๕/๓๐/๒๕๕๐

LED Binary Watch


Binary time for your wrist


This watch displays time in binary format. It uses LED lights to display the time. Need we say more? Okay, we will. The watch face contains 10 red LEDs that are used to indicate the numbers of the binary sequence (1, 2, 4, 8, 16, 32) and the values of the lighted LEDs are added to determine the time. There are two rows of LEDs - the top row for the hours and the bottom row for the minutes. With a little practice you can learn to read this time format easily. Won't it be fun the next time someone asks you "what time is it?" and you can enjoy their bewildered expression when you flash your wrist emblazoned with glowing binary? Yes it will, you quietly smirk to yourself.


This watch also has a soft leather band, a circuitboard watch face, and stainless steel back and casing. It is water resistant to 3 atmospheres and comes with batteries. The LED Binary Watch has these features
  • Displays time using binary representation
  • Blue or Red LED lights indicate the hours and minutes
  • The upper LED-row shows hours (8-4-2-1)
  • The lower LED-row shows minutes (32-16-8-4-2-1)
  • Push button - the time is displayed for 5 seconds
  • Circuitboard face with 10 LEDs
  • Leather band and stainless steel back
  • Water resistant (3 Atm)
  • Battery included (type CR2032) Instruction manual included

How to read


Dark room

Article Source: http://www.thinkgeek.com/gadgets/watches/6a17/

๕/๒๐/๒๕๕๐

What is WiMAX?

What is WiMAX?

• WiMAX is an industry trade organization formed by leading communications component
and equipment companies to promote and certify compatibility and interoperability of
broadband wireless access equipment that conforms to the IEEE* 802.16 and ETSI*
HIPERMAN standards.
• The 802.16a standard is a wireless metropolitan area network (MAN) technology that will
provide a wireless alternative to cable, DSL and T1/E1 for last mile broadband access. It
will also be used as complimentary technology to connect 802.11 hot spots to the Internet.
• WiMAX will accelerate and increase the success of future interoperability testing by
providing tools for conformance testing. Tools can be used during the equipment maker's
system development process to ensure conformance with the standards-based product
roadmap as it evolves.
• Members include leading Operators, Equipment and Component makers (see list at end)
• WiMAX was formed in April 2001, in anticipation of the publication of the original 10-66
GHz IEEE 802.16 specifications. WiMAX is to 802.16 as the Wi-Fi Alliance is to 802.11.

WiMAX Goals

• A standard by itself is not enough to enable mass adoption. WiMAX has stepped forward
to help solve barriers to adoption, such as interoperability and cost of deployment. WiMAX
will help ignite the wireless MAN industry, by defining and conducting interoperability
testing and labeling vendor systems with a "WiMAX Certified™" label once testing hasbeen completed successfully.

How a Stateful Firewall Works

How a Stateful Firewall Works

The stateful firewall spends most of its cycles examining packet information in Layer 4 (transport) and lower. However, it also offers more advanced inspection capabilities by targeting vital packets for Layer 7 (application) examination, such as the packet that initializes a connection. If the inspected packet matches an existing firewall rule that permits it, the packet is passed and an entry is added to the state table. From that point forward, because the packets in that particular communication session match an existing state table entry, they are allowed access without call for further application layer inspection. Those packets only need to have their Layer 3 and 4 information (IP address and TCP/UDP port number) verified against the information stored in the state table to confirm that they are indeed part of the current exchange. This method increases overall firewall performance (versus proxy-type systems, which examine all packets) because only initiating packets need to be unencapsulated the whole way to the application layer.
Conversely, because these firewalls use such filtering techniques, they don't consider the application layer commands for the entire communications session, as a proxy firewall would. This equates to an inability to really control sessions based on application-level traffic, making it a less secure alternative to a proxy. However, because of the stateful firewall's speed advantage and its ability to handle just about any traffic flow (as opposed to the limited number of protocols supported by an application-level proxy); it can be an excellent choice as the only perimeter protection device for a site or as a role player in a more complex network environment.

Using a Firewall as a Means of Control

An important point that should be considered when discussing perimeter security is the concept of a firewall as a network chokepoint. A chokepoint is a controllable, single entry point where something is funneled for greater security. However, as the name implies, this area of limited entry also can be a place where bandwidth is restricted. A good example of a chokepoint in the real world is a metal detector at an airport. Imagine if the metal detector was the size of an entire hallway in the airport, and 20 or more people could walk through a single gate at one time. If the detector goes off, it would be difficult for the inspectors to determine which party had triggered it and to be able to stop that person to examine him or her further. More fine-grained traffic control is needed in such a situation. That is why the concept of a chokepoint is necessary in such a case; it allows one inspector to watch one party go through one metal detector at a time. The chokepoint offers additional control of the parties entering the airport. Like other chokepoints, this channeling of people for additional control can also lead to slowdowns in the process; therefore, lines often form at airport metal detectors.


Article Source: Informit Network

๕/๑๙/๒๕๕๐

Direction of Data Flow on Network

Communication between two devices can be simplex, half-duplex, or full-duplex.

Simplex

In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices on a link can transmit; the other can only receive


Keyboards and tradition monitors are both examples of simplex devices. The keyboard can only introduce input; the monitor can only accept output.

Half-Duplex

In half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive.


The half-duplex mode is like one-lane road whit two-directional traffic. While cars are traveling one direction, cars going the other way must wait. In a half-duplex transmission, the entire capacity of a channel is taken over by whichever of the two devices is transmitting at the time.

Full-duplex

In full-duplex mode (also called duplex), both station can transmit and receive simultaneously

The full-duplex mode is like a two-way street with traffic flowing in both directions at the same time. In full-duplex mode, signals going in either direction share the capacity of the link. This sharing can occur in two ways: Either the link must contain two physically separate transmission paths, one for sending and the other for receiving; or the capacity of the channel is divided between signals traveling in both directions.

Article Source: Data Communications and Networking

๕/๑๖/๒๕๕๐

Hardware & Software Basics

Hardware Basics: Making Sense of All That Stuff

To create a network, you need to begin by adding certain types of hardware. If you're new to networks, you might find the various pieces a little confusing. In an effort to reduce the confusion level, the next sections explain the basics of network hardware.

Network Adapters

Each PC on the network needs a network adapter to enable it to connect to the network. In some cases, a network adapter is already built in to the PC; however, this is not always true. Unfortunately, in some cases, you might also find that your PC includes a network adapter but, not the correct type for your choice of network. For example, you might want to create a wireless network, it's but your PC contains a built-in Ethernet adapter. If so, you can still install a wireless home network—you'll simply have to add a wireless network adapter to your PC.


It's often difficult to tell, especially with notebook computers, which network adapters, if any, are present. Notebooks might contain built-in wired adapters, wireless adapters, neither, or both! You might have to check your owner's manual or the specification sheet that came with your system to determine what you have. Most modern PCs will include at least one type of network adapter.






Figure 2-3. Network Adapter for Your Desktop PC for Use on a Wired Network




Figure 2-4. Network Adapter for Your Desktop PC for Use on a Wireless Network




Hubs

The data that travels across a network generally goes through a central point to be redistributed as needed. The simplest device for this purpose is called a hub.

Your local office supply store might sell network hubs, but you will probably want to steer away from hubs because you pay a price in terms of network performance for that simplicity.




Software Basics: Details Only a Geek Could Love

Computers are tools, but they're unlike most other types of tools in a very important way. The difference between computers and other types of tools is that most tools are designed to do specific types of tasks, whereas computers can be reprogrammed for many different tasks simply by changing the software that they run.

PCs were not originally designed with networking in mind, but through the addition of a number of software components, networking is now a reality. This network software is what enables your PC to communicate with other computers and makes your home network possible. Networking software is packaged as an integral part of modern PC operating systems such as Windows—which is used for the examples in this book—as well as Mac OS and Linux.

Networking software is different from most of the software that you use on your PC because of the type of job that it does. When you use a spreadsheet program or a word processor, you're well aware of the application that you're using. With networking software, that's not the case, because the networking software runs in the background providing a service without coming to the foreground to say, "Here I am."

Two primary elements make up the networking software on your PC—the client and the protocols (the terminology you'll see when setting up a Windows-based network). The sections that follow provide more details on these two components.

Network Clients

The network client is a piece of software that provides your PC with access to the network's services. For a typical home network, this software is known as the Client for Microsoft Networks.

Protocols and Drivers

The next important piece of the networking software puzzle is known as a protocol. The protocol can be thought of as the language that the computers on the network use to communicate with each other. Over the years, hundreds of different protocols have been developed for computer networking, each for its own specific purposes.

Fortunately, in home networking today, things are generally simpler because the industry has standardized on a set of protocols called TCP/IP (Transmission Control Protocol/Internet Protocol)). If TCP/IP sounds vaguely familiar, it's because TCP/IP is the protocol set most commonly used on the Internet (as well as your wired or wireless home network).

Even though having the proper network clients and protocols installed on your PC is vital to successfully creating your home network, the task of making sure the correct software is installed isn't nearly as ominous as it might sound because modern PC operating systems include wizards to automate the process.


Figure 2-7. Both the Proper Network Clients and Protocols Are Necessary for a Functioning Network

Why You Want Your Own Network

Big and Scary Networks: The Simplest Introduction You'll Ever Read


It's easy to be overwhelmed by technical jargon, and the subject of networks has certainly been one of the worst examples of this. It often seems as though the experts like to throw around a lot of complicated language for no better reason than to confuse the uninitiated. Maybe that makes the experts feel as though they know something that's their little secret, but it's not very helpful to people who simply want something that works. Phrases like "Wi-Fi infrastructure mode," "stateful packet inspection," and "upstream bandwidth" simply don't belong in our vocabulary!



The truth is that a home network doesn't really have to be difficult or complex. You don't have to join some geek squad or spend hours learning a new language to successfully create a functioning home network. In fact, you'll find that the project is fairly simple and pretty satisfying.

What Networks Really Are

So just what is a network, anyway? And how does a home network compare to an office network?

These are both good questions that get right to the heart of the matter. Let's start with the first question.

A network is nothing more than something that provides the means for different things to communicate with each other. You already use one of the world's biggest networks whenever you make a telephone call. Your phone number is the key that enables other people to pick up their phone, dial your number, and talk to you from virtually anywhere on the planet. Computer networks function very much like the telephone network because they were actually modeled after the telephone network to a large extent. Figure 1-1 gives you an idea of how home networks function, and Figure 1-2 shows how the telephone network is quite similar.


Figure 1-1. A Home Network Connects Your PCs and Other Devices So That They Can Communicate






Figure 1-2. The Telephone Network Functions Much Like Your Home Network Except on a Larger Scale


It's true that when you use a computer network, you typically aren't expecting another person to be at the other end of the line, but you don't always expect that with the telephone network, either. After all, haven't you ever made a phone call hoping that you would get someone's answering machine instead of talking directly to that person? When you do get the answering machine, you're interacting with that machine in much the same manner as if you were using a typical computer network and the devices on that network. Similar to how two network devices might communicate, the answering machine gives you a message, waits for your response, and then saves your response so that it can be picked up later.


So, if networks aren't all that unfamiliar, it's time to answer the second question regarding how home networks compare to larger networks like those in an office. Actually, the typical home network is very similar to an office network, but in a generally simpler, friendlier, and far less expensive package. That is, a home network still allows your PCs to talk to each other and share things such as files, printers, and Internet connections, but the manufacturers of home networking gear, such as Linksys, have concentrated on reducing the complexity so that you don't have to be an engineer to make it all work. In addition, home networks typically use a much simpler security model that doesn't require you to put up with complications like usernames, passwords, and deciding who gets to share what (unless you want to).

How Networks Really Work

Computers aren't people, but they still communicate on a network similar to how a group of people communicates. That is, computers send out information that is addressed to a particular individual and then wait for a response that tells them that the message was successfully received. PCs perform this task quickly, and that's part of what makes networks so practical.

To get a better understanding of the process, imagine that Sarah is working on a homework assignment on the PC in her room. When she completes her book report, she needs a printed copy, but she doesn't have a printer connected to her PC. A printer is connected to the PC in the den, and she can use it to print out her report. The conversation between the PCs goes something like this:

"Hello den computer, this is Sarah's PC. I'm sending you this report to print."

"Okay, Sarah's PC, this is the den PC. I received the data and sent it to my printer."

Sure, that exchange sounds trivial, but it does provide a nutshell description of what's going on, as further illustrated by Figure 1-3. At a basic level, a network functions quite simply by sending different messages as needed. The information in those messages—the data—can be something like Sarah's book report, digital images from your recent vacation, music files that you've saved on one of your PCs, or whatever other types of information you want to share.

Figure 1-3. The PCs on Your Home Network Talk to Each Other Through the Network



Things are more complicated inside the inner workings of the network. In Sarah's case, for example, the printer and the den PC actually engage in quite a bit of additional conversation, discussing whether the printer is out of paper, how many pages have finished printing so far, and details of what other reports the printer has been asked to print recently. Just like the telephone network, your computer network has to keep track of who is supposed to get each bit of information and make sure that everyone else isn't drowned by a sea of data that's not intended for them. Fortunately, your network automatically handles this additional complication, and you don't have to worry about it.

A Network Really Isn't Too Complicated for You

Setting up your own home network probably sounds like a great idea, but you might still have some doubts about whether it's really something that you can do. That's understandable, especially if you've heard horror stories about how difficult and complicated anything related to networks can be.

Well, don't believe those stories. The honest truth is that if you're willing to follow some simple directions, you can choose the proper equipment and install your own home network. You can then enjoy the benefits of having your own network without depending on someone else to make sure it all works, and if something goes wrong in the future, you'll know how to fix it. You really can do it yourself!

Article Source: Home Networking: A Visual Do-It-Yourself Guide
By
Brian Underdahl