THESUNRAISING

Monday, April 26, 2010

30 Amazing Facts About Internet & WWW

1. Since Google’s centerpiece in search technology was patented by Stanford University (on behalf of the founders Larry Page & Sergey Brin), Google gave Stanford 1.8 million shares for exclusive right to the patent that the university later sold for a staggering $336 million.

2. Google earns 97 percent of its revenues from advertising alone. This amounts to $20 billion.

3. Did you know that Google logs each search queries into its systems to enhance future searches?

4. They have found in user testing, that a small number of people are very typical of the larger user base. They run labs continually and always monitor how people use a page of results.

5. Google has the largest network of translators in the world; this is needed for continuously integrating searches and indexing web pages into their engine.

6. The reason Orkut doesn’t look or feel like a Google application was that the designer in-charge was given free reign to do things his way without the usual company procedures. Google is looking to improve Orkut’s resource utilization however.

7. Google makes small changes on their products very often. They sometimes try a particular feature with a set of users from a given network or region; for example Excite@Home users often get to see new features. They aren’t told of this, just presented with the new UI and observed how they use it.

8. The infamous “I feel lucky” is nearly never used. However, in traits it was found that removing it would somehow reduce the Google experience. Users wanted it to be kept. It was like a comfort button.

9. When Google was founded, Sergey Brin and Larry Page, the founders tossed a coin to decide what position they would take.

10. Notice the logos appearing on your Google homepage around major events or holidays? This is known as the Google Doodle. The first one was dedicated to the Burning Man festival in 1998. You can check out past Google doodles at google.com/logos.

11. By July 2008, Google had indexed an astounding 1 trillion (1000000000000) pages on the Internet.

12. Heard of Mentaplex? It was an April fool’s joke that Google could read peoples minds and search the Internet for what they were thinking of. The joke also included broadband access wires coming out from people’s toilet bowls! Try it out at http://www.google.com/mentalplex

13. Larry Page, the co founder of Google once made an inkjet printer out of Lego blocks when he was in college.

14. There are more then 600 million phones. Even then, more than half the population of the entire world hasn’t yet made a phone call.

15. All three founders of YouTube, Steve Chen, Chad Hurley and Jawed Karim were working for PayPal when they started YouTube.

16. Did you know that the domain YouTube.com was registered on Valentine's Day (February 14, 2005)

17. YouTube loves young Americans? Here’s proof: 70 percent of the YouTube’s registered users are from USA and half of YouTube users are under 20 years old.

18. If YouTube was Hollywood, they have enough material to release 60,000 new films every week.

19. One of the biggest leaps in Google’s search engine usage came about when they introduced their much improved spell checker giving birth to the “Did you mean…” This instantly doubled their traffic.

20. The total amount of bandwidth used by YouTube is about the same as used by entire Internet in 2000.

21. One needs over 1000 years of time to watch all videos on YouTube (but there will be billion of more videos uploaded on YouTube by then.)

22. Most popular category for uploder videos is ‘Music’ having around 20 percent YouTube videos.

23. Gmail was internally used for nearly 2 years prior to launch to the public. They discovered there were approximately 6 types of email users, and Gmail has been designed to accommodate all of these.

24. United States uses upload most of YouTube videos followed by UK. Americans are also the number-one watchers of YouTube videos followed by Japan.

25. The first ever video that was uploaded on YouTube is by Jawed Karim (one of YouTube founders) titled “Me at zoo” on April 23rd, 2005. This video is all of 18 seconds long.

26. There isn’t any restriction for proper dress code in the Google offices. This is to ensure comfort and a productive working environment. So one may dress up in pajamas or even as a superhero.

27. Tom Vendetta is the youngest Google employee ever hired. He was hired by Google when he was just 15 years old. Vendetta used to fool his friends by sending fake press releases and news. Vendetta was employed because he was young and would know young hackers thought. His job was to help address security flaws in Gmail.

28. Google consists of over 450,000 servers, racked up in clusters located in data centers around the world.

29. The first ever search engine was called “Archie” and was created way back in 1990 by a Canadian student Alan Emtage.

30. In 2007, Google became the most visited website with 700 million users. It beat the next popular website, Microsoft.com by over 200 million hits. In March 2010, Facebook overtook Google!

Tuesday, April 20, 2010

The History of Father's Day

Fathers DayFather's Day is a day of commemoration and celebration of Dad. It is a day to not only honor your father, but all men who have acted as a father figure in your life whether as Stepfathers, Uncles, Grandfathers or Big Brothers.

In the United States, the first modern Father's Day celebration was held on July 5, 1908, in Fairmont, West Virginia. It was first celebrated as a church service at Williams Memorial Methodist Episcopal Church South, now known as Central United Methodist Church. Grace Golden Clayton, who is believed to have suggested the service to the pastor, is believed to have been inspired to celebrate fathers after the deadly mine explosion in nearby Monongah the prior December. This explosion killed 361 men, many of them fathers and recent immigrants to the United States from Italy. Another possible inspiration for the service was Mother's Day, which had recently been celebrated for the first time in Grafton, West Virginia, a town about 15 miles away.

Another driving force behind the establishment of the integration of Father's Day was Mrs. Sonora Smart Dodd, born in Creston, Washington. Her father, the Civil War veteran William Jackson Smart, as a single parent reared his six children in Spokane, Washington. She was inspired by Anna Jarvis's efforts to establish Mother's Day. Although she initially suggested June 5, the anniversary of her father's death, she did not provide the organizers with enough time to make arrangements, and the celebration was deferred to the third Sunday of June. The first June Father's Day was celebrated on June 19, 1910, in Spokane, WA.

Unofficial support from such figures as William Jennings Bryan was immediate and widespread. President Woodrow Wilson was personally feted by his family in 1916. President Calvin Coolidge recommended it as a national holiday in 1924. In 1966, President Lyndon Johnson made Father's Day a holiday to be celebrated on the third Sunday of June. The holiday was not officially recognized until 1972, during the presidency of Richard Nixon.

In recent years, retailers have adapted to the holiday by promoting male-oriented gifts such as electronics, tools and greeting cards. Schools and other children's programs commonly have activities to make Father's Day gifts.

So, In short, Happy Fathers Day to all of you Dad's out there! Have a fun-filled day with your families and friends!

Monday, April 19, 2010

The history of Valentine's Day

The history of Valentine's Day — and its patron saint — is shrouded in mystery. But we do know that February has long been a month of romance. St. Valentine's Day, as we know it today, contains vestiges of both Christian and ancient Roman tradition. So, who was Saint Valentine and how did he become associated with this ancient rite? Today, the Catholic Church recognizes at least three different saints named Valentine or Valentinus, all of whom were martyred.

One legend contends that Valentine was a priest who served during the third century in Rome. When Emperor Claudius II decided that single men made better soldiers than those with wives and families, he outlawed marriage for young men — his crop of potential soldiers. Valentine, realizing the injustice of the decree, defied Claudius and continued to perform marriages for young lovers in secret. When Valentine's actions were discovered, Claudius ordered that he be put to death.

Other stories suggest that Valentine may have been killed for attempting to help Christians escape harsh Roman prisons where they were often beaten and tortured.

According to one legend, Valentine actually sent the first "valentine" greeting himself. While in prison, it is believed that Valentine fell in love with a young girl — who may have been his jailor's daughter — who visited him during his confinement. Before his death, it is alleged that he wrote her a letter, which he signed "From your Valentine," an expression that is still in use today. Although the truth behind the Valentine legends is murky, the stories certainly emphasize his appeal as a sympathetic, heroic, and, most importantly, romantic figure. It's no surprise that by the Middle Ages, Valentine was one of the most popular saints in England and France.

While some believe that Valentine's Day is celebrated in the middle of February to commemorate the anniversary of Valentine's death or burial — which probably occurred around 270 A.D — others claim that the Christian church may have decided to celebrate Valentine's feast day in the middle of February in an effort to "christianize" celebrations of the pagan Lupercalia festival. In ancient Rome, February was the official beginning of spring and was considered a time for purification. Houses were ritually cleansed by sweeping them out and then sprinkling salt and a type of wheat called spelt throughout their interiors. Lupercalia, which began at the ides of February, February 15, was a fertility festival dedicated to Faunus, the Roman god of agriculture, as well as to the Roman founders Romulus and Remus.

To begin the festival, members of the Luperci, an order of Roman priests, would gather at the sacred cave where the infants Romulus and Remus, the founders of Rome, were believed to have been cared for by a she-wolf or lupa. The priests would then sacrifice a goat, for fertility, and a dog, for purification.

The boys then sliced the goat's hide into strips, dipped them in the sacrificial blood and took to the streets, gently slapping both women and fields of crops with the goathide strips. Far from being fearful, Roman women welcomed being touched with the hides because it was believed the strips would make them more fertile in the coming year. Later in the day, according to legend, all the young women in the city would place their names in a big urn. The city's bachelors would then each choose a name out of the urn and become paired for the year with his chosen woman. These matches often ended in marriage. Pope Gelasius declared February 14 St. Valentine's Day around 498 A.D. The Roman "lottery" system for romantic pairing was deemed un-Christian and outlawed. Later, during the Middle Ages, it was commonly believed in France and England that February 14 was the beginning of birds' mating season, which added to the idea that the middle of February — Valentine's Day — should be a day for romance. The oldest known valentine still in existence today was a poem written by Charles, Duke of Orleans to his wife while he was imprisoned in the Tower of London following his capture at the Battle of Agincourt. The greeting, which was written in 1415, is part of the manuscript collection of the British Library in London, England. Several years later, it is believed that King Henry V hired a writer named John Lydgate to compose a valentine note to Catherine of Valois.

In Great Britain, Valentine's Day began to be popularly celebrated around the seventeenth century. By the middle of the eighteenth century, it was common for friends and lovers in all social classes to exchange small tokens of affection or handwritten notes. By the end of the century, printed cards began to replace written letters due to improvements in printing technology. Ready-made cards were an easy way for people to express their emotions in a time when direct expression of one's feelings was discouraged. Cheaper postage rates also contributed to an increase in the popularity of sending Valentine's Day greetings. Americans probably began exchanging hand-made valentines in the early 1700s. In the 1840s, Esther A. Howland began to sell the first mass-produced valentines in America.

According to the Greeting Card Association, an estimated one billion valentine cards are sent each year, making Valentine's Day the second largest card-sending holiday of the year. (An estimated 2.6 billion cards are sent for Christmas.)

Approximately 85 percent of all valentines are purchased by women. In addition to the United States, Valentine's Day is celebrated in Canada, Mexico, the United Kingdom, France, and Australia.

Valentine greetings were popular as far back as the Middle Ages (written Valentine's didn't begin to appear until after 1400), and the oldest known Valentine card is on display at the British Museum. The first commercial Valentine's Day greeting cards produced in the U.S. were created in the 1840s by Esther A. Howland. Howland, known as the Mother of the Valentine, made elaborate creations with real lace, ribbons and colorful pictures known as "scrap."

Sunday, April 18, 2010

How To Disable Right Click IN A Blogger - Easy Step

This post explains how to disable right click on blogger(blogspot) or any other webpage using a html(javascript) code.

It is so annoying if someone copies(thefts) your blog posts,articles,images and another kind of information owned by you saying that they are the original owners of the content.

But,I think 'disabling right click' is not the right solution for that.
Most people come to your site to read information and very small percentage of people come to your site to steal your work,images,etc.So,most people feel it insulting and I think it's very unprofessional thing to do.

If you want to protect your images,my suggestion is to add a Watermark(logo) of your sitename,or your name on the images,pictures,etc.

Note:Using this javascript code,you only disable the right click by warning the visitors that the content is copyrighted.

That's all my personal opinion,However if you despirately want to add this feauture,You can get this code here.


Where to paste it in blogger ?

Sign in to your blogger dashboad>layout>Add a Page element>html/javascript(look at the screenshot below)















and paste the below javascript code and Save the changes.

How it works?
If you right click on the webpage,a message will pop up on screen saying "function disabled".If you want to change the message to you own one like "sorry....the work is copyrighted" or something like that,replace the "funtion disabled" text with your own message in the Javascript code.

Saturday, April 17, 2010

Some Commonly Used Terms in Computers

Some Commonly Used Terms in Computers

Programme: It is a set of instructions given to the computer in a particular sequence for solving a given problem. In other words, it contains a set of actions to be performed by the computer on the data to produce necessary result. Programming is done in one of the computer languages.

Software: It is a collection of programmes written to bring the hardware of a computer system into operation. We cannot do any thing useful with the computer hardware on its own. It has to be driven by certain utility programmes called software which are stored in the computer system. There are two types of software:

1. Application Software: It refers to programmes or sets of programmes that perform a specific processing application, e.g., payroll and inventory control.
2. System Software: It consists of sets of programmes that act as an interface between the user and hardware, e.g., operating system like Windows, Mac OS, and UNIX etc.

Hardware: It is the term given to the machinery itself and to the various individual pieces of electronic equipment.

Liveware: The users working on the system are termed as ?liveware?.

Firmware: It is defined as software embedded into the hardware, e.g., ROM, which has the basic input-output system (BIOS).

Compiler: A programme which translates a high-level language programme into machine language.

Interpreter: A programme that translates each instruction of high level language and executes it before passing on to the next instruction.

Assembler: A programme which converts assembly language programme into machine language programme. It is system software.

Multiprocessing: In this of processing, the CPU has a number of processors which operate in parallel, thereby allowing simultaneous execution of several programmes.

Multiprogramming: This type of processing enables more than one programme to reside in the central memory at the same time, and share the available processor time and peripheral units.

Distributed Data Processing: It is also called decentralized processing. This approach involves using a network of computers interconnected by or minicomputer lines where each remote location has a small computer or minicomputer for input-output communication with a central computer and some local processing.

Bit: It is the basic unit of digital information. It can have only two values- one and zero.

Nibble: combination of four bits.

Byte: Combination of eight bits.

* 1 Kilobyte = 1024 bytes
* 1 Megabyte = (1024)x(1024) bytes
* 1 Gigabyte = (1024)x(1024)x(1024) bytes

Word: Combination of two or more than two bytes.

Database: It is a general collection of data shared by a variety of users. In particular, it has the following features:

* Redundancy of data is eliminated.
* Data is independent of any programme.
* Date is usable by many users, simultaneously.

Time Sharing: It is the concurrent use of a single computer system by many independent users. In time sharing, many terminals can be attached to a central computer. The terminal users can thus share time on the computer, that is, time sharing. The operating system can allocate the CPU time of the various users by giving each a time slice, each operating independently without awareness of use by others.

Microprocessor: It is a single chip based device, which is a complete processor in itself and is capable of performing arithmetic and logical operations.

Modem: An electronic device used to convert computer (digital) electronic signal to communication channel (analog) electronic signals and vice-versa. It is used in distributed data processing where terminals are joined by a telecommunication link to the host computer.

Change Details in Computer Folders

Change Details in Computer Folders

Have you ever needed specific information for one of your files or folders? Or, have you ever needed to change the details that are displayed in a folder? If you answered yes to either of those questions, this tip is for you! This tip show you how to change the list views for your files and folders in Windows XP. Let's go!

You can display files and folders in a variety of different ways, depending on what you want to see and do. When you view your files and folders in the Details mode, a default list of file and folder information appears, including the Name, Size, Type and Date Modified. But what if that default list doesn't provide the information you need? Well, you can add (or remove) as much information as you wish.

Here's how:

1. First, go to Start, My Documents.
2. Once you're there, single click on the file or folder you want to change.
3. Next, click on the View menu.
4. Scroll down and then click on Choose Details.

The Choose Details dialogue box will then appear.

5. You can now select the checkboxes with the details you want to include or you can clear out the ones you don't want.
6. Click the Move Up or Move Down buttons to change the order of the selected items.
7. Click the Show or Hide buttons to either show or hide the selected items.
8. When you're all set, just click OK.

That's it. You can now view your files and folders with the specific information you need!

Friday, April 16, 2010

Blu Ray Disc Technology

Blu Ray Disc Technology

Blu-ray, also known as Blu-ray Disc (BD), is the name of a next-generation optical disc format jointly developed by the Blu-ray Disc Association (BDA), a group of the world's leading consumer electronics, personal computer and media manufacturers (including Apple, Dell, Hitachi, HP, JVC, LG, Mitsubishi, Panasonic, Pioneer, Philips, Samsung, Sharp, Sony, TDK and Thomson). The format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data. The format offers more than five times the storage capacity of traditional DVDs and can hold up to 25GB on a single-layer disc and 50GB on a dual-layer disc. This extra capacity combined with the use of advanced video and audio codecs will offer consumers an unprecedented HD experience.

Blu Ray Disc

While current optical disc technologies such as DVD, DVD±R, DVD±RW, and DVD-RAM rely on a red laser to read and write data, the new format uses a blue-violet laser instead, hence the name Blu-ray. Despite the different type of lasers used, Blu-ray products can easily be made backwards compatible with CDs and DVDs through the use of a BD/DVD/CD compatible optical pickup unit. The benefit of using a blue-violet laser (405nm) is that it has a shorter wavelength than a red laser (650nm), which makes it possible to focus the laser spot with even greater precision. This allows data to be packed more tightly and stored in less space, so it's possible to fit more data on the disc even though it's the same size as a CD/DVD. This together with the change of numerical aperture to 0.85 is what enables Blu-ray Discs to hold 25GB/50GB.

Blu-ray is currently supported by more than 170 of the world's leading consumer electronics, personal computer, recording media, video game and music companies. The format also has broad support from the major movie studios as a successor to today's DVD format. Seven of the eight major movie studios have already announced titles for Blu-ray, including Warner, Paramount, Fox, Disney, Sony, MGM and Lionsgate. The initial line-up is expected to consist of over 100 titles and include recent hits as well as classics such as Batman Begins, Desperado, Fantastic Four, Fifth Element, Hero, Ice Age, Kill Bill, Lethal Weapon, Mission Impossible, Ocean's Twelve, Pirates of the Caribbean, Reservoir Dogs, Robocop, and The Matrix. Many studios have also announced that they will begin releasing new feature films on Blu-ray Disc day-and-date with DVD, as well as a continuous slate of catalog titles every month.

Thursday, April 15, 2010

How to Love Someone

I once had a friend who grew to be very close to me. Once when we were sitting at the edge of a swimming pool, she filled the palm of her hand with some water and held it before me, and said this:

Water in Hands"You see this water carefully contained on my hand?" It symbolizes Love. "This was how I saw it. As long as you keep your hand caringly open and allow it to remain there, it will always be there. However, if you attempt to close your fingers round it and try to posses it, it will spill through the first cracks it finds."

This is the greatest mistake that people do when they meet love...they try to posses it, they demand, they expect... and just like the water spilling out of your hand, love will retrieve from you.

For love is meant to be free, you cannot change its nature. If there are people you love, allow them to be free beings.

* Give and don't expect.
* Advise, but don't order.
* Ask, but never demand.

It might sound simple, but it is a lesson that may take a lifetime to truly practice. It is the secret to true love. To truly practice it, you must sincerely feel no expectations from those who you love, and yet an unconditional caring."

Passing thought: Life is not measured by the number of breaths we take; but by the moments that take our breath away.....

Life is beautiful, Live it !!!

"If you love something, let it go. If it comes back to you (without you having to plead and beg), its yours forever. If it doesn't, then it was never meant to be."

50 most romantic things to do with your life-partner

1. Watch the sunset together.
2. Whisper to each other.
3. Cook for each other.
4. Walk in the rain.
5. Hold hands.
6. Buy gifts for each other.
7. Roses.
8. Find out their favorite cologne/perfume and wear it every time you're together.
9. Go for a long walk down the beach at midnight.
10. Write poetry for each other
11. Hugs are the universal medicine.
12. Say I love you, only when you mean it and make sure they know you mean it.
13. Give random gifts of flowers/candy/poetry etc.
14. Tell her that she's the only girl you ever want. Don't lie.
15. Spend every second possible together.
16. Look into each other's eyes.
17. Very lightly push up her chin, look into her eyes, tell her you love her, and kiss her lightly.
18. When in public, only flirt w/ each other.
19. Put love notes in their pockets when they aren't looking.
20. Buy her a ring.
21. Sing to each other.
22. Always hold her around her hips/sides.
23. Take her to dinner and do the dinner for two deal.
24. Spaghetti? (Ever see Lady and the Tramp?)
25. Hold her hand, stare into her eyes, kiss her hand and then put it over our heart.
26. Dance together.
27. Let your girl fall asleep with her head in your lap. (It looks real cute)
28. Do cute things like write I love you in a note so that they have to look in a mirror to read it.
29. Make excuses to call them every 5 minutes
30. Even if you are really busy doing something, go out of your way to call and say I love you.
31. Call from your vacation spot to tell them you were thinking about them.
32. Remember your dreams and tell her about them.
33. Always tell her how pretty she looks.
34. Tell each other your most sacred secrets/fears.
35. Be Prince Charming to her parents.
36. Brush her hair out of her face for her.
37. Hang out with his/her friends.
38. Go to church/pray/worship together.
39. Take her to see a romantic movie and remember the parts she liked.
40. Learn from each other and don't make the same mistake twice.
41. Describe the joy you feel just to be with him/her.
42. Make sacrifices for each other.
43. Really love each other, or don't stay together.
44. Let there never be a second during any given day that you aren't; thinking about them, and make sure they know it.
45. Love yourself before you love anyone else.
46. Learn to say sweet things in foreign languages.
47. Dedicate songs to them on the radio.
48. Fall asleep on the phone with each other.
49. Stand up for them when someone talks trash.
50. Never forget the kiss goodnight. And always remember to say, "Sweet dreams".

Love & Marriage - Difference in Love & Marriage

A student asks a teacher, "What is love?"

The teacher said, "in order to answer your question, go to the wheat field and choose the biggest wheat and come back.

But the rule is: you can go through them only once and cannot turn back to pick."

The student went to the field, go thru first row, he saw one big wheat, but he wonders... may be there is a bigger one later.

Then he saw another bigger one... But may be there is an even bigger one waiting for him.

Later, when he finished more than half of the wheat field, he start to realize that the wheat is not as big as the previous one he saw, he know he has missed the biggest one, and he regretted.

So, he ended up went back to the teacher with empty hand.

The teacher told him, "this is love... You keep looking for a better one, but when later you realise, you have already miss the person..."

"What is marriage then?" the student asked.

The teacher said, "in order to answer your question, go to the corn field and choose the biggest corn and come back. But the rule is: you can go through them only once and cannot turn back to pick."

The student went to the corn field, this time he is careful not to repeat the previous mistake, when he reach the middle of the field, he has picked one medium corn that he feel satisfy, and come back to the teacher.
The teacher told him, "This time you bring back a corn. You look for one that is just nice, and you have faith and believe this is the best one you get... This is marriage."

Swami Vivekananda's Speech in Chicago


WELCOME ADDRESS - Chicago, Sept 11, 1893


Sisters and Brothers of America,

It fills my heart with joy unspeakable to rise in response to the warm and cordial welcome which you have given us. I thank you in the name of the most ancient order of monks in the world; I thank you in the name of the mother of religions, and I thank you in the name of millions and millions of Hindu people of all classes and sects.

Swami VivekanandaMy thanks, also, to some of the speakers on this platform who, referring to the delegates from the Orient, have told you that these men from far-off nations may well claim the honor of bearing to different lands the idea of toleration. I am proud to belong to a religion which has taught the world both tolerance and universal acceptance. We believe not only in universal toleration, but we accept all religions as true. I am proud to belong to a nation which has sheltered the persecuted and the refugees of all religions and all nations of the earth. I am proud to tell you that we have gathered in our bosom the purest remnant of the Israelites, who came to Southern India and took refuge with us in the very year in which their holy temple was shattered to pieces by Roman tyranny. I am proud to belong to the religion which has sheltered and is still fostering the remnant of the grand Zoroastrian nation. I will quote to you, brethren, a few lines from a hymn which I remember to have repeated from my earliest boyhood, which is every day repeated by millions of human beings: "As the different streams having their sources in different paths which men take through different tendencies, various though they appear, crooked or straight, all lead to Thee."

The present convention, which is one of the most august assemblies ever held, is in itself a vindication, a declaration to the world of the wonderful doctrine preached in the Gita: "Whosoever comes to Me, through whatsoever form, I reach him; all men are struggling through paths which in the end lead to me." Sectarianism, bigotry, and its horrible descendant, fanaticism, have long possessed this beautiful earth. They have filled the earth with violence, drenched it often and often with human blood, destroyed civilization and sent whole nations to despair. Had it not been for these horrible demons, human society would be far more advanced than it is now. But their time is come; and I fervently hope that the bell that tolled this morning in honor of this convention may be the death-knell of all fanaticism, of all persecutions with the sword or with the pen, and of all uncharitable feelings between persons wending their way to the same goal.

Networking Concepts - Computer Networks

1. What are the two types of transmission technology available?

Broadcast and point-to-point

2. What is subnet?

A generic term for section of a large networks usually separated by a bridge or router.

3. Difference between the communication and transmission.

Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media.

4. What are the possible ways of data exchange?

(1) Simplex (2) Half-duplex (3) Full-duplex.

5. What is SAP?

Series of interface points that allow other computers to communicate with the other layers of network protocol stack.

6. What do you meant by "triple X" in Networks?

The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between hte PAD and the network, called X.29. Together, these three recommendations are often called "triple X"

7. What is frame relay, in which layer it comes?

Frame relay is a packet switching technology. It will operate in the data link layer.

8. What is terminal emulation, in which layer it comes?

Telnet is also called as terminal emulation. It belongs to application layer.

9. What is Beaconing?

The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks.

10. What is redirector?

Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.

11. What is NETBIOS and NETBEUI?

NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.

12. What is RAID?

A method for providing fault tolerance by using multiple hard disk drives.

13. What is passive topology?

When the computers on the network simply listen and receive the signal, they are referred to as passive because they don?t amplify the signal in any way. Example for passive topology - linear bus.

14. What is Brouter?

Hybrid devices that combine the features of both bridges and routers.

15. What is cladding?

A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

16. What is point-to-point protocol?

A communications protocol used to connect computers to remote networking services including Internet service providers.

17. How Gateway is different from Routers?

A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures or data formats

18. What is attenuation?

The degeneration of a signal over distance on a network cable is called attenuation.

19. What is MAC address?

The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique.

20. Difference between bit rate and baud rate.

Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.

baud rate = bit rate / N

where N is no-of-bits represented by each signal shift.

21. What is Bandwidth?

Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.

22. What are the types of Transmission media?

Signals are usually transmitted over some transmission media that are broadly classified in to two categories.

a) Guided Media: These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.

b) Unguided Media: This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.

23. What is Project 802?

It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.

It consists of the following:

*
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
*
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
*
Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
*
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.

24. What is Protocol Data Unit?

The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains of four fields a destination service access point (DSAP), a source service access point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame).

25. What are the different type of networking / internetworking devices?

Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.

Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion.

Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission.

Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model.

26. What is ICMP?

ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.

27. What are the data units at different layers of the TCP / IP protocol suite?

The data unit created at the application layer is called a message, at the transport layer the data unit created is called either a segment or an user datagram, at the network layer the data unit created is called the datagram, at the data link layer the datagram is encapsulated in to a frame and finally transmitted as signals along the transmission media.

28. What is difference between ARP and RARP?

The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

29. What is the minimum and maximum length of the header in the TCP segment and IP datagram?

The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

30. What is the range of addresses in the classes of internet addresses?

1.
Class A 0.0.0.0 - 127.255.255.255
2.
Class B 128.0.0.0 - 191.255.255.255
3.
Class C 192.0.0.0 - 223.255.255.255
4.
Class D 224.0.0.0 - 239.255.255.255
5.
Class E 240.0.0.0 - 247.255.255.255

31. What is the difference between TFTP and FTP application layer protocols?

The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.

The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offer by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.

32. What are major types of networks and explain?

*
Server-based network
*
Peer-to-peer network

Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration.

33. What are the important topologies for networks?

1.
BUS topology: In this each computer is directly connected to primary network cable in a single line.
Advantages: Inexpensive, easy to install, simple to understand, easy to extend.
2.
STAR topology: In this all computers are connected using a central hub.
Advantages:Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
3.
RING topology: In this all computers are connected in loop.
Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.

34. What is mesh network?

A network in which there are multiple network links between computers to provide multiple paths for data to travel.

35. What is difference between baseband and broadband transmission?

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

36. Explain 5-4-3 rule?

In a Ethernet network, between any two points on the network ,there can be no more than five network segments or four repeaters, and of those five segments only three of segments can be populated.

37. What MAU?

In token Ring , hub is called Multistation Access Unit (MAU).

38. What is the difference between routable and non- routable protocols?

Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router.

39. Why should you care about the OSI Reference Model?

It provides a framework for discussing network operations and design.

40. What is logical link control?

One of two sublayers of the data link layer of OSI reference model, as defined by the IEEE 802 standard. This sublayer is responsible for maintaining the link between computers when they are sending data across the physical network connection.

41. What is virtual channel?

Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

42. What is virtual path?

Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

43. What is packet filter?

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.

44. What is traffic shaping?

One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

45. What is multicast routing?

Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

46. What is region?

When hierarchical routing is used, the routers are divided into what we will call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

47. What is silly window syndrome?

It is a problem that can ruin TCP performance. This problem occurs when data are passed to the sending TCP entity in large blocks, but an interactive application on the receiving side reads 1 byte at a time.

48. What are Digrams and Trigrams?

The most common two letter combinations are called as digrams. e.g. th, in, er, re and an. The most common three letter combinations are called as trigrams. e.g. the, ing, and, and ion.

49. Expand IDEA?

IDEA stands for International Data Encryption Algorithm.

50. What is wide-mouth frog?

Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol.

51. What is Mail Gateway?

It is a system that performs a protocol translation between different electronic mail delivery protocols.

52. What is IGP (Interior Gateway Protocol)?

It is any routing protocol used within an autonomous system.

53. What is EGP (Exterior Gateway Protocol)?

It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system.

54. What is autonomous system?

It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol.

55. What is BGP (Border Gateway Protocol)?

It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol).

56. What is Gateway-to-Gateway protocol?

It is a protocol formerly used to exchange routing information between Internet core routers.

57. What is NVT (Network Virtual Terminal)?

It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.

58. What is a Multi-homed Host?

It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host.

59. What is Kerberos?

It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

60. What is OSPF?

It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet's topology to make accurate routing decisions.

61. What is Proxy ARP?

It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router.

62. What is SLIP (Serial Line Interface Protocol)?

It is a very simple protocol used for transmission of IP datagrams across a serial line.

63. What is RIP (Routing Information Protocol)?

It is a simple protocol used to exchange information between the routers.

64. What is source route?

It is a sequence of IP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header.

Question Title How to connect two computers in Windows XP?

Here are the steps to connect two computers in Windows XP. This will let you share files and folders, printers, play network games, etc...

Steps


1.
Connect the two computers together either with a Crossover cable or a Hub/Switch to the ethernet card in your computer.
2.
Set the IP address on both computers. Goto Start > Control Panel > Network Connections (choose switch to classic view if you cannot see network connections)
3.
Look for your Local Area Connection ethernet adapter, right-click and choose properties.
4.
Select Internet Protocol TCP/IP and choose properties.
5.
Setup the IP as 192.168.1.1 and the subnet mask of 255.255.255. 0 on the first computer and 192.168.1.2 on the second with the same subnet mask.
6.
Choose OK then OK/close again.

Tips

*
To share your files, right click on any folder and choose Sharing to make them shared.
*
You can also do this with your printers to be able to print from one computer while the printer is connected to the other.

Things You'll Need


1.
A Crossover cable. This a Cat5 Ethernet Cable that the wires have been switched around to allow two computer only to talk to each other or you can purchase a switch/hub with two Standard "Straight-Through" Ethernet Cables.
2.
Check to see if your computer has an Ethernet Adapter in the back of the computer. Most new computers have this. You can tell by the documentation from the computer or by looking at the back of the computer. It looks like a phone jack, but larger.

Start windows programs quickly with Run Command

Therun option of Start menu is used to run a program or to open a document directly. If youdo not know the exact location of the program or document then click on Start button to openRun and type the program’s shortcut name to open it directly.

Run Commands

1. Appwiz.cpl - Used to run Add/Remove wizard
2. Calc - Calculator
3. Cfgwiz32 - ISDN Configuration Wizard
4. Charmap - Character Map
5. Chkdisk - Repair damaged files
6. Cleanmgr - Cleans up hard drives
7. Clipbrd - Windows Clipboard viewer
8. Control - Displays Control Panel
9. Cmd - Opens a new Command Window
10. Control mouse - Used to control mouse properties
11. Dcomcnfg - DCOM user security
12. Debug - Assembly language programming tool
13. Defrag - Defragmentation tool
14. Drwatson - Records programs crash & snapshots
15. Dxdiag - DirectX Diagnostic Utility
16. Explorer - Windows Explorer
17. Fontview - Graphical font viewer
18. Fsmgmt.msc - Used to open shared folders
19. Firewall.cpl - Used to configure windows firewall
20. Ftp - FTP.exe program
21. Hostname - Returns Computer's name
22. Hdwwiz.cpl - Used to run Add Hardware wizard
23. Ipconfig - Displays IP configuration for all network adapters
24. Logoff - Used to logoff the computer
25. MMC - Microsoft Management Console
26. Msconfig - Configuration to edit startup files
27. Mstsc - Used to access remote desktop
28. Mrc - Malicious Software Removal Tool
29. Msinfo32 - Microsoft System Information Utility
30. Nbtstat - Displays stats and current connections using NetBIOS over TCP/IP
31. Netstat - Displays all active network connections
32. Nslookup- Returns your local DNS server
33. Osk - Used to access on screen keyboard
34. Perfmon.msc - Used to configure the performance of Monitor.
35. Ping - Sends data to a specified host/IP
36. Powercfg.cpl - Used to configure power option
37. Regedit - Registry Editor
38. Regwiz - Registration wizard
39. Sfc /scannow - System File Checker
40. Sndrec32 - Sound Recorder
41. Shutdown - Used to shutdown the windows
42. Spider - Used to open spider solitaire card game
43. Sfc / scannow - Used to run system file checker utility.
44. Sndvol32 - Volume control for soundcard
45. Sysedit - Edit system startup files
46. Taskmgr - Task manager
47. Telephon.cpl - Used to configure modem options.
48. Telnet - Telnet program
49. Tracert - Traces and displays all paths required to reach an Internet host
50. Winchat - Used to chat with Microsoft
51. Wmplayer - Used to run Windows Media player
52. Wab - Used to open Windows address Book.
53. WinWord - Used to open Microsoft word
54. Winipcfg - Displays IP configuration
55. Winver - Used to check Windows Version
56. Wupdmgr - Takes you to Microsoft Windows Update
57. Write - Used to openWordPad