Monday, May 28, 2012

What is a patent?

A patent is an intellectual property right granted by the Government of the United States of America to an inventor “to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States” for a limited time in exchange for public disclosure of the invention when the patent is granted.
There are three types of patents. Utility patents may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof. Here is the process for obtaining a utility patent. Design patents may be granted to anyone who invents a new, original, and ornamental design for an article of manufacture. Plant patents may be granted to anyone who invents or discovers and asexually reproduces any distinct and new variety of plant.

Intellectual property

Intellectual property (IP) is a term referring to a number of distinct types of creations of the mind for which a set of exclusive rights are recognized under the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property rights include copyrights, trademarks, patents, industrial design rights and trade secrets in some jurisdictions.
Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the 19th century that the term intellectual property began to be used, and not until the late 20th century that it became commonplace in the majority of the world.[2] The British Statute of Anne 1710 and the Statute of Monopolies 1623 are now seen as the origins of copyright and patent law respectively.[3]

What are the Business Benefits of Network Security?

With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers' data, it reduces the risk of legal action from data theft.
Ultimately, network security helps protect a business's reputation, which is one of its most important assets.

How Does Network Security Work?

To understand What is network security?, it helps to understand that no single solution protects you from a variety of threats. You need multiple layers of security. If one fails, others still stand.
Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats.
A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.
Network security components often include:
  • Anti-virus and anti-spyware
  • Firewall, to block unauthorized access to your network
  • Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
  • Virtual Private Networks (VPNs), to provide secure remote access

What Is Network Security and How Does It Protect You?

After asking What is network security?, you should ask, What are the threats to my network?
Many network security threats today are spread over the Internet. The most common include:
  • Viruses, worms, and Trojan horses
  • Spyware and adware
  • Zero-day attacks, also called zero-hour attacks
  • Hacker attacks
  • Denial of service attacks
  • Data interception and theft
  • Identity theft

What Is Network Security?

In answering the question What is network security?, your IT partner should explain that network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network.

Wednesday, May 9, 2012

Mail processing model

Email is submitted by a mail client (MUA, mail user agent) to a mail server (MSA, mail submission agent) using SMTP on TCP port 587. Most mailbox providers still allow submission on traditional port 25. From there, the MSA delivers the mail to its mail transfer agent (MTA, mail transfer agent). Often, these two agents are just different instances of the same software launched with different options on the same machine. Local processing can be done either on a single machine, or split among various appliances; in the former case, involved processes can share files; in the latter case, SMTP is used to transfer the message internally, with each host configured to use the next appliance as a smart host. Each process is an MTA in its own right; that is, an SMTP server.
The boundary MTA has to locate the target host. It uses the Domain name system (DNS) to look up the mail exchanger record (MX record) for the recipient's domain (the part of the address on the right of @). The returned MX record contains the name of the target host. The MTA next connects to the exchange server as an SMTP client. (The article on MX record discusses many factors in determining which server the sending MTA connects to.)
Once the MX target accepts the incoming message, it hands it to a mail delivery agent (MDA) for local mail delivery. An MDA is able to save messages in the relevant mailbox format. Again, mail reception can be done using many computers or just one —the picture displays two nearby boxes in either case. An MDA may deliver messages directly to storage, or forward them over a network using SMTP, or any other means, including the Local Mail Transfer Protocol (LMTP), a derivative of SMTP designed for this purpose.
Once delivered to the local mail server, the mail is stored for batch retrieval by authenticated mail clients (MUAs). Mail is retrieved by end-user applications, called email clients, using Internet Message Access Protocol (IMAP), a protocol that both facilitates access to mail and manages stored mail, or the Post Office Protocol (POP) which typically uses the traditional mbox mail file format or a proprietary system such as Microsoft Exchange/Outlook or Lotus Notes/Domino. Webmail clients may use either method, but the retrieval protocol is often not a formal standard.
SMTP defines message transport, not the message content. Thus, it defines the mail envelope and its parameters, such as the envelope sender, but not the header or the body of the message itself. STD 10 and RFC 5321 define SMTP (the envelope), while STD 11 and RFC 5322 define the message (header and body), formally referred to as the Internet Message Format.
Blue arrows can be implemented using SMTP variations.

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC 821 (1982, eventually declared STD 10),[1] and last updated by RFC 5321 (2008)[2] which includes the extended SMTP (ESMTP) additions, and is the protocol in widespread use today. SMTP uses TCP port 25. The protocol for new submissions (MSA) is effectively the same as SMTP, but it uses port 587 instead. SMTP connections secured by SSL are known by the shorthand SMTPS, though SMTPS is not a protocol in its own right.
While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying. For receiving messages, client applications usually use either the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) or a proprietary system (such as Microsoft Exchange or Lotus Notes/Domino) to access their mail box accounts on a mail server.
The Internet Message Access Protocol (commonly known as IMAP) is an Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server. The current version, IMAP version 4 revision 1 (IMAP4rev1), is defined by RFC 3501. An IMAP server typically listens on well-known port 143. IMAP over SSL (IMAPS) is assigned well-known port number 993.
IMAP supports both on-line and off-line modes of operation. E-mail clients using IMAP generally leave messages on the server until the user explicitly deletes them. This and other characteristics of IMAP operation allow multiple clients to manage the same mailbox. Most e-mail clients support IMAP in addition to POP to retrieve messages; however, fewer email services support IMAP IMAP offers access to the mail storage. Clients may store local copies of the messages, but these are considered to be a temporary cache.
Incoming e-mail messages are sent to an e-mail server that stores messages in the recipient's email box. The user retrieves the messages with an e-mail client that uses one of a number of e-mail retrieval protocols. Some clients and servers preferentially use vendor-specific, proprietary protocols, but most support the Internet standard protocols, SMTP for sending e-mail and POP and IMAP for retrieving e-mail, allowing interoperability with other servers and clients. For example, Microsoft's Outlook client uses a proprietary protocol to communicate with a Microsoft Exchange Server server as does IBM's Notes client when communicating with a Domino server, but all of these products also support POP, IMAP, and outgoing SMTP. Support for the Internet standard protocols allows many e-mail clients such as Pegasus Mail or Mozilla Thunderbird (see comparison of e-mail clients) to access these servers, and allows the clients to be used with other servers (see list of mail servers).

Monday, May 7, 2012

Voice over IP

Voice over IP (VoIP) commonly refers to the communication protocols, technologies, methodologies, and transmission techniques involved in the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.
Internet telephony refers to communications services —voice, fax, SMS, and/or voice-messaging applications— that are transported via the Internet, rather than the public switched telephone network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the original voice stream.Even though IP Telephony and VoIP are terms that are used interchangeably, they are actually different; IP telephony has to do with digital telephony systems that use IP protocols for voice communication, while VoIP is actually a subset of IP Telephony. VoIP is a technology used by IP telephony as a means of transporting phone calls.
VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The choice of codec varies between different implementations of VoIP depending on application requirements and network bandwidth; some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs. Some popular codecs include u-law and a-law versions of G.711, G.722 which is a high-fidelity codec marketed as HD Voice by Polycom, a popular open source voice codec known as iLBC, a codec that only uses 8kbps each way called G.729, and many others.
VoIP is available on many smartphones and Internet devices so that users of portable devices that are not phones, may place calls or send SMS text messages over 3G or Wi-Fi
.

Virtual private network

A virtual private network (VPN) is a secure network that uses primarily public telecommunication infrastructures, such as the Internet, to provide remote offices or traveling users an access to a central organizational network.
VPNs typically require remote users of the network to be authenticated, and often secure data with firewall and encryption technologies to prevent disclosure of private information to unauthorized parties.
There are two types of VPNs; remote access VPNs and site to site VPNs. Remote access VPNs are for individual users who are not in a fixed location - remote or roaming users like salespeople. Site to site VPNs are for multiple users in a fixed location - like regional offices.
VPNs may serve any network functionality that is found on any network, such as sharing of data and access to network resources, printers, databases, websites, etc. A VPN user typically experiences the central network in a manner that is identical to being connected directly to the central network. VPN technology via the public Internet has replaced the need to requisition and maintain expensive dedicated leased-line telecommunication circuits once typical in wide-area network installations.
Virtual private network technology reduces costs because it does not need physical leased lines to connect remote users to an Intranet.

VPN Connectivity overview

Extranet

An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. In a business-to-business context, an extranet can be viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users. In contrast, business-to-consumer (B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. An extranet is similar to a DMZ in that it provides access to needed services for channel partners, without granting access to an organization's entire network.

Intranet

An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes, the term refers only to the organization's internal website, but may be a more extensive part of the organization's information technology infrastructure, and may be composed of multiple local area networks.
An intranet may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Any of the well known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data.
An intranet can be understood as a private analog of the Internet, or as a private extension of the Internet confined to an organization. The first intranet websites and home pages began to appear in organizations in 1996-1997. Although not officially noted, the term intranet first became common-place among early adopters, such as universities and technology corporations, in 1992.[dubious ]
Intranets are sometimes contrasted to extranets. While intranets are generally restricted to employees of the organization, extranets may also be accessed by customers, suppliers, or other approved parties.[1] Extranets extend a private network onto the Internet with special provisions for authentication, authorization and accounting (AAA protocol).
In many organizations, intranets are protected from unauthorized external access by means of a network gateway and firewall. For smaller companies, intranets may be created simply by using private IP address ranges, such as 192.168.0.0/16. In these cases, the intranet can only be directly accessed from a computer in the local network; however, companies may provide access to off-site employees by using a virtual private network, or by other access methods, requiring user authentication and encryption.


Web conferencing

Web conferencing refers to a service that allows conferencing events to be shared with remote locations. In general the service is made possible by Internet technologies, particularly on TCP/IP connections. The service allows real-time point-to-point communications as well as multicast communications from one sender to many receivers. It offers information of text-based messages, voice and video chat to be shared simultaneously, across geographically dispersed locations. Applications for web conferencing include meetings, training events, lectures, or short presentations from any computer.

How does the Asynchronous Web work?

To achieve the Asynchronous Web we need to be able to send responses back to the browser spontaneously, but how can this be achieved within the confines of the HTTP protocol? We cannot send a response to a non-existent request, so it is necessary to manipulate the request/response mechanism to achieve the desired effect. The most straight forward way is with a basic polling mechanism. Send requests on a regular basis, and give the system continuous opportunities to update the presentation. This technique, which is illustrated below, is not ideal as there is no ideal polling interval. There is a necessary trade off between timely updates and chattiness of the system. As illustrated, it is possible for multiple events to occur between polls, but it is also possible to have no events occur. In the final analysis, polling is not a truly asynchronous mechanism.
The next option to consider is HTTP streaming, where multiple responses can be sent to a single request, as illustrated below. This is an efficient mechanism, but unfortunately is not ubiquitously acceptable across all proxy/firewall configurations, making it unsuitable for general purpose deployments.
The last option to consider is HTTP long polling, where the request is made in anticipation of a future response, but that response is blocked until some event occurs that triggers its fulfillment. This mechanism, which is illustrated below, is nearly as efficient as streaming and is completely compatible with proxy/firewall configurations as it is indistinguishable from a slow responding server.
So long polling provides a viable mechanism for supporting the Asynchronous Web, and is in fact the mechanism used in industry implementations like Ajax Push and Comet. While the mechanism is relatively simple, the ramifications of holding these blocking requests indefinitely are not. We will now examine these in more detail beginning with the Servlet.

What is the Asynchronous Web, and How is it Revolutionary? By Stephen Maryka 01 Apr 2009 | TheServerSide.com

Legacy web applications are synchronous in nature. The user interacts with the web interface presented in the browser, the browser makes requests back to the server based on that user interaction, and the server responds to those requests with new presentation for the user - fundamentally a synchronous process. This means that the presentation delivered to the user represents a snapshot in time of what is a dynamic system. That snapshot becomes stale in between user interactions and does not necessarily provide an accurate view onto the current state of the system. Even when you bring Ajax techniques into the equation this synchronous process is unchanged. While the use of XmlHttpRequest and Ajax techniques facilitates a more fine-grained interaction model than a full page refresh, the requests are still generated based on user interaction, so the process remains synchronous, and the potential for a stale view onto the system persists.
The Asynchronous Web is fundamentally different, and that difference revolutionizes how web applications behave. In the Asynchronous Web it is possible to deliver spontaneous presentation changes to the user as the state of a dynamic system changes, without the need for the user to interact with the interface. The advantages are obvious as we can now maintain an accurate view onto the system for the user. Examples are numerous, and include any system providing a view onto a dynamic system, such as a stock portfolio, an inventory, or a day timer/calendar. When you have multiple users interacting with the same system, the interactions of one user can spontaneously impact what other users see, thus creating a truly collaborative system - the essence of what Web 2.0 promises. Again, examples are numerous, including a simple chat client, and an eBay bidding system. Ultimately, most systems that humans interact with are collaborative in nature, so the web interface onto those systems should be too.

Monday, April 23, 2012

Email

Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or receive messages.
An email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp.
Originally a text-only (7-bit ASCII and others) communications medium, email was extended to carry multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME).
Electronic mail predates the inception of the Internet, and was in fact a crucial tool in creating it,[2] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.
Network-based email was initially exchanged on the ARPANET in extensions to the File Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP), first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and body) itself.

Monday, April 16, 2012

How Internet Search Engines Work

Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There are differences in the ways various search engines work, but they all perform three basic tasks:
  • They search the Internet -- or select pieces of the Internet -- based on important words.
  • They keep an index of the words they find, and where they find them.
  • They allow users to look for words or combinations of words found in that index.
Early search engines held an index of a few hundred thousand pages and documents, and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. In this article, we'll tell you how these major tasks are performed, and how Internet search engines put the pieces together in order to let you find the information you need on the Web.

Web search engine

A web search engine is designed to search for information on the World Wide Web and FTP servers. The search results are generally presented in a list of results often referred to as search engine results pages (SERPs). The information may consist of web pages, images, information and other types of files. Some search engines also mine data available in databases or open directories. Unlike web directories, which are maintained only by human editors, search engines also maintain real-time information by running an algorithm on a web crawler.

Timeline (full list)
Year Engine Current status
1993 W3Catalog Inactive
Aliweb Inactive
1994 WebCrawler Active, Aggregator
Go.com Active, Yahoo Search
Lycos Active
1995 AltaVista Inactive (URL redirected to Yahoo!)
Daum Active
Magellan Inactive
Excite Active
SAPO Active
Yahoo! Active, Launched as a directory
1996 Dogpile Active, Aggregator
Inktomi Acquired by Yahoo!
HotBot Active (lycos.com)
Ask Jeeves Active (ask.com, Jeeves went away)
1997 Northern Light Inactive
Yandex Active
1998 Google Active
MSN Search Active as Bing
1999 AlltheWeb Inactive (URL redirected to Yahoo!)
GenieKnows Active, rebranded Yellowee.com
Naver Active
Teoma Active
Vivisimo Inactive
2000 Baidu Active
Exalead Acquired by Dassault Systèmes
2002 Inktomi Acquired by Yahoo!
2003 Info.com Active
2004 Yahoo! Search Active, Launched own web search
(see Yahoo! Directory, 1995)
A9.com Inactive
Sogou Active
2005 AOL Search Active
Ask.com Active
GoodSearch Active
SearchMe Closed
2006 wikiseek Inactive
Quaero Active
Ask.com Active
Live Search Active as Bing, Launched as
rebranded MSN Search
ChaCha Active
Guruji.com Active
2007 wikiseek Inactive
Sproose Inactive
Wikia Search Inactive
Blackle.com Active
2008 Powerset Inactive (redirects to Bing)
Picollator Inactive
Viewzi Inactive
Boogami Inactive
LeapFish Inactive
Forestle Inactive (redirects to Ecosia)
VADLO Active
Duck Duck Go Active, Aggregator
2009 Bing Active, Launched as
rebranded Live Search
Yebol Active
Megafore Active
Mugurdy Inactive due to a lack of funding
Goby Active
2010 Black Google Mobile Active
Blekko Active
Cuil Inactive
Yandex Active, Launched global
(English) search
Yummly Active
2011 Interred Active
2012 Volunia Active , only Power User
Goorbe Active, only Persian Language

Uniform resource locator

In computing, a uniform resource locator (URL) is a specific character string that constitutes a reference to an Internet resource.
A URL is technically a type of uniform resource identifier (URI) but in many technical documents and verbal discussions URL is often used as a synonym for URI

Web Browser

A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content.[2] Hyperlinks present in resources enable users easily to navigate their browsers to related resources. A web browser can also be defined as an application software or program designed to enable users to access, retrieve and view documents and other resources on the Internet.
Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems. The major web browsers are Firefox, Google Chrome, Internet Explorer, Opera, and Safari

Monday, April 2, 2012

ADSL

Commonly simplified as DSL, Asymmetric Digital Subscriber Line (ADSL) is technology for high-speed Internet access. It uses existing copper telephone lines to send and receive data at speeds that far exceed conventional dial-up modems, while still allowing users to talk on the phone while they surf. By contrast, DSL is typically not as fast as cable Internet access. It is generally well-suited for moderate gaming, computer-aided design, streaming multimedia, and downloading large files.

ADSL Speed

The fastest dial-up modems are rated at 56 kilobits per second (Kbps), and usually operate at about 53 Kbps under good conditions. By comparison, ADSL allows download speeds from 1.5 to 8 megabits per second (Mbps), depending on the grade of DSL service purchased. Cable Internet is capable of supporting up to 30 Mbps.

How Does ADSL Work?

ADSL uses standard telephone lines to upload and download data on a digital frequency, which sets these datastreams apart from the analog signals that telephones and fax machines use. The telephone can be used at the same time when surfing the Web with DSL service because the signal is operating on a different frequency; this is not true of conventional dial-up Internet access. It may be necessary to install inexpensive filters on each phone or fax line to remove any "white noise" on the line that might be generated from the DSL signals.

What Is DSL

The full form of DSL is known as the digital subscriber line, which consists of various different technologies that provide an internet connection to a computer network using the DSL.
The digital subscriber line , or most commonly known as the DSL, involves the use of the pair of copper phone lines using the wiring networks, these also comprise of a main switch which has special hardware to relay the internet signals to the other end of the user. A continuous digital connection network can be achieved using this technology.
The DSL technology is purely based on digital composition and thus there is no use of the digital to analog conversion for the internet transmission as required in the previous modems of the traditional times. The DSL system does not use the frequency spectrum of the audio in the phone, because it requires the frequency above that which means that the telephone can be used while the internet connection is still on.
The speed of the DSL system technology is incomparable to any other internet connection provider, previously used. If compared, the DSL wins over 50 times faster inter speed than the general modems used and is about 12 times faster than the ISDN connection. The reason behind this is that the DSL system used different frequencies for the encoding of the data, which allows a much faster internet speed. Another factor which contributes to the high speed of the DSL is that it is not a bus technology because of which its offered bandwidth is much more consistent than the other types of modems which provides the same bandwidth to multiple users.
However, the only conditions that can affect the transmission speed are the wiring conditions and also to some extent the distance limitations.

Internet tools

Internet tools are basically used so as to make the internet use much easier via some of the applications specially made for a particular internet business.
These tools are advanced and custom-built for the development of the internet, so that the optimal management can be achieved both in the informational and communication solutions. These tools are also available commercially.
Different networks are compatible with different internet tools, as described further.
The tools related to the networking of the TCP/IP most widely used is the "Fifi Ping »"
The Ping is actually used for the basic inquiry to determine whether the host which is governing the internet is alive and transmitting information and signals or not. The ping tool performs this task by sending data to the host of the network used for the internet so as to see the response and the time period required to achieve it.
The internet tool of the "Icestorm NSLookup »" is used to convert your personal domain name into an IP or the internet protocol address, like the form (216.122.237.109) it can then be used for exactly the opposite task, but the DNS server has to be queried for that.
The other internet tool related with the Internet protocol "Dig DNS Check »" is used to gain information from the DNS servers using the domain information groper of the DIG.
The internet tool of the "logic Host Check »" is used by the network of TCP/IP to perform several different tasks and tools of the network in one single host.

What is Internet

he internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol.
Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other networks. These networks enable the internet to be used for various important functions which include the several means of communications like the file transfer, the online chat and even the sharing of the documents and web sites on the WWW, or the World Wide Web.
It is always mistaken said that the internet and the World Wide Web are both the same terms, or are synonymous. Actually there is a very significant difference between the two which has to be clear to understand both the terms. The internet and World Wide Web are both the networks yet; the internet is the network of the several different computers which are connected through the linkage of the accessories like the copper wires, the fiber optics and even the latest wireless connections. However, the World Wide Web consists of the interlinked collection of the information and documents which are taken as the resource by the general public. These are then linked by the website URLs and the hyperlinks. Therefore World Wide Web is one of the services offered by the whole complicated and huge network of the internet.
The use of IP in the Internet is the integral part of the network, as they provide the services of the internet, through different layers organization through the IP data packets. There are other protocols that are the sub-classes of the IP itself, like the TCP, and the HTTP.

Sunday, April 1, 2012

Introduction To Building Your Own PC

This is an introduction to building your own custom gaming computers to play the latest games. Building your own PC is the way to go if you want the best performance for gaming, and at the best value. Despite what some people may tell you, it is quite straightforward and easy to do.
If this is your first time building a custom computer, building custom gaming computers simply involves selecting and buying all your computer components separately and then installing them one by one. If you choose the right parts you will end up with a fast, cost-effective gaming computer capable of playing the latest PC game releases.

Advantages to Building Your Own

There are many good reasons to go custom. These are the main advantages of building your own custom gaming PC as opposed to buying a pre-built system:
  • Better performance. If you want a high-performance gaming PC tailored to your gaming needs, building your own machine is the best way to go about it.
  • Save money. By shopping around for quality components at good prices you can save quite a bit of money. Building a custom gaming PC is usually a lot more cost-effective than buying a pre-built system.
  • Learning Experience. Whilst choosing your components and building your gaming computer, you are bound to learn a lot of valuable information about PC hardware and how computers work on the inside.

As you can see, there are great reasons why someone would want to build their own custom gaming computer. On top of all that, you will feel great after having built your own custom machine all by yourself.
If you haven't built your own machine before, I would definitely encourage you to build your next setup. No matter what some people say, it really isn't difficult at all and the money you will save is quite significant for most people.
These days installation is a breeze and for the majority of the parts it's simply a matter of following the instructions that came with it.


Choosing Your Components

How do you go about choosing the right components for your needs? How do you know which component is best for you? How do they all work together?The following buying guides for each component will hopefully clear up the confusion on what you need to know to choose the best parts for your custom gaming build. Or if you're looking for specific part recommendations you can skip to the Recommended Gaming Desktop Computer Builds.

Choosing the Best Motherboard For Your Custom Gaming PC

This article is here to help you choose the best motherboard for gaming. The motherboard is one of the most important components in any computer, and it can make or break a system.
You can have the best CPU, RAM, and graphics card in the world, but without a quality motherboard at the core of your system you won't be getting anywhere fast.


We will look at the various factors you should take into account when choosing your gaming motherboard, to ensure that you choose the best motherboard for your needs and one that is compatible with all your other components.
If you think of the processor as the brain of a computer, then the motherboard could be described as the heart and/or central nervous system. The motherboard represents the core of a PC and is responsible for relaying information between all the internal components. In other words, it’s the hub of the computer, where all other components connect to.
Since the motherboard is so crucial to your system, buying the best motherboard you can afford is a good investment if you want a gaming system that will last. The following guidelines are here to help you make a more informed decision on your gaming motherboard choice:

CPU Compatability
The first thing you need to be aware of when choosing a motherboard is compatability with the CPU you plan on using. A motherboard will generally only support either Intel or AMD CPUs, and only certain models too.
Checking for compatability between a particuilar motherboard and a CPU is very simple, all you need to do is check to see if the motherboard and CPU both have the same 'processor interface'.

RAM Compatability
The motherboard you choose will dictate the type and amount of RAM you can have. These days you will want to get DDR3 RAM, and at least 4GB for the best gaming performance to play the latest games. So ensure your motherboard will support this type and amount of memory, but most boards these days will so it's very rarely an issue.

Ports, Slots, and Other Features
If you need extra PCI ports for other cards then make sure your motherboard has this. You should also consider the number of USB ports you need, and whether you need a Firewire port (used for video capturing and editing).
Also, be sure there's enough PCI-Express slots for your needs. You will need a PCI-Express slot for your video card, or two slots if you are going to install two video cards in your machine. If you decide on getting a dedicated sound card then you will need another PCI-Express port for that too.

On-board Audio VS Dedicated Sound Card
Most motherboards will come with built-in audio so getting a dedicated sound card is completely optional. I would recommend investing in a sound card if you want the very best experience from your games, or if you want to take full advantage of high quality speakers or headphones.
For music producers and those doing video and audio editing it's a different story, and a sound card is necessary as the on-board sound provided by typical motherboards won't cut it. If you want to learn more about choosing a dedicated sound card for gaming or other purposes check out How To Choose The Best Sound Card.

Tips On Buying Your Motherboard
When you're choosing the best motherboard for your gaming PC it's wise to think ahead a little. If you want your motherboard to last you a while then I would recommend you choose a decent quality board that has been released recently.
Since the motherboard is such a critical component to your gaming PC, in general I would recommend buying the best board you can afford. Some of the most-trusted motherboard manufacturers for quality and reliability are ASUS, MSI, EVGA, Intel, and Gigabyte to name a few of the best.
If you are looking for specific recommendations on the best motherboards for use gaming, check out the Recommended Custom Gaming Builds. The motherboards picked in those builds are some of the best available right now with both high performance and value for money in mind, and we strive to always keep them updated from month to month.

IP address (Internet Protocol Address)

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet.

When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet. The gateway computer reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified.
Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet. Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.
IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data. (The reason the packets do get put in the right order is because of TCP, the connection-oriented protocol that keeps track of the packet sequence in a message.) In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer.
The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP Version 6 (IPv6) is also beginning to be supported. IPv6 provides for much longer addresses and therefore for the possibility of many more Internet users. IPv6 includes the capabilities of IPv4 and any server that can support IPv6 packets can also support IPv4 packets.

Friday, March 30, 2012

Universal Serial Bus

Universal Serial Bus
Certified USB.svg
Original logo
Type Bus
Designed 1994
Manufacturer Intel, Compaq, Microsoft, NEC, Digital Equipment Corporation, IBM, Nortel
Superseded Serial port, parallel port, game port, Apple Desktop Bus, PS/2 connector
Length 5 meters (may be extended with hubs)
Width 11.5 mm (A-plug), 8.45 mm (B-plug) (there are also smaller connectors)
Height 4.5 mm (A-plug), 7.78 mm (B-plug, pre-v3.0)
Hot pluggable Yes
External Yes
Cable 4 wires plus shield; 9 wires plus shield in USB 3.0
Pins 4 (1 supply, 2 data, 1 ground); 9 in USB 3.0 (additional 5 for SuperSpeed technology including one extra ground); 11 in powered USB 3.0; micro connectors have one additional pin
Connector Unique
Signal 5 volt DC
Max. voltage 5 V(±5%)
Max. current 500–900 mA @ 5 V (depending on version)
Data signal Packet data, defined by specifications
Width 1 bit
Bitrate 1.5/12/480/5,000 Mbit/s (depending on version)
Max. devices 127
Protocol Serial
USB.svg
The standard USB A plug (left) and B plug (right)
Pin 1
VCC (+5 V)
Pin 2
Data-
Pin 3
Data+
Pin 4
Ground

Universal Serial Bus

Universal Serial Bus (USB) is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication and power supply between computers and electronic devices.[1]
USB was designed to standardize the connection of computer peripherals, such as keyboards, pointing devices, digital cameras, printers, portable media players, disk drives and network adapters to personal computers, both to communicate and to supply electric power. It has become commonplace on other devices, such as smartphones, PDAs and video game consoles.[2] USB has effectively replaced a variety of earlier interfaces, such as serial and parallel ports, as well as separate power chargers for portable devices.
As of 2008, approximately 6 billion USB ports and interfaces are currently in the global marketplace, and about 2 billion were being sold each year.[3]

Thursday, March 29, 2012

X-mini MAX II

The X-mini MAX II portable speakers were developed in Singapore. They are the third in the line of XMI's capsule speaker technology. Capsule speakers are quickly becoming a popular alternative to standard portable speakers. These types of speakers have a mushroom-shaped design and are ultraportable. Despite the small size, these audio accessories still deliver powerful sound. The innovative design also includes the option to "pop-up," in order to allow more airflow through the speakers.
Since these X-mini MAX II speakers only require a 3.5mm audio jack, they can be plugged into your desktop computer at work, your laptop in the park or even your MP3 player in the car. Each speaker has a built-in rechargeable battery, so they do not need an external power source. The simple, compact design combined with impressive sound and long battery life makes these speakers TopTenREVIEWS Gold Award winner and the best option found for portable speakers.

Features Product Feature Score Product Feature Score Product Feature Score Product Feature Score
These ultraportable laptop speakers are designed for superior sound. The little capsule speakers expand vertically to enable the Bass Xpansion System. This patented system creates an extendable vacuum, which is capable of producing bass over ten times what the physical size of these speakers would normally allow. The accordion-like design allows for more air to travel through the speakers, creating a resonance similar to a traditional subwoofer. They won't rattle the windows or shake your desk, but these little speakers can keep a beat.
The X-mini MAX II capsule speakers have a frequency response of 200Hz~18kHz, which means that they play a wide range of sound. Human hearing generally ranges from 20Hz~20kHz. They do not play as wide a range as home theater speakers or car speakers, but a smaller frequency range is to be expected because of the compact size. These speakers won't play the lowest lows or the highest highs, but they do play frequencies that are comparable to other portable speakers.
Each unit has a 1.57-inch driver, or loudspeaker. Each of these laptop speakers has an output power of 2.5 watts and an impedance of 4 Ohms. These speakers also have a signal-to-noise ratio of 80dB, which means that you can increase the volume fairly high without hearing any additional hissing or buzzing behind the music. It also means that you don't have to turn the dial up too much on these travel speakers in order to get a decent volume level. They are also able to handle high levels of volume with little distortion, which is quite impressive for speakers this small.
You can play one speaker at a time, or hook the two speakers together for a stereo experience. The "Buddy Jack" feature lets you connect one X-mini speaker to another. The cord between the speakers, however, is only three feet. This creates an issue if you're trying to spread them apart for better stereo sound separation. However, each unit has a Buddy Jack system that enables you to hook up another speaker to it. This means that, in theory, you can create a large chain of multiple speakers to play at the same time. Although too many speakers connected together could drive your power source to the limits. The Buddy Jack function can be handy if you're trying to fill a large space with sound. It won't have the sound quality of a professional sound system, but it is a fairly good substitute.
To charge the X-mini MAX II speakers, just plug them into any USB port on your computer or laptop. The built-in rechargeable battery only takes 2.5 hours to charge. After it is fully charged, each capsule speaker has a playback time of up to 12 hours. That kind of battery life is perfect for road trips or camping trips where a power outlet is not readily accessible. There is also a power switch on each individual unit. A blue LED light shows when each unit is powered on, and a red light shows when the speaker is being charged. You can also play the speakers while they are plugged into the computer, giving you an endless supply of power and music.
The X-mini MAX II is an improvement on the X-mini MAX and the X-mini I because of open, angled drivers. It also features a richer bass output than earlier models. Any second generation X-mini speaker is compatible with the Buddy Jack system of these speakers. That means that you can mix and match the models for an even larger audio chain. These speakers are available in black, red and white color options, so you can find one that fits your style.
Portability Product Feature Score Product Feature Score Product Feature Score Product Feature Score
At first glance, the X-mini MAX II portable speakers look like a large egg when put together. The two units are attached to each other by magnetic force. At the widest point, this oval-shaped portable sound machine is only 2.5 inches wide. When the two units are together, it measures just over four inches long. This may make it too big for your pocket, but it is perfect for a backpack or a laptop case. When apart, each speaker is around 2.5 inches high and 2 inches wide. These laptop speakers have a net weight of 0.4 pounds, so you'll hardly feel them in your bag as you're carrying them from place to place.
Ease of Use Product Feature Score Product Feature Score Product Feature Score Product Feature Score
To detach them from one another, simply twist and pull. Now you're ready to hook the speakers up. These portable speakers come with a cord that includes a USB connection, two mini USB connections and a stereo audio jack. These wires do have a "messy" feel as you're setting them up. The wires cross over one another and seem to be all over the place when everything is set up. Also, there is no in-unit storage for the cord, so you just have to wrap it around the speakers when you're storing it. However, the X-mini MAX II also comes with a storage pouch, so you can just place the cord in the pouch instead of wrapping it around.
After switching on each one of the units, these travel speakers are ready to play. There is no volume control on the speakers. They need to be controlled by the computer or MP3 player to which they're attached. To enable the Bass Xpansion System, just twist and lift each speaker and the top will pop up. The speakers can be played without being "popped up," but they achieve a fuller sound when the accordion-style interior is exposed.
Help/Support Product Feature Score Product Feature Score Product Feature Score Product Feature Score
The X-mini site is not very informative or helpful. The information is sparse and the features are minimal. The only question on the FAQs page is "My Unit is faulty, how do I get it replaced?" If you have a question beyond that, there is a contact sheet where you can fill in your information and address a specific issue. No telephone number is given, and no online chat is available at this time. Instructions are included with the product, but no online manual is available.
Summary
It is almost impossible to find a portable speaker that has the same sound quality of larger speakers, but the X-mini MAX II comes close. These tiny speakers deliver a full range of sound and an impressive amount of bass. The innovative magnetic design allows the two speakers to become one easy-to-carry audio accessory. In addition, the long battery life makes them ideal for travel. Finally, if you find that these two portable speakers are not loud enough for your needs, you can always "Buddy Jack" them to additional speakers and get the volume you desire.