Sunday, May 17, 2009
Seven Layers OSI
(7) Application Layer- This layer is where the end-user (computer user) begins the communication process. At this layer user authentication is identified and protocols like FTP, TELNET, E-MAIL, and other file transfer protocols begin with the user starting the process.
(6) Presentation Layer - This layer is where encryption occurs. This layer converts the file and/or information into a language (format) that the remaining layers can read and handle without any compatibility problems.
(5) Session Layer - This layer is where the communication is coordinated. Applications are managed in this layer. This layer manages the exchange of information by creating and terminating all communication between the application layer at both ends.
(4) Transport Layer - This layer is responsible for ensuring the data completes it's transmission to the other user. It's also responsible for flow control and error recovery.
(3) Network Layer - This layer is where the routing and switching takes place. Packet sequencing, addressing, congestion control, and internetworking happen at this layer. Logical paths are created at this level to allow users to communicate to each other. This layer utilizes IP addresses.
(2) Data Link Layer - This layer is where packets (information) is broken into bits through encoding and decoding. At this layer you have two sections; Media Access Control (MAC), and Logical Link Control (LLC). The MAC section is where packets (information) is gathered and gets permission to transmit the data. The MAC section is where your computer's MAC address is located to allow proper delivery to a specific system (computer). The LLC section controls synchronization, flow control, and error checking.
(1) Physical Layer - This layer is where your hardware such as ethernet cable, Network Interface Cards, etc., provide the transmission through electrical impulse, light, and radio waves. This layer is the hardware means of sending and receiving data (information).
Switch
Products Name: D-Link 24-Port 10/100 Switch Model: DES-1024D Product Features: Superior Performance Non-Blocking Wire-Speed Architecture 4.8Gbps Switching Capacity Product Description: The 24-port D-Link DES-1024D unmanaged switch is the latest addition to D-Link's popular line of Express EtherNetwork™ products. Like other products in the line, the DES-1024D combines ease of use with unsurpassed performance resulting in an exceptional value for any cost-conscious network administrator who wants the best possible solution at the best possible price.
Wireless
The wireless access point in this diagram acts as a network bridge. Because of the bridge, the wireless PC appears to be on the same network as the traditional Ethernet PC's. They may communicate back and forth with each other freely
New Latest Routers
Latest AP in Networking
Protect your wireless investment while preparing your infrastructure for the future
Built-in 4-port Switch jump-starts your wired network, while the Router functionality securely shares your high-speed Internet connection with wired and wireless computers
Advanced Security: WEP and WPA wireless data encryption, VPN pass-through, Internet access control and Wireless filters
AP in Networking
2- Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients
3-Wireless data rates up to 54Mbps -- 5 times as fast as Wireless-B (802.11b), but also interoperable with Wireless-B devices (at 11Mbps)
4-Advanced security: Wi-Fi Protected Access (WPA), wireless MAC address filtering, powerful SPI firewallIts a nice basic router and if your in a budget, this router is pretty cheap and almost always has a MIR.
This router is the newest of this line up. It has a little better security, the easy setup button making it easy to customize this router. So if you need a little extra security, this router might be a good decision. Here are the features of this router
World Networking
Computer & Information Technology (CIT) is an applied program in which students learn by doing. They apply the knowledge gained in the classroom to assignments they complete in computer laboratories. CIT courses provide students with strong technical skills, a thorough understanding of business needs, and the ability to communicate effectively in the business environment.
Purdue University North Central offers small class sizes for individual teaching, hands-on learning, and state-of-the-art computer labs.
Computer and Information Technology General Course Requirements
1-Internet Foundations, Technologies and Development
2-Software Development Technologies
3-Systems Analysis and Design Methods
4-Information Technology Architectures
5-Database Fundamentals and Programming
6-Networking, Systems Administration, and Security
7-Electronic Commerce and Business Implementation
8-Project Management
9-Math and Science
10-English Composition and Communication
11-Economics and Statistics
12-Humanities and Behavioral Sciences
networking_diagram
1- Keep all data (clients, projects, etc.) centralized.
2- Access data from multiple computers on the same network.
3- Work on data remotely or on the road and synchronize later.
4- Assign to-do items to different users.
5- Restrict permissions to certain users.
6- Create a central list of job events to be shared across the network.
Using iBiz Server and iBiz Client with Zeroconf networking technology, groups of people can easily collaborate on projects.
See Networks how its works
Networking technologies have changed and improved daily business life. We now have almost unlimited access to all types of information, we can collected sales and customer data from servers, search for files, receive e-mail, and provide better customer service, all of which saves us time and money. Our customers have the same need to increase their efficiency, speed up projects, and fulfill stringent quality standards all at the same time. A growing number of customers therefore have a requirement to connect devices to their networks so as to get to the information they need faster, and have all data traceable as well.
E-Link networking interface
The e-Link Ethernet interface connects existing instruments to your network without making any changes to the software or configuration. Balances, scales, titrators, and terminals can now all be connected to a network, and with e-Link IP even in wet or hazardous environments.e-Link has all the elements needed for device networking - a processor, a robust TCP/IP stack, a web server, and a network connection to provide an Ethernet bridge to your serial devices.
Information Triangle
I've always found diagrams helpful to clarify my thoughts. Does anybody of you have experience with the currently available online tools for mind maps? I've come across one or the other, but they didn't impress me much, i.e. I'd prefer an old fashioned notepad over them. Either way, here is what was on my mind this day: the interrelationship between Information Technology (IT), Science and the Society
Any feedback, comments, crititcism is welcome. Is this somehow helpful? Interesting? Well structured? Readable? Thought stimulating? Other adjectives?The quotation above the upper left arrow refers to the following:
"Science is the only news. When you scan through a newspaper or magazine, all the human interest stuff is the same old he-said-she-said, the politics and economics the same sorry cyclic dramas, the fashions a pathetic illusion of newness, and even the technology is predictable if you know the science. Human nature doesn't change much; science does, and the change accrues, altering the world irreversibly.''
Stewart Brand, Quoted in ''The Third Culture: Beyond the Scientific Revolution'',
John Brockman, Touchstone (1996).
The Wacky, Wondrous Social Networking Wheel
In all there are about fifteen spokes on the wheel-- some ideas are more immediately feasible, and others are what I like to call "blank check" ideas. One of those idea$ was "fantasy media," where users would choose a team of media professionals and celebrities, then accumulate points based on how often they are mentioned in both MB produced and user-generate content. Unfortunately I discovered I'm not that much of a trailblazer-- after the meeting a quick Google search came up with fafarazzi.com, a site that does the same thing that was floating around in my head-- the only difference is the players were more from the Hollywood gossip circles than the "legitimate media." Still, maybe it can be improved upon by us, or even better-- maybe Mr. Alan Meckler can buy Fafarazzi for us. Call it an early Christmas present.
Small Network
We anticipate that the PHIN will consist of multiple interoperable platforms. The exchange of information among these platforms will be enabled by standards, e.g., the ASTM Continuity of Care Record (CCR) Standard and the HL7 CDA Continuity of Care Document (CCD).
Some applications built on the PHIN will prove to be higher value than others (e.g., patients exchanging information with their physician), and we anticipate that some standards — e.g., the CCR — will be more flexible and readily adopted in enabling the PHIN.
Of course, there will be barriers and challenges to the PHIN. Patients currently have low awareness of the value of their PHI, and about why and how to use a PHR. There are significant, legitimate concerns about privacy, confidentiality and security of PHI. An appropriate legal structure will need to evolve to balance broader societal uses of PHI vs. protecting individuals’ privacy.
Work Development
John CarrollVirginia Techcarroll at cs dot vt dot edu
Jobs often require sophisticated computer skills. A large proportion of adults lack these skills; many are unemployed or under-employed. Typical approaches to this challenge of an information technology workforce rely on formal training programs, but such programs may not be suitable for everyone and, in any case, lack the capacity to include all those who need information technology training.
CTSC Information
[ Posted by Isaac Kohane on 2008-06-05 at 13:11 ]
In the review of the planning grant for the Harvard University Clinical and Translational Science award, one reviewer made a pointed, if humorous, comment. It would be, s/he noted, innovative if Harvard would "merely" learn to work with itself. This (lightly) paraphrased critique outlined the challenge for the informatics component of the Harvard CTSA application: in addition to four General Clinical Research Centers (GCRC's) at four Harvard-affiliated hospitals (Brigham and Women's Hospital, Massachusetts General Hospital, Beth Israel Deaconess Hospital and Children's Hospital, Boston) there are a multiplicity of research programs, resources and thousands of investigations relevant to translational research in the life sciences across the University. Fortunately, the informatics research community and the IT leadership across the hospitals and medical school had already developed productive collaborations which allowed us to serve as an important part of the collaborative glue across our institutions. Moreover, we already had passed the internal test of "eating our own dogfood" by adopting several NIH-funded technologies we had developed. This included a toolkit (call the "Hive") that enables academic health centers to instrument the healthcare system to conduct discovery research as an informational by product of healthcare delivery that was developed from our i2b2 National Center for Biomedical Computing and which is in the process of being adopted or evaluated by many previous CTSA awardees. It also includes the Virtual Specimen Locator which was one of the implementations of the Shared Pathology Informatics Network that the NCI had funded. With the technical and sociological learning of these projects under our belt we were able to propose the following:
Overview of Information Technology
1) High-speed, high-capacity information lifeline
AIST conducts research on technologies for high-capacity data storage and high-speed processing and telecommunication as part of the IT infrastructure which supports society. In the area of storage, research focuses on high-capacity memories using high-density optical disks and technologies for secure storage of data distributed on networks. Processing-related research centers on grid technology for a next-generation internet which provides instantaneous access to necessary information and information processing capacity, while telecommunications research includes all-optical telecommunications and other subjects.
2) Security and dependability
Research includes technologies for secure telecommunications and authentication to prevent illegal access via the internet, and verification technologies to guarantee that software is coded according to specifications.
3) Intelligence boosters
Subjects of development include energy saving logic/memory devices and mobile device technologies integrating such devices, natural human interface and intelligence assistants to support individual intellectual activity and production activity, and ubiquitous, mobile information activity support devices.
4) Applications of advanced information processing
In this area, AIST is involved in applied research and system development for advanced use of grid computing and supercomputing, utilizing AIST's Super Cluster, as an advanced computing infrastructure.
Development of grid middleware
Based on two distributed parallel execution models for remote procedure calls and message passing, middleware Ninf-G2 and GridMPI for use on the grid were developed.(Grid Technology Research Center)
Practical application of model checking method to embedded software verification Verification work for the design document for an embedded software program at a private company was performed by model checking, demonstrating the effectiveness of the model checking method by early detection of bugs before discovered by conventional methods such as actual machine tests.(Research Center for Verification and Semantics)
Success in fastest optical fiber quantum crypto transmission in the world The fastest photon detector at the 1550nm wavelength in the world was developed considering a new photon detection method. Using this technology, a key generating rate of 45 Kbit/sec was achieved, setting a new world record, in a key distribution experiment with a quantum crypto transmission over a 10.5km optical fiber.(Photonics Research Institute)
3) Intelligence Boosters
Development of porous silica low permittivity (low-k) insulator film To increase signal transmission speed and reduce power consumption in the internal wiring of semiconductors, a porous silica insulator film for wiring was developed based on a novel material design concept. (Advanced Semiconductor Research Center)
Networking features
Punjab University of Lahor
Curriculum Details:
1- Foundation Courses:9Cr. Hrs. (3 Courses)
2- General Education: 6 Cr. Hrs.(2 Courses)
3- IT Core Courses: 29 Cr. Hrs. (9 Courses)
4- Specialization: 18 Cr. Hrs. (6 Courses)
5- Project:6 Cr. Hrs.
IT SPO south planins college
Olga Lozano ~ (806) 894-9611, ext. 2601
Computer and Network Technicians
Levelland
Phil Daniel ~ (806) 894-9611, ext. 2176
Jeff Harlow ~ (806) 894-9611, ext. 2605
Eddie Wimberley ~ (806) 894-9611, ext. 2604
Coby Glenn ~ (806) 894-9611, ext. 2603
Reese
Jim Hardy ~ (806) 894-9611, ext. 4665
Byron Martin ATC
Deanna Findley ~ (806) 894-9611, ext. 4916
Computer Center - VAX/POISE
Ginger Mulloy ~ Director ~ (806) 894-9611, ext. 2417
Dolores Rodriquez ~ (806) 894-9611, ext. 2415
Ross Orman ~ (806) 894-9611, ext. 2602
Future SPC Students
Current SPC Students
Academic Calendar 2008-2009
Admissions & Records
Advising
Bookstore
Business Office
Calendar of Events
Campus Life
Counseling
Faculty Web Sites
Final Exam Schedule-Spring 2009
Financial Aid
Housing/Dining/Parking
Information Technology
Job Placement
Library
Online Publications
Programs of Study
Scholarships
Special Services
Star Center
Student Health Services
Teaching & Learning Center
Testing/TSI Information
Tutoring
Campus Police
Who to Contact
Alumni & Friends
Employees
Community & Business
Parents & Family
High School Students
International Students -->
Information Technology -->
Saturday, May 16, 2009
Thursday, May 14, 2009
New Leptop Shown
Model Release: Yes
Property Release: No
Commercial use is allowed