a buddy system, as well as virtual &quot;check outs&quot; of items for borrowing among friends. Folksonomy or tagging is implemented on most of these sites. Examples include discogs.com, imdb.com and LibraryThing.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Virtual worlds&lt;br /&gt;Main article: Virtual world&lt;br /&gt;&lt;br /&gt;Virtual Worlds are services where it is possible to meet and interact with other people in a virtual environment reminiscent of the real world. Thus the term virtual reality. Typically, the user manipulates an avatar through the world, interacting with others using chat or voice chat.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Massively Multiplayer Online Games (MMOGs)&lt;br /&gt;Main article: Massively Multiplayer Online Games&lt;br /&gt;&lt;br /&gt;MMOGs are virtual worlds that add various sorts of point systems, levels, competition, and winners and losers to virtual world simulation. Commercial MMOGs (or, more accurately, massively multiplayer online role-playing games or MMORPGs,) include Everquest and World of Warcraft. The Dotsoul Cyberpark is one of the more innovative non-commercial worlds, with the look and feel of Second Life and Active Worlds, but an adamantly anti-corporate stance. Other open-source and experimental examples include Planeshift, Croquet project, VOS and Solipsis.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Non-game worlds&lt;br /&gt;&lt;br /&gt;Another development are the worlds that are less game-like, or not games at all. Games have points, winners, and losers. Instead, some virtual worlds are more like social networking services like MySpace and Facebook, but with 3D simulation features. Examples include Second Life, ActiveWorlds, The Sims Online, and There.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Economies&lt;br /&gt;&lt;br /&gt;Very often a real economy emerges in these worlds, extending the non-physical service economy within the world to service providers in the real world. Experts can design dresses or hairstyles for characters, go on routine missions for them, and so on, and be paid in game money to do so. This emergence has resulted in expanding social possibility and also in increased incentives to cheat. In the case of Second Life, the in-world economy is one of the primary features of the world.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Other specialized social applications&lt;br /&gt;&lt;br /&gt;There are many other applications with social software characteristics that facilitate human connection and collaboration in specific contexts. Project management and e-learning applications are among these.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Emerging technologies&lt;br /&gt;&lt;br /&gt;Emerging technological capabilities to more widely distribute hosting and support much higher bandwidth in real time are bypassing central content arbiters in some cases.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Peer-to-peer social networks&lt;br /&gt;&lt;br /&gt;A hybrid of web-based social networks, instant messaging technologies and peer-to-peer connectivity and file sharing, peer-to-peer social networks generally allow users to share blogs, files (especially photographs) and instant messages. Some examples are imeem, SpinXpress, Bouillon, Wirehog, and Soulseek. Also, Groove, WiredReach and Kerika have similar functionality, but with more of a work-based, collaboration bias.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Virtual presence&lt;br /&gt;&lt;br /&gt;Widely viewed, virtual presence means being present via intermediate technologies, usually radio, telephone, television, or the internet. In addition, it can denote apparent physical appearance, such as voice, face, and body language.&lt;br /&gt;&lt;br /&gt;More narrowly, the term virtual presence denotes presence on World Wide Web locations which identified by URLs. People who are browsing a web site are considered to be virtually present at web locations. Virtual presence is a social software in the sense that people meet on the web by chance or intentionally. The ubiquitous(in the web space) communication transfers behavior patterns from the real world and virtual worlds to the web. Research has demonstrated effects of online indicators&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/social-network-services.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-4508134293819094485</guid><pubDate>Mon, 13 Apr 2009 15:00:00 +0000</pubDate><atom:updated>2009-04-13T20:31:42.655+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">CCTV IP camera</category><title>CCTV IP camera</title><description>IP cameras are Closed-circuit television (CCTV) cameras that utilize Internet Protocol to transmit image data and control signals over an Fast Ethernet link. As such, IP cameras are also commonly referred to as network cameras. IP cameras are primarily used for surveillance in the same manner as analog closed-circuit_television. A number of IP cameras are normally deployed together with a digital video recorder (DVR) or a network video recorder (NVR) to form a video surveillance system.&lt;br /&gt;&lt;br /&gt;The terms IP camera and network camera are most commonly used to refer to surveillance cameras with a Fast Ethernet interface. In this context, the term IP camera does not include GigE_Vision camera, which is a machine vision camera with a Gigabit Ethernet interface.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/cctv-ip-camera.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-9130073928900350364</guid><pubDate>Mon, 13 Apr 2009 14:58:00 +0000</pubDate><atom:updated>2009-04-13T20:29:54.229+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Is Your Networking Caught A Virus?</category><title>Is Your Networking Caught A Virus?</title><description>Caught A Virus?&lt;br /&gt;&lt;br /&gt;If you&#39;ve let your guard down--or even if you haven&#39;t--it can be hard to tell if your PC is infected. Here&#39;s what to do if you suspect the worst.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you&#39;ll lose all your data, and you&#39;ll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.&lt;br /&gt;&lt;br /&gt;You know they&#39;re right. Yet for one reason or another, you&#39;re not running antivirus software, or you are but it&#39;s not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you&#39;ve put off renewing.&lt;br /&gt;&lt;br /&gt;It happens. It&#39;s nothing to be ashamed of. But chances are, either you&#39;re infected right now, as we speak, or you will be very soon.&lt;br /&gt;&lt;br /&gt;For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, &quot;an unprotected [Windows] computer will become owned by a bot within 14 minutes.&quot;&lt;br /&gt;&lt;br /&gt;Today&#39;s viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker&#39;s bidding (such as mass-mailing spam)--aren&#39;t going to announce their presence. Real viruses aren&#39;t like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you&#39;re not well protected.&lt;br /&gt;&lt;br /&gt;Is Your PC &quot;Owned?&quot;&lt;br /&gt;&lt;br /&gt;I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program&#39;s presence. People who write commercial software put icons all over your desktop. Who&#39;s going to work harder to go unnoticed?&lt;br /&gt;&lt;br /&gt;Other indicators that may, in fact, indicate that there&#39;s nothing that you need to worry about, include:&lt;br /&gt;&lt;br /&gt;* An automated e-mail telling you that you&#39;re sending out infected mail. E-mail viruses and worms typically come from faked addresses.&lt;br /&gt;* A frantic note from a friend saying they&#39;ve been infected, and therefore so have you. This is likely a hoax. It&#39;s especially suspicious if the note tells you the virus can&#39;t be detected but you can get rid of it by deleting one simple file. Don&#39;t be fooled--and don&#39;t delete that file.&lt;br /&gt;&lt;br /&gt;I&#39;m not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.&lt;br /&gt;&lt;br /&gt;Sniffing Out an Infection&lt;br /&gt;&lt;br /&gt;There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you&#39;re not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.&lt;br /&gt;&lt;br /&gt;To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check &quot;Show icon in notification area when connected,&quot; and click OK.&lt;br /&gt;&lt;br /&gt;If you&#39;re interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you&#39;ll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.&lt;br /&gt;&lt;br /&gt;Want another place to look? In Windows XP, click Start, Run, type &quot;services.msc&quot; in the box, and press Enter. You&#39;ll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.&lt;br /&gt;&lt;br /&gt;Finally, you can do more detective work by selecting Start, Run, and typing &quot;msconfig&quot; in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.&lt;br /&gt;&lt;br /&gt;If any of these tools won&#39;t run--or if your security software won&#39;t run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.&lt;br /&gt;&lt;br /&gt;What to Do Next&lt;br /&gt;&lt;br /&gt;Once you&#39;re fairly sure your system is infected, don&#39;t panic. There are steps you can take to assess the damage, depending on your current level of protection.&lt;br /&gt;&lt;br /&gt;* If you don&#39;t have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There&#39;s McAfee FreeScan, Symantec Security Check, and Trend Micro&#39;s HouseCall. If one doesn&#39;t find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you&#39;re done, buy or download a real antivirus program.&lt;br /&gt;* If you have antivirus software, but it isn&#39;t active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.&lt;br /&gt;* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn&#39;t. Check out GriSOFT&#39;s Virus Encyclopedia, Eset&#39;s Virus Descriptions, McAffee&#39;s Virus Glossary, Symantec&#39;s Virus Encyclopedia, or Trend Micro&#39;s Virus Encyclopedia.&lt;br /&gt;&lt;br /&gt;A Microgram of Prevention&lt;br /&gt;&lt;br /&gt;Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer&#39;s security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro&#39;s PC-Cillin, which you can buy for $50.&lt;br /&gt;&lt;br /&gt;Don&#39;t want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).&lt;br /&gt;&lt;br /&gt;Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn&#39;t worth your money or your time.&lt;br /&gt;&lt;br /&gt;Speaking of updating, the same goes for Windows. Use Windows Update (it&#39;s right there on your Start Menu) to make sure you&#39;re getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say &quot;Service Pack 2.&quot;&lt;br /&gt;&lt;br /&gt;Here are a few more pointers for a virus-free life:&lt;br /&gt;&lt;br /&gt;* Be careful with e-mail. Set your e-mail software security settings to high. Don&#39;t open messages with generic-sounding subjects that don&#39;t apply specifically to you from people you don&#39;t know. Don&#39;t open an attachment unless you&#39;re expecting it.&lt;br /&gt;* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.&lt;br /&gt;* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research&#39;s Web site and run the free ShieldsUP test to see your ports&#39; status. If some ports show up as closed--or worse yet, open--check your router&#39;s documentation to find out how to hide them.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/is-your-networking-caught-virus.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-8961488066350753600</guid><pubDate>Mon, 13 Apr 2009 14:53:00 +0000</pubDate><atom:updated>2009-04-13T20:27:10.560+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Apple 3G iPhones Improving Networking</category><title>Apple 3G iPhone Improving Networking</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWYpSAD40N0nm1pC-F0kCctpECc_PaINEfK7dKAKeWEjBSnO18kKjV1bGFIMTWliIEveShhABDnSwR1nErRHvjMLlTvtWT5JisCet-k5_98A-wDZq3n6D2_SW1f5p1KN9eADu-8ypbYTU/s1600-h/iphone-3g-ipod.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 307px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWYpSAD40N0nm1pC-F0kCctpECc_PaINEfK7dKAKeWEjBSnO18kKjV1bGFIMTWliIEveShhABDnSwR1nErRHvjMLlTvtWT5JisCet-k5_98A-wDZq3n6D2_SW1f5p1KN9eADu-8ypbYTU/s400/iphone-3g-ipod.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5324189971317950994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXt4dCN0CxV67CefccJ_K5UoWHm-DB2CIgXV4uVcklSOaws5t036zqfsX1wsgjHvA4Gg_qsmqBsrxewTNqzNwXQZFCgUIYTwQMz-KbM_MIiVk96E5qLhGn5n2Lx4IrsLpM6EcQS0MuoBQ/s1600-h/iphone3g-australia.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 240px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXt4dCN0CxV67CefccJ_K5UoWHm-DB2CIgXV4uVcklSOaws5t036zqfsX1wsgjHvA4Gg_qsmqBsrxewTNqzNwXQZFCgUIYTwQMz-KbM_MIiVk96E5qLhGn5n2Lx4IrsLpM6EcQS0MuoBQ/s400/iphone3g-australia.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5324189971090923058&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;b&gt;General&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2G Network&lt;/b&gt; GSM 850 / 900 / 1800 / 1900&lt;br /&gt;&lt;b&gt;3G Network&lt;/b&gt; HSDPA 850 / 1900 / 2100&lt;br /&gt;&lt;b&gt;Announced&lt;/b&gt; 2008, June&lt;br /&gt;&lt;b&gt;Status&lt;/b&gt; Available. Released 2008, July&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Size &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Dimensions&lt;/b&gt; 115.5 x 62.1 x 12.3 mm&lt;br /&gt;&lt;b&gt;Weight&lt;/b&gt; 133 g&lt;br /&gt;&lt;b&gt;Display&lt;/b&gt; Type Capacitive touchscreen, 16M colors&lt;br /&gt;&lt;b&gt;Size&lt;/b&gt; 320 x 480 pixels, 3.5 inches&lt;br /&gt; - Multi-touch input method&lt;br /&gt;- Accelerometer sensor for auto-rotate&lt;br /&gt;- Proximity sensor for auto turn-off&lt;br /&gt;- Scratch-resistant surface&lt;br /&gt;- Ambient light sensor&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Ringtones&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Type &lt;/b&gt;Polyphonic, MP3&lt;br /&gt;&lt;b&gt;Customization&lt;/b&gt; Download&lt;br /&gt;&lt;b&gt;Vibration &lt;/b&gt; Yes&lt;br /&gt; - 3.5 mm headset jack&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Memory&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Phonebook&lt;/b&gt; Practically unlimited entries and fields, Photocall&lt;br /&gt;&lt;b&gt;Call records&lt;/b&gt; 100 received, dialed and missed calls&lt;br /&gt;&lt;b&gt;Internal&lt;/b&gt; 8 GB/ 16 GB&lt;br /&gt;&lt;b&gt;Card slot&lt;/b&gt; No&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Data &lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;GPRS &lt;/b&gt;Yes&lt;br /&gt;&lt;b&gt;HSCSD&lt;/b&gt; No&lt;br /&gt;&lt;b&gt;EDGE&lt;/b&gt; Yes&lt;br /&gt;&lt;b&gt;3G&lt;/b&gt; HSDPA&lt;br /&gt;&lt;b&gt;WLAN&lt;/b&gt; Wi-Fi 802.11b/g&lt;br /&gt;&lt;b&gt;Bluetooth&lt;/b&gt; Yes, v2.0, headset support only&lt;br /&gt;&lt;b&gt;Infrared port&lt;/b&gt; No&lt;br /&gt;&lt;b&gt;USB&lt;/b&gt; Yes, v2.0&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Camera&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Primary&lt;/b&gt; 2 MP, 1600x1200 pixels&lt;br /&gt;&lt;b&gt;Video&lt;/b&gt; No&lt;br /&gt;&lt;b&gt;Secondary&lt;/b&gt; No&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Features&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;OS&lt;/b&gt; Mac OS X v10.4.10&lt;br /&gt;&lt;b&gt;Messaging&lt;/b&gt; SMS (threaded view), Email&lt;br /&gt;&lt;b&gt;Browser&lt;/b&gt; HTML (Safari)&lt;br /&gt;&lt;b&gt;Radio&lt;/b&gt; No&lt;br /&gt;&lt;b&gt;Games&lt;/b&gt; Downloadable&lt;br /&gt;&lt;b&gt;Colors&lt;/b&gt; Black(8/16 GB), White (16 GB)&lt;br /&gt;&lt;b&gt;GPS&lt;/b&gt; Yes, with A-GPS support&lt;br /&gt;&lt;b&gt;Java&lt;/b&gt; No&lt;br /&gt; - Google Maps&lt;br /&gt;- Audio/video player&lt;br /&gt;- TV-out&lt;br /&gt;- Photo browser&lt;br /&gt;- Voice memo&lt;br /&gt;- Integrated handsfree&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Battery&lt;/b&gt;   Standard battery, Li-Ion&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Stand-by&lt;/b&gt; Up to 300 h&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Talk time&lt;/b&gt; Up to 10 h&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/apple-3g-iphone-improving-networking.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWYpSAD40N0nm1pC-F0kCctpECc_PaINEfK7dKAKeWEjBSnO18kKjV1bGFIMTWliIEveShhABDnSwR1nErRHvjMLlTvtWT5JisCet-k5_98A-wDZq3n6D2_SW1f5p1KN9eADu-8ypbYTU/s72-c/iphone-3g-ipod.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-4594620229082048075</guid><pubDate>Mon, 13 Apr 2009 14:52:00 +0000</pubDate><atom:updated>2009-04-13T20:22:54.022+05:30</atom:updated><title>Analysis (Insertion and deletion operation)</title><description>The best possible case in insertion operation is when the item is inserted at the last position. In this case, no movement of elements is required. The worst case occurs when the element has to be inserted at the beginning of the list. In this case, we have to move all the elements down the list. Therefore, the while loop executes n times, each moving one element down. Thus complexity of insertin operation is O(n), i.e linear time.&lt;br /&gt;&lt;br /&gt;.The best case in deletion occurs when the element to be deleted is the last element of the array. In this case, no element is moved up. The worst case occurs when element is deleted from the first position. In this case, all (n-1) elements are moved up. The while loop executes n-1 times, each time moving one element down. Thus complexity of deletion operation is also O(n) i.e linear time.&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/analysis-insertion-and-deletion.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3849507132481915952.post-1748558945535558436</guid><pubDate>Mon, 13 Apr 2009 14:48:00 +0000</pubDate><atom:updated>2009-04-13T20:21:08.127+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Spyware affecting Networking</category><title>Spyware affecting Networking</title><description>&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;There are a lot of PC users that know little about &quot;Spyware&quot;, &quot;Mal-ware&quot;, &quot;hijackers&quot;, &quot;Dialers&quot; &amp;amp; many more. This will help you avoid pop-ups, spammers and all those baddies.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;What is spy-ware?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don&#39;t have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Known spywares&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;There are thousands out there, new ones are added to the list everyday. But here are a few:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;How to check if a program has spyware?&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;The is this Little site that keeps a database of programs that are known to install spyware.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Check Here: http://www.spywareguide.com/product_search.php&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;If you would like to block pop-ups (IE Pop-ups).&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;There tons of different types out there, but these are the 2 best, i think.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: Google Toolbar (http://toolbar.google.com/) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: AdMuncher (http://www.admuncher.com) This program is Shareware&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;If you want to remove the &quot;spyware&quot; try these.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: Spybot-S&amp;amp;D (http://www.safer-networking.org/) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you&#39;d like to remove.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;The best scanner out there, and updated all the time.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;If you would like to prevent &quot;spyware&quot; being install.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;If you would like more Information about &quot;spyware&quot;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Check these sites.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.spychecker.com/&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.spywareguide.com/&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.cexx.org/adware.htm&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.thiefware.com/links/&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://simplythebest.net/info/spyware.html&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Usefull tools...&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Info: &quot;Stop Windows Messenger Spam&quot; stops this Service from running and halts the spammers ability to send you these messages.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;----------------------------------------------------------------------------&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting &quot;spyblaster&quot; &quot;s&amp;amp;d spybot&quot; &quot;spy sweeper&quot; &amp;amp; &quot;admuncher&quot; to protect your PC. A weekly scan is also recommended&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Free Virus Scan&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://defender.veloz.com// - 15k&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Finding . is a Click Away at 2020Search.com&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.2020search.com// - 43k&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Download the BrowserVillage Toolbar.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: times new roman;&quot;&gt;http://www.browservillage.com/ - 36k &lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-9559427755285103&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* google no . 2 */
google_ad_slot = &quot;2768081420&quot;;
google_ad_width = 400;
google_ad_height = 200;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;&lt;/div&gt;</description><link>http://corenetworking.blogspot.com/2009/04/spyware-affecting-networking.html</link><author>noreply@blogger.com (Manpreet Singh Bindra)</author><thr:total>0</thr:total></item></channel></rss>