Sunday, May 17, 2009

Seven Layers OSI

The seven layers of networking is sometimes referred to the OSI Model, Open System Interconnection. Networking is broken down by traveling through several layers or protocols. This process is broken down into seven layers; Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, and Physical Layer. When a person communicates to another person on a network the information passes through these layers. It begins at the Application Layer, works its way through to the Physical Layer and then back up to the Application Layer.

(7) Application Layer- This layer is where the end-user (computer user) begins the communication process. At this layer user authentication is identified and protocols like FTP, TELNET, E-MAIL, and other file transfer protocols begin with the user starting the process.

(6) Presentation Layer - This layer is where encryption occurs. This layer converts the file and/or information into a language (format) that the remaining layers can read and handle without any compatibility problems.

(5) Session Layer - This layer is where the communication is coordinated. Applications are managed in this layer. This layer manages the exchange of information by creating and terminating all communication between the application layer at both ends.

(4) Transport Layer - This layer is responsible for ensuring the data completes it's transmission to the other user. It's also responsible for flow control and error recovery.

(3) Network Layer - This layer is where the routing and switching takes place. Packet sequencing, addressing, congestion control, and internetworking happen at this layer. Logical paths are created at this level to allow users to communicate to each other. This layer utilizes IP addresses.

(2) Data Link Layer - This layer is where packets (information) is broken into bits through encoding and decoding. At this layer you have two sections; Media Access Control (MAC), and Logical Link Control (LLC). The MAC section is where packets (information) is gathered and gets permission to transmit the data. The MAC section is where your computer's MAC address is located to allow proper delivery to a specific system (computer). The LLC section controls synchronization, flow control, and error checking.

(1) Physical Layer - This layer is where your hardware such as ethernet cable, Network Interface Cards, etc., provide the transmission through electrical impulse, light, and radio waves. This layer is the hardware means of sending and receiving data (information).

Switch


Product Description
Products Name: D-Link 24-Port 10/100 Switch Model: DES-1024D Product Features: Superior Performance Non-Blocking Wire-Speed Architecture 4.8Gbps Switching Capacity Product Description: The 24-port D-Link DES-1024D unmanaged switch is the latest addition to D-Link's popular line of Express EtherNetwork™ products. Like other products in the line, the DES-1024D combines ease of use with unsurpassed performance resulting in an exceptional value for any cost-conscious network administrator who wants the best possible solution at the best possible price.

Wireless

The wireless access point in this diagram acts as broadband router. Not all access points have routing capabilities. Like other broadband routers, the access point keeps LAN traffic separate from WAN internet traffic with a built-in firewall. All computers on this network are wireless 802.11b.


Bridging a wireless 802.11x network with a wired Ethernet network.
The wireless access point in this diagram acts as a network bridge. Because of the bridge, the wireless PC appears to be on the same network as the traditional Ethernet PC's. They may communicate back and forth with each other freely

The wireless access point in this diagram acts as a network bridge. Because of the bridge, the wireless PC appears to be on the same network as the traditional Ethernet PC's. They may communicate back and forth with each other freely

New Latest Routers

This is a basic D-Link G router with speeds of 54Mbps. Built in firewall for good protection also. Some other good features of this router:
This router also has speeds capaable of 108Mbps (Xtreme G wireless router). Its combatible with B wireless devices. It has a good signal and offers good protection from intruders. Some main features of this router

Latest AP in Networking

This router is perfect for traveling. It is very compact yet still a decent Wireless G router. If you think you might be traveling a lot and want to simple hook this up in a hotel room, this might be for you. Here are some of the features to this router:
This router has 108Mbps speed with Super G. Its a decent, stylish router which is perfect for having multiple computers on your network. Here are some of the features for this router

This router is new from Netgear. With this router, you can have up to 240Mbps of speed. It has a good signal and is a fairly nice, new, good looking router. Here are the features of this router
This router has a very good signal. Netgear claims this router is able to have 1000% more wireless coverage than G. So if you are in need of a router that you are sure of that will cover your house and maybe outside (Depending on the size of your house) of your house. Plus with MIMO, there is a small chance for wireless dead spots. Security on this router is also pretty nice. Here are the features for this router:
Dual-band, tri-standard Access Point communicates with Wireless-A (802.11a), Wireless-B (802.11b), and Wireless-G (802.11g) wireless networks
Protect your wireless investment while preparing your infrastructure for the future
Built-in 4-port Switch jump-starts your wired network, while the Router functionality securely shares your high-speed Internet connection with wired and wireless computers
Advanced Security: WEP and WPA wireless data encryption, VPN pass-through, Internet access control and Wireless filters

This router has great security protection including its VPN router. This router is more for a small business then home use because you can have 50 users connect to this router. It also has authoriztion options. Here are the features for this router: This is Linksys's smallest router which it can even fit into your pocket. It also has speedbooster on it which boosts performance. If you need a very small, compact, traveling router, you might want to take a look at it. Here are the features of this router:

AP in Networking

Brief Overview:
Linksys routers are very nice. You rarely have disconnects or even hardly never. The one con about linksys is that there setup is not very user friendly, but i have seen it improving so if you think you can handle the setup. There support is very nice and they really do help. There is also an option where you can go online and talk to them. Overall, Linksys is a nice company and there routers are built nicely with no over heating.



This router is a basic networking router. If all you want to do is just network between 4 PC's wired and have wireless, its your best bet. This routers features are:


1- All-in-one Internet-sharing Router, 4-port Switch, and Wireless-G (802.11g) Access Point
2- Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients
3-Wireless data rates up to 54Mbps -- 5 times as fast as Wireless-B (802.11b), but also interoperable with Wireless-B devices (at 11Mbps)
4-Advanced security: Wi-Fi Protected Access (WPA), wireless MAC address filtering, powerful SPI firewallIts a nice basic router and if your in a budget, this router is pretty cheap and almost always has a MIR.


This router is almost the same as the previous one except that this router has Speedbooster which means boosts downloading speeds. (Note: This can only be shown if you have a Linksys Wireless Card too) So if you already have a wireless card and dont want to replace it, your better off getting a sister model of it. (WRT54G* (*C or L)). Here are the features of this router:

This router is the newest of this line up. It has a little better security, the easy setup button making it easy to customize this router. So if you need a little extra security, this router might be a good decision. Here are the features of this router

World Networking

Program Overview
Computer & Information Technology (CIT) is an applied program in which students learn by doing. They apply the knowledge gained in the classroom to assignments they complete in computer laboratories. CIT courses provide students with strong technical skills, a thorough understanding of business needs, and the ability to communicate effectively in the business environment.

Purdue University North Central offers small class sizes for individual teaching, hands-on learning, and state-of-the-art computer labs.

Computer and Information Technology General Course Requirements
1-Internet Foundations, Technologies and Development
2-Software Development Technologies
3-Systems Analysis and Design Methods
4-Information Technology Architectures
5-Database Fundamentals and Programming
6-Networking, Systems Administration, and Security
7-Electronic Commerce and Business Implementation
8-Project Management
9-Math and Science
10-English Composition and Communication
11-Economics and Statistics
12-Humanities and Behavioral Sciences

networking_diagram

iBiz Server and Client are incredibly easy to set up because they use Zero Config Networking to discover each other. What this means for you is that all you have to do is install the programs on the appropriate computers and launch them - the rest is taken care of automatically!


Download a free, full-featured version iBiz Server/Client package (10 day trial period).


Benefits and Features of iBiz Server:
1- Keep all data (clients, projects, etc.) centralized.
2- Access data from multiple computers on the same network.
3- Work on data remotely or on the road and synchronize later.
4- Assign to-do items to different users.
5- Restrict permissions to certain users.
6- Create a central list of job events to be shared across the network.


Getting Started with iBiz in a networking environment
Using iBiz Server and iBiz Client with Zeroconf networking technology, groups of people can easily collaborate on projects.

See Networks how its works

Integration of the instrument in the network
Networking technologies have changed and improved daily business life. We now have almost unlimited access to all types of information, we can collected sales and customer data from servers, search for files, receive e-mail, and provide better customer service, all of which saves us time and money. Our customers have the same need to increase their efficiency, speed up projects, and fulfill stringent quality standards all at the same time. A growing number of customers therefore have a requirement to connect devices to their networks so as to get to the information they need faster, and have all data traceable as well.

E-Link networking interface
The e-Link Ethernet interface connects existing instruments to your network without making any changes to the software or configuration. Balances, scales, titrators, and terminals can now all be connected to a network, and with e-Link IP even in wet or hazardous environments.e-Link has all the elements needed for device networking - a processor, a robust TCP/IP stack, a web server, and a network connection to provide an Ethernet bridge to your serial devices.

Information Triangle

The Information Triangle
I've always found diagrams helpful to clarify my thoughts. Does anybody of you have experience with the currently available online tools for mind maps? I've come across one or the other, but they didn't impress me much, i.e. I'd prefer an old fashioned notepad over them. Either way, here is what was on my mind this day: the interrelationship between Information Technology (IT), Science and the Society

[Click to enlarge]

Any feedback, comments, crititcism is welcome. Is this somehow helpful? Interesting? Well structured? Readable? Thought stimulating? Other adjectives?The quotation above the upper left arrow refers to the following:
"Science is the only news. When you scan through a newspaper or magazine, all the human interest stuff is the same old he-said-she-said, the politics and economics the same sorry cyclic dramas, the fashions a pathetic illusion of newness, and even the technology is predictable if you know the science. Human nature doesn't change much; science does, and the change accrues, altering the world irreversibly.''
Stewart Brand, Quoted in ''The Third Culture: Beyond the Scientific Revolution'',

John Brockman, Touchstone (1996).

The Wacky, Wondrous Social Networking Wheel

Yesterday the MB bunch had another thrilling brainstorming session at lunchtime. This time around the cuisine was pizza from The-Pizzeria, and the topic was Social Networking. As the person who called this little gathering, I wanted to get all my ideas out there in some tangible form. If your familiar with the office meeting, you know that tangents are sprinkled like land mines waiting to appear and take you off your main focus. So I showed off my master passable PowerPoint karate and made a pretty little graph. I don't like to think of it as a graph though, but instead Seamus' Social Networking Wonder Wheel. The wheel basically has every idea I could think of for Social Networking. Some of the ideas were plunked from other sites like Fannation.com, where I previously blogged about their "throwdowns" that allow two users to debate topic while other members casted votes.
In all there are about fifteen spokes on the wheel-- some ideas are more immediately feasible, and others are what I like to call "blank check" ideas. One of those idea$ was "fantasy media," where users would choose a team of media professionals and celebrities, then accumulate points based on how often they are mentioned in both MB produced and user-generate content. Unfortunately I discovered I'm not that much of a trailblazer-- after the meeting a quick Google search came up with fafarazzi.com, a site that does the same thing that was floating around in my head-- the only difference is the players were more from the Hollywood gossip circles than the "legitimate media." Still, maybe it can be improved upon by us, or even better-- maybe Mr. Alan Meckler can buy Fafarazzi for us. Call it an early Christmas present.

Small Network

Who are the players in the PHIN? Several can already be identified — and we expect that others will emerge over time. Google Health, Microsoft HealthVault, and Dossia are early entrants. There’s been a lot of discussion of creating PHI banks or trusts, and these could also be players in the PHIN. Other existing players in the PHR/EHR (personal health record/electronic health record) market could be players in the PHIN if they adopted appropriate stances toward portability, interoperability, and liquidity.
We anticipate that the PHIN will consist of multiple interoperable platforms. The exchange of information among these platforms will be enabled by standards, e.g., the ASTM Continuity of Care Record (CCR) Standard and the HL7 CDA Continuity of Care Document (CCD).
Some applications built on the PHIN will prove to be higher value than others (e.g., patients exchanging information with their physician), and we anticipate that some standards — e.g., the CCR — will be more flexible and readily adopted in enabling the PHIN.
Of course, there will be barriers and challenges to the PHIN. Patients currently have low awareness of the value of their PHI, and about why and how to use a PHR. There are significant, legitimate concerns about privacy, confidentiality and security of PHI. An appropriate legal structure will need to evolve to balance broader societal uses of PHI vs. protecting individuals’ privacy.

Work Development

Community-Based Information Technology Workforce Development
John CarrollVirginia Techcarroll at cs dot vt dot edu
Jobs often require sophisticated computer skills. A large proportion of adults lack these skills; many are unemployed or under-employed. Typical approaches to this challenge of an information technology workforce rely on formal training programs, but such programs may not be suitable for everyone and, in any case, lack the capacity to include all those who need information technology training.

CTSC Information

Informatics as an agent for cohesion in the Harvard University CTSA.

[ Posted by Isaac Kohane on 2008-06-05 at 13:11 ]

In the review of the planning grant for the Harvard University Clinical and Translational Science award, one reviewer made a pointed, if humorous, comment. It would be, s/he noted, innovative if Harvard would "merely" learn to work with itself. This (lightly) paraphrased critique outlined the challenge for the informatics component of the Harvard CTSA application: in addition to four General Clinical Research Centers (GCRC's) at four Harvard-affiliated hospitals (Brigham and Women's Hospital, Massachusetts General Hospital, Beth Israel Deaconess Hospital and Children's Hospital, Boston) there are a multiplicity of research programs, resources and thousands of investigations relevant to translational research in the life sciences across the University. Fortunately, the informatics research community and the IT leadership across the hospitals and medical school had already developed productive collaborations which allowed us to serve as an important part of the collaborative glue across our institutions. Moreover, we already had passed the internal test of "eating our own dogfood" by adopting several NIH-funded technologies we had developed. This included a toolkit (call the "Hive") that enables academic health centers to instrument the healthcare system to conduct discovery research as an informational by product of healthcare delivery that was developed from our i2b2 National Center for Biomedical Computing and which is in the process of being adopted or evaluated by many previous CTSA awardees. It also includes the Virtual Specimen Locator which was one of the implementations of the Shared Pathology Informatics Network that the NCI had funded. With the technical and sociological learning of these projects under our belt we were able to propose the following:

Overview of Information Technology

In the field of information technology, AIST focuses on the following four high-priority themes to help build a information society in which information technologies pervade our lives. From the viewpoint of maintaining and strengthening the international competitiveness of the IT industry, high priority is placed on achieving higher added value by intelligent functions and energy saving features in familiar devices such as information appliances. With more and more homes and offices now enjoying broadband access, the necessity of creating high-speed, high-capacity information infrastructure and constructing safe, high-reliability systems is also increasing. Taking advantage of its total capabilities, AIST is helping strengthen Japanese industry with IT as a core technology.

1) High-speed, high-capacity information lifeline
AIST conducts research on technologies for high-capacity data storage and high-speed processing and telecommunication as part of the IT infrastructure which supports society. In the area of storage, research focuses on high-capacity memories using high-density optical disks and technologies for secure storage of data distributed on networks. Processing-related research centers on grid technology for a next-generation internet which provides instantaneous access to necessary information and information processing capacity, while telecommunications research includes all-optical telecommunications and other subjects.

2) Security and dependability
Research includes technologies for secure telecommunications and authentication to prevent illegal access via the internet, and verification technologies to guarantee that software is coded according to specifications.

3) Intelligence boosters
Subjects of development include energy saving logic/memory devices and mobile device technologies integrating such devices, natural human interface and intelligence assistants to support individual intellectual activity and production activity, and ubiquitous, mobile information activity support devices.

4) Applications of advanced information processing
In this area, AIST is involved in applied research and system development for advanced use of grid computing and supercomputing, utilizing AIST's Super Cluster, as an advanced computing infrastructure.

Development of grid middleware
Based on two distributed parallel execution models for remote procedure calls and message passing, middleware Ninf-G2 and GridMPI for use on the grid were developed.(Grid Technology Research Center)

Development of ultrafast optical switching technology using intersubband transition

AIST researchers succeeded in shortening the wavelength of the intersubband optical transition formed in the semiconductor quantum well to the telecommunications wavelength band, and developed the basic technology for an ultrafast optical switching which operates at the highest speed in the world, at the 150 femtosecond level.(Photonics Research Institute)

2) Security and dependability
Practical application of model checking method to embedded software verification Verification work for the design document for an embedded software program at a private company was performed by model checking, demonstrating the effectiveness of the model checking method by early detection of bugs before discovered by conventional methods such as actual machine tests.(Research Center for Verification and Semantics)
Success in fastest optical fiber quantum crypto transmission in the world The fastest photon detector at the 1550nm wavelength in the world was developed considering a new photon detection method. Using this technology, a key generating rate of 45 Kbit/sec was achieved, setting a new world record, in a key distribution experiment with a quantum crypto transmission over a 10.5km optical fiber.(Photonics Research Institute)

3) Intelligence Boosters
Development of porous silica low permittivity (low-k) insulator film To increase signal transmission speed and reduce power consumption in the internal wiring of semiconductors, a porous silica insulator film for wiring was developed based on a novel material design concept. (Advanced Semiconductor Research Center)

Operation plan for humanoids with arm/leg coordination and development of plan formulation method

An operation plan formulation method for accomplishing coordinated movements/work using both arms and legs based on visual and other information in complex environments was developed using a humanoid robot. The robot was able to perform various operations, such as passing through restricted spaces by crawling and reaching for a distant object while using a desk for support.(Intelligent Systems Research Institute)

Networking features


In order to explore and exploit the vast opportunities offered by Information Technology, which will improve and accelerate the planning process and implementation of socio-economic programmes for all round development growth of the Nation, NIC, the Nodal Organisatuion in the Ministry of Communication and Information Technology, Govt. of India to introduce computer based MIS, fileless-Office concept, e-mail services, telematic services and Video Conferencing in the Central, state and District level has set up a satellite based Computer Communication Network (NICNET) covering all State Capitals, Districts and the Centre. This is facilitating the development of District Information System at District level (DISNIC) and essential databases for state and central Govt. departments

Punjab University of Lahor


Master of Information Technology (MIT) is designed to cater to the needs of students who have got a background in a discipline other than Information Technology and wish to acquire skills in the rapidly advancing field of IT. Graduates will combine the IT skills with those of their previous knowledge in a professional applications-oriented setting and prepare themselves for the technological challenges and opportunities of the future arising in all fields including banking, telecommunications, defense, commerce, government, health, education and many other areas. Graduates will develop the skills in the field of computer programming, software design, database management, networking and information systems audit and controls; demanded by the cyber space employment market. Specialization will be offered to meet the future needs of the Industry. Specialization will be offered to meet the future needs of the Industry

Curriculum Details:
1- Foundation Courses:9Cr. Hrs. (3 Courses)
2- General Education: 6 Cr. Hrs.(2 Courses)
3- IT Core Courses: 29 Cr. Hrs. (9 Courses)
4- Specialization: 18 Cr. Hrs. (6 Courses)
5- Project:6 Cr. Hrs.

IT SPO south planins college

Information Technology

The Office of Information Technology assists with issues regarding college provided computer equipment, software/hardware installations, network support, viruses, local or network printers, account information for E-mail, MySPC, Filebound, Campus Connect, Wireless and other computer-related problems. For questions on any informational technology issue, contact the Office of Information Technology at extension 2601.


Tim Winders ~ Associate Dean ~ (806) 894-9611, ext. 2369
Olga Lozano ~ (806) 894-9611, ext. 2601

Computer and Network Technicians
Levelland
Phil Daniel ~ (806) 894-9611, ext. 2176
Jeff Harlow ~ (806) 894-9611, ext. 2605
Eddie Wimberley ~ (806) 894-9611, ext. 2604
Coby Glenn ~ (806) 894-9611, ext. 2603

Reese
Jim Hardy ~ (806) 894-9611, ext. 4665

Byron Martin ATC
Deanna Findley ~ (806) 894-9611, ext. 4916

Computer Center - VAX/POISE
Ginger Mulloy ~ Director ~ (806) 894-9611, ext. 2417
Dolores Rodriquez ~ (806) 894-9611, ext. 2415
Ross Orman ~ (806) 894-9611, ext. 2602

Saturday, May 16, 2009

Thursday, May 14, 2009

New Leptop Shown





Stock Photo of Girl Working on Laptop Computer Looking Happy and Surprised


































Stock Photo of Girl Working on Laptop Computer Looking Happy and Surprised



Stock Photo Description: Stock photography of an pretty blond girl working on a laptop computer, shot in-studio on white seamless paper. This stock photo shows an attractive young woman working at a laptop computer with her hand covering her mouth and a smile and a look of happy surprise on her face. Perhaps she has just read or been told a joke or has revieved a flirtatious email or IM.
Model Release: Yes
Property Release: No
Commercial use is allowed