Tuesday, April 12, 2011

Wireless Network

In Computer networking, the wireless network makes use of the wireless media or the unbounded media to transfer signals (data) from one computer to another, or from one network to another. The wireless network is often an appropriate, and sometimes necessary, networking option because it eliminates the need for too much cabling.
Sometimes the wireless network will incorporate the use actual cables thus forming a kind of mixed component network called Hybrid Network.

Types of Wireless Networks

  1. Wireless PAN (Wireless Personal Area Networks)
  2. Wireless LAN (Wireless Local Area Network)
  3. Wireless WAN (Wireless Wide Area Network)
  4. Mobile devices networks

Capabilities of Wireless Networks.

Whenever you implement a wireless network, you can be able to achieve the following;
  • Provide temporary connections to an existing, cabled network.
  • Help provide backup to an existing network.
  • Provide some degree of portability.
  • Extend networks beyond the limits of physical connectivity.

Uses of Wireless Network

These are some of the areas where the wireless network can be used:-
  1. Busy areas, such as lobbies and reception areas.
  2. People who are constantly moving, such as doctors and nurses in hospitals.
  3. Isolated areas and buildings.
  4. Departments where physical settings changes frequently and unpredictably.
  5. Structures, such as historic buildings, for which cabling present challenges.

Wireless Communications with LANs

The use of an access point transceiver is one of several ways to achieve wireless networking. An access point is a stationary transceiver connected to the cable based LAN that enables the cordless PC to communicate with the network. The access point acts as a conduit for the wireless PC. The process is initiated when the wireless PC sends a signal to the access point; from there, the signal reaches the network. The truly wireless communication, therefore, is the communication from the wireless PC to the access point.

Wireless LANs use five techniques for transmitting data:

  1. Infrared transmission.
  2. Laser transmission.
  3. Narrowband (single-frequency) radio transmission.
  4. Spread-spectrum radio transmission.
  5.  Microwaves.
1. INFRARED: All infrared wireless networks operate by using an infrared light beam to carry the data between devices. These systems need to generate very strong signals because weak transmission signals are susceptible to interference from light sourcessuch as windows and the signal cannot travel through objects.
LEDs are used to transmit signals or data between devices and photoreceptor diodes are used to receive data on the other side. Infrared signals are in a very high frequency range hence they have a good thro’ put. Infrared is just below the visible range of light between 100 GHz and 1000 THz.
There are four types of infrared networks:
1.      Line-of-sight networks: - Data is transmitted only if the transmitter and the receiver have a clear line of sight between them.
2.      Scatter infrared networks: - As the name suggests, signals are scattered in all directions, the broadcasted signals bounce of walls and ceilings and eventually hit the receiver.
3.      Reflective networks: - Optical receiver situated near the computer transmits towards a common location which then direct transmission to the appropriate computer.
4.      Broadband optical telepoint: - This infrared wireless LAN provides broadband services and is capable of handling high-quality multimedia requirements that can match those provided by a cabled network.
 
 2. LASER: High-powered laser transmitters can transmit data for several thousand yards when line-of-sight communication is possible. Laser technology is similar to infrared technology in that it requires a direct line of sight, and any person or object that breaks the laser beam will block the transmission.

3. NARROWBAND (SINGLE-FREQUENCY) RADIO TRANSMISSION: This approach is similar to broadcasting from a radio station. The user tunes both the transmitter and the receiver to a certain frequency. This does not require line-of-sight focusing because the broadcast range is 3000 meters (9842 feet).

4. SPREAD-SPECTRUM RADIO TRANSMISSION: - Spread-spectrum radio broadcasts signals over a range of frequencies.The available frequencies are divided into channels, known as hops, which are comparable to one leg of a journey that includes intervening stops between the starting point and the destination.

The spread-spectrum adapters tune in to a specific hop for a predetermined length of time, after which they switch to a different hop. A hopping sequence determines the timing. The computers in the network are all synchronized to the hop timing. This type of signaling provides some built-in security in that the frequency-hopping algorithm of the network would have to be known in order to tap into the data stream.

5. MICROWAVES: - Microwave systems are a good choice for a wireless network and can interconnect buildings in small, short-distance systems such as those on a campus or in an industrial park.
Microwave transmission is currently the most widely used long-distance transmission method. It is excellent for communicating between two line-of-sight points such as:
  • Satellite-to-ground links.
  • Between two buildings.
  • Across large, flat, open areas, such as bodies of water or deserts.
A microwave system consists of the following:
  • Two radio transceivers: one to generate (transmitting station) and one to receive (receiving station) the broadcast.
  • Two directional antennas pointed at each other to implement communication of the signals broadcast by the transceivers. These antennas are often installed on towers to give them more range and to raise them above anything that might block their signals. (Move out or peer through the window and you will be able to see some).
satellite communication dish
satellite communication dish
Satellite
Satellite

Microwave communication falls into two categories:-
i.Terrestrial Microwave
ii.Satellite microwave.

i) TERRESTRIAL MICROWAVE: - It uses earth based transmitters and receivers in the low GHz range of frequency (4-6GHz or 21-23GHz). Speed is often 1-10Mbps. The signal is normally encrypted for privacy. Communication is through line of sight and cannot go round corners or through buildings. Line-of-sight means that the transmitter’s beam is focused directly on the receiver. Microwave dishes (parabolic antennas) are seen on top of tall buildings. 

ii) SATELLITE MICROWAVE: - It uses communication satellite that operates in geosynchronous orbit (rotate round the earth) at 22300 miles 36000km above the earth’s surface which is an altitude that will cause it to stay in a fixed position relative to the rotation of the earth. A geosynchronous satellite must orbit at 22,300 miles altitude and it must be over the earth’s equator.

Parabolic antennas are used to communicate with the satellite, and a transmission from earth’s station to the satellite is called an uplink while the transmission from the satellite to the earth station is called a downlink.

Friday, April 8, 2011

Server Types

A server is a powerful computer that provides shared resources to client computers over a local area network or the internet. A server can also be defined as a computer or device on a network that manages network resources.

The variety of tasks that servers must perform is varied and complex, servers for large networks have become specialized to accommodate the expanding needs of the users; here in no order, i have listed some common server types.
1. File and print servers: - These server types manage user access and use of file and printer resources that run on your computer. Print servers are set up on a network to route print requests from other computer workstations on the network. The server handles the print file request and sends the file to the requested printer where it is spooled before being printed. A print server allows multiple users on a network to share a single printer.

2. Web server: - Also known as HTTP server, it gives users access to information from many computers that has internet access. The client computer runs an application called a browser that requests information from the web servers. Web browsers are programs, generally free, that are installed on computers and used to see/access the pages of a website located on the Internet or stored on a local hard drive, etc. These programs are usually free and can be downloaded from the internet.

Examples of web browsers
  • Internet explorer
  • Mozzilla fire fox
  • Avant browser
  • Windows safari
  • Opera
  • Netscape etc.
3. Database Server:-A database is an application that stores records that contain information and then it is used for the mangenent and the retrieval of that information. A database server is an application that is based on the client/server architecture or model. The application is divided into two parts: a front-end running on a workstation (where users collect and display the database information) and the back-end running on a server where the tasks such as data analysis and storage are performed. Many companies keep large database on the servers so that clients can ask the server to process a database search to generate a report.
4. Mail servers: - As the name suggests, these server types manage electronic messages between network users. These mail servers are very common nowadays and they move and store mail over corporate networks (via LANs and WANs) and across the Internet. Today, most people think of mail servers in terms of the Internet. Mail servers, however, were originally developed for corporate networks (LANs and WANs).
 
5. Fax Servers: - They manage fax traffic into and out of the network by sharing one or more fax modem boards. These server types accept documents from users, convert them into faxes, and transmit them, in addition to receiving fax calls and either storing the incoming documents or passing them on to the users on the network.

6. FTP Server:- An FTP server is a software application running the File Transfer Protocol (FTP), the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user’s browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet’s TCP/IP protocols to enable data transfer. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
7. Proxy Server: - A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server. Proxy servers have two main purposes:-
(1) Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time.
(2) Proxy servers also filter requests to block or disallow specific types of outgoing or incoming requests to the server.

Note
We have other server types used on our networks depending mainly on the application that is to be run from a system.

For more information about computer networking, visit my hubpages:-http://hubpages.com/profile/Patkay

Tuesday, February 22, 2011

Computer Viruses

What is a computer virus?

Virus???

Computer viruses and malwares strike when you rarely expect them. So it is important we be on our guard against viruses and malwares.

A computer virus can be defined as a software program that spreads from one computer to another and that interferes with normal computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk. Viruses have the ability to duplicate themselves thus negatively affecting your computer.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Therefore, you must never open an e-mail attachment unless you know who sent the message or unless you are expecting the e-mail attachment. Computer viruses also spread by using downloads on the Internet. Computer viruses can be hidden in pirated software or in other files or programs that you may download.

Once they reach your computer, they will then be tranferred easily by flash disk drives and other removable media types.

The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

Malware, short for malicious software,is a software designed to secretly access a computer system without the owner's informed consent. 

EFFECTS OF VIRUSES ON COMPUTERS

  1. Windows does not start properly or may not start at all.
  2. Windows may keep on re-booting.
  3. The computer runs very slowly. Additionally, the computer takes longer than expected to start.
  4. You receive out-of-memory error messages even though the computer has sufficient RAM.
  5. Programs that used to run stop responding frequently.
  6. You cannot start Windows Task Manager.
  7. Antivirus software indicates that a computer virus is present.
  8. Duplicate folders may be present on your computer.

How to protect your computer against viruses

To protect your computer against viruses, the following steps should be followed by anyone using a computer:
  1. Make sure your computer firewall is turned on. (Start, control panel, security centre, firewall)
  2. Keep the computer operating system up-to-date. (Start, control panel, security centre, Automatic updates)
  3. Install an antivirus sofware and keep on updating it regularly.
  4. Use updated antispyware software on the computer.
Some antivirus softwares you must buy but we have others that are freeware. Because they are freeware it doesn't mean they are not good. If regularly updated, they can protect your computer and its data and save you from a day of frustrations.

You can download avira for free from this site: http://www.softpedia.com/progDownload/AntiVir-Personal-Edition-Download-6527.html

To learn more about computers, you can check out my Hubs: http://hubpages.com/_pkk/profile/Patkay







Tuesday, February 15, 2011

The Motherboard Components

Many people are computer users, meaning they don't know the working of their computers. Most of us are actually used to the mouse and the keyboard. But there is need for us to know about the other computer parts. That is why i have created a hub with detailed information about the computer motherboard.

You can follow this link to access more information:- http://hubpages.com/_pkk/hub/the-motherboard-components