Thursday, 29 September 2016

Revealed: The biggest legal teams in the FTSE 100

Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe eveniet ut et voluptates repudiandae sint et molestiae non recusandae. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat.

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio.

Monday, 26 September 2016

NewLaw firm claims new heights with cloud platform

Varietates autem iniurasque fortunae facile veteres philosophorum praeceptis instituta vita superabat. Earum etiam rerum, quas terra gignit, educatio quaedam et perfectio est non dissimilis animantium. Duo Reges: constructio interrete. Quae diligentissime contra Aristonem dicuntur a Chryippo. Te enim iudicem aequum puto, modo quae dicat ille bene noris.

Ne amores quidem sanctos a sapiente alienos esse arbitrantur. Sin autem eos non probabat, quid attinuit cum iis, quibuscum re concinebat, verbis discrepare? Hoc enim identidem dicitis, non intellegere nos quam dicatis voluptatem. Itaque hic ipse iam pridem est reiectus; Tu vero, inquam, ducas licet, si sequetur; At certe gravius. Illum mallem levares, quo optimum atque humanissimum virum, Cn. Etenim semper illud extra est, quod arte comprehenditur.

Graece donan, Latine voluptatem vocant. Hoc enim constituto in philosophia constituta sunt omnia. Si enim ad populum me vocas, eum. Si longus, levis; Indicant pueri, in quibus ut in speculis natura cernitur. Nemo igitur esse beatus potest. Haec para/doca illi, nos admirabilia dicamus. Utinam quidem dicerent alium alio beatiorem! Iam ruinas videres.

Friday, 23 September 2016

Electrical Safety , it can take your life

What is electricity?


the flow of energy (current) from one place to another,


current: the flow of electron,


The voltage of the electricity and the available electrical current in regular businesses and homes has enough power to cause death by electrocution.


injuries caused by electricity.



  • burn: commonly occur on hand



  • electrocution ( when you touch a live wire while your feet on the electrical ground)

  • touch live wire of different voltage

  • death (occurs due to the shock)

  • fall


remember low voltage means low hazards,





























1. DON'T plug a bunch of stuff into one outlet or extension cord.


It could damage the electrical system in your house or even cause a fire.


2. Make sure all electric cords are tucked away, neat and tidy.


Pets might chew on electrical cords, and people might trip and fall.



  electricity



3. DON'T ever climb the fence around an electrical substation.


If a ball or pet gets inside the fence, ask a grown-up to call the electric company - they'll come and get it out for you.



electricity



4. DON'T yank an electrical cord from the wall.

Pulling on a cord can damage the appliance, the plug or the outlet.



electricity



5. Fly your kite far away from power lines or substations.

The kite and the string may conduct electricity - sending it right through you to the ground.


6. Ask a grown-up for help when you need to use something that uses electricity.



electricity



7. DO look up and look out for power lines before you climb a tree.


The electricity can go right through the tree branch - and right through you!


8. Have a grown-up put safety caps on all unused electrical outlets.


Covering outlets will also help save energy by stopping cold drafts.



electricity



9. Remind your mom or dad to watch out for power lines when they're using a ladder, chainsaw or other outdoor equipment.


10. Keep electrical stuff far away from water.


Most electrical accidents around the house happen when people use electricity near water.


Thursday, 22 September 2016

construction or domestic safety (slip , trip and fall hazards)

Hazards Anything that can cause harm is called hazard. A hazard is any source of potential damage, harm or adverse health effects on something or someone under certain conditions at work


Basically, a hazard can cause harm or adverse effects (to individuals as health effects or to organizations as property or equipment losses)



[caption id="attachment_325" align="alignright" width="261"]hazards tea is too hot, it can burn you[/caption]

Slips


Slips happen where it is too little


friction or traction


between the footwear and the walking surface.


Common causes of slips are:



  • wet or oily surfaces

  • weather hazards

  • loose, unanchored rugs or mats

  • flooring or other walking surfaces that do not have the same degree of traction in all areas

  • occasional spills

  • flooring or other walking surfaces that do not have the same degree of traction in all areas


 


Trips


Trips happen when your foot collides (strikes, hits) an object causing you to lose the balance and, eventually, fall Common causes of tripping are



  • obstructed view

  • poor lighting

  • clutter in your way

  • wrinkled carpeting

  • uncovered cables

  • bottom drawers not being closed

  • uneven (steps, thresholds) walking surfaces


 


 slip_hazard

 




Both slips and trips result from some a kind of unintended or unexpected change in the contact between the feet and the ground or walking surface


This shows that good housekeeping, quality of walking surfaces (flooring), selection of proper footwear, and appropriate pace of walking are critical for preventing fall accidents




Housekeeping


Good housekeeping is the first and the most important (fundamental) level of preventing falls due to slips and trips It includes



  • marking spills and wet areas

  • mopping or sweeping debris from floors

  • securing (tacking, taping, etc.) mats, rugs and carpets that do not lay flat

  • always closing file cabinet or storage drawers

  • covering cables that cross walkways

  • keeping working areas and walkways well lit

  • cleaning all spills immediately

  • removing obstacles from walkways and always keeping them free of clutter

  • replacing used light bulbs and faulty switches

Google UK legal chief exits for tech start-up

Earum etiam rerum, quas terra gignit, educatio quaedam et perfectio est non dissimilis animantium. Duo Reges: constructio interrete. Quae diligentissime contra Aristonem dicuntur a Chryippo. Te enim iudicem aequum puto, modo quae dicat ille bene noris.

Graece donan, Latine voluptatem vocant. Hoc enim constituto in philosophia constituta sunt omnia. Si enim ad populum me vocas, eum. Si longus, levis; Indicant pueri, in quibus ut in speculis natura cernitur. Nemo igitur esse beatus potest. Haec para/doca illi, nos admirabilia dicamus. Utinam quidem dicerent alium alio beatiorem! Iam ruinas videres.

Ne amores quidem sanctos a sapiente alienos esse arbitrantur. Sin autem eos non probabat, quid attinuit cum iis, quibuscum re concinebat, verbis discrepare? Hoc enim identidem dicitis, non intellegere nos quam dicatis voluptatem. Itaque hic ipse iam pridem est reiectus; Tu vero, inquam, ducas licet, si sequetur; At certe gravius. Illum mallem levares, quo optimum atque humanissimum virum, Cn. Etenim semper illud extra est, quod arte comprehenditur.

Wednesday, 21 September 2016

Switch vs Hub

Hubs and switch are devices that let you connect one or more computers to other computers, networked devices, or even other networks. Each has two or more ports into which you plug in the cables to make the connection. There are some differences between switch vs hub. I often see the terms misused, so let’s clarify what each one really means so in this article I just make the comparison of both switch vs hub.


switch vs hubswitch vs hub


Comparison between switch vs hub












































































Device/function



Hub



Switch



Layer



Physical Layer (Layer 1) -Hubs are classified as Physical layer (Layer 1) device of the Open system interconnected (OSI) model.



Data Link layer (layer2) and some switches working in layer 3 which is called multilayer switch



Function



Mostly used for personal computer network - To connect a network of personal computers together, they can be connected through a central hub.



Multiple devices can be connect


Port can be managed


VLAN Can Create


On each port security can apply



Data Transmission form



Bits or Electrical Signals  



Frame (L2 Switch)


 Frame & Packet (L3 switch)



Ports



4 Ports


8 Ports


12 Ports



5 Ports


8 Ports


16 Ports


24 Ports


48 ports


Modular Switch


Soft Switch



Transmission Type



Always performs data flooding to all ports,  may be unicast, multicast or broadcast



First-time broadcast, then multicast and unicast as needed.



Device Type



Passive Device (Without Software)



Active Device (With Software) & Networking device



Used in  



LAN



LAN, MAN, WAN



Table



Can’t learn or store MAC address.



Learn and store mac address on its mac table



Transmission Mode



Half duplex



Half Duplex and Full Duplex



Broadcast Domain



Hub has single Broadcast Domain and single collision domain



Switch has single broadcast domain unless creating VLANs


And each port of a switch is collision domain



Spanning-Tree



No Spanning-Tree



Many Spanning-tree Possible in the switch



Speed



10Mbps



10/100/1000 Mbps


The address used for data transmissionUses MAC address

Uses MAC address



 

Tuesday, 20 September 2016

Australia law firm bosses say Brexit will benefit their businesses

Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt.

Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit laboriosam, nisi ut aliquid ex ea commodi consequatur? Quis autem vel eum iure reprehenderit qui in ea voluptate velit esse quam nihil molestiae consequatur, vel illum qui dolorem eum fugiat quo voluptas nulla pariatur?

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe eveniet ut et voluptates repudiandae sint et molestiae non recusandae. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat.

Monday, 19 September 2016

What is Fire

Fire Safety - The rapid oxidation of a fuel evolving heat, gasses and non-ionizing radiation.The chain reaction of oxygen, fuel, and heat is called fire.Typically its comes from a chemical reaction between oxygen in the atmosphere and some sort of fuel like wood or gasoline. Of course, wood and gasoline don't impulsively catch on it just because they're surrounded by oxygen. For the combustion reaction to happen, you have to heat the fuel to its ignition temperature.



[caption id="attachment_315" align="alignleft" width="165"]fire safety BY SAJID KHATTAK[/caption]

fire safety


 


Important Note


If anyone is Missing than fire can't start.


Note – If you think your friends would find this useful, Please share it with them I’d really appreciate it.


 

Thursday, 15 September 2016

Law School? Why Waste Your Money? Just “Esquire” Yourself

Poterat autem inpune; Etsi qui potest intellegi aut cogitari esse aliquod animal, quod se oderit? Quamquam id quidem licebit iis existimare, qui legerint. Tu enim ista lenius, hic Stoicorum more nos vexat. Quod eo liquidius faciet, si perspexerit rerum inter eas verborumne sit controversia. Apud ceteros autem philosophos, qui quaesivit aliquid, tacet; Omnes enim iucundum motum, quo sensus hilaretur. Quamquam id quidem licebit iis existimare, qui legerint. Sed quia studebat laudi et dignitati, multum in virtute processerat. Primum quid tu dicis breve?

Haec para/doca illi, nos admirabilia dicamus.


Ne amores quidem sanctos a sapiente alienos esse arbitrantur. Sin autem eos non probabat, quid attinuit cum iis, quibuscum re concinebat, verbis discrepare? Hoc enim identidem dicitis, non intellegere nos quam dicatis voluptatem. Itaque hic ipse iam pridem est reiectus; Tu vero, inquam, ducas licet, si sequetur; At certe gravius. Illum mallem levares, quo optimum atque humanissimum virum, Cn. Etenim semper illud extra est, quod arte comprehenditur.

Negat esse eam, inquit, propter se expetendam. Sed virtutem ipsam inchoavit, nihil amplius. Similiter sensus, cum accessit ad naturam, tuetur illam quidem, sed etiam se tuetur; Non enim iam stirpis bonum quaeret, sed animalis. Efficiens dici potest. Ergo, si semel tristior effectus est, hilara vita amissa est?

Saturday, 10 September 2016

Comparison -Router vs Switch

Router and switch are most important devices in computer networking here we give a comparison between router vs switch which is most important to understand for the student of networking. If somebody understands the router vs switch comparison, he can manage network easily.


Definition of Router


A network device that forwards data packets from one network to another. Based on the address of the destination network in the incoming packet and an internal routing table; the router determines which port (line) to send out the packet (ports typically connect to Ethernet cables). Routers require packets formatted in a routable protocol, the global standard being TCP/IP, or simply "IP."


Definition of Switch


 A switch is a networking device that is used to connect many devices together on a computer network. A switch is working in a single network. it also connects multiple devices. The port of the switch can be managed.


Comparison Router vs Switch



  • Router work in layer 3 and switch available for both layer2 and layer3

  • Router transmit data in the shape of Packet but switch transmit data in both in frame and packets

  • Transmission type of router at Initial Level is Broadcast then Unicast & Multicast but the switch, first broadcast then unicast & multicast as needed.

  • Routers are available in different ports. ports can be added as needed and Switch is multi-port Bridge. 8/16/24/48 ports and also available in modular form

  • Router  can be used in LAN, WAN, and  Switch is mostly used for LAN

  • Router store IP address in Routing table and maintain address on its own but Switches use content accessible memory CAM table which is typically accessed by ASIC (Application Specific integrated chips).

  • The router is full duplex and the switch is working on both half and full duplex 

  • In Router, every port has its own Broadcast domain but the switch has single broadcast domain [unless VLAN implemented] and each port has its own collision domain.

  • The router is used to connect two or more networks and the switch is used to connect two or more nodes in the same network.

  • Switch and router both are intelligent devices

  • Router bandwidth sharing is Dynamic (Enables either static or dynamic bandwidth sharing for modular cable interfaces. The default percent value is 0. The percent value range is 1-96.) but the switch made sharing according to ports that can be 10; 100, 1000 and 10000 Mbps. 

  • Both speeds are 10/100/1000 Mbps

  • The router can take faster routing decisions but switch takes more time for complicated routing decisions.

  • The Routers can perform NAT but switch can't

  • In a different network environment, a router is faster than an L3 switch.

  • Example of Router as -Linksys WRT54GL Juniper MX & EX series Cisco 3900, 2900, 1900 and the Example of Switches as - Alcatel's OmniSwitch 9000; Cisco Catalyst switch 4500 and 6500 (10 Gbps)

  • The route Uses IP address and the switch uses make address

Monday, 5 September 2016

Windows Firewall

windows firewallWindows Firewall filters incoming traffic to help block unwanted network traffic. Optionally, Windows Firewall can also filter outgoing traffic to help limit the risk of malware. Although Windows Firewall’s default settings will work well with components built into Windows, they might prevent other applications from functioning correctly. Windows Firewall’s default settings can also be significantly improved to provide even stronger protection by requiring authorization or limiting the scope of allowed connections.


Why Firewalls Are Important


In networking, firewalls analyze communications and drop packets that haven’t been specifically allowed. This is an important task because connecting to the Internet means any of the millions of other Internet-connected computers can attack you. A successful compromise or attack can crash a service or computer, compromise confidential data, or even allow the attacker to take complete control of the remote computer. In the case of worms, automated software attacks computers across the Internet, gains elevated privileges, copies itself to the compromised computer, and then begins attacking other computers (typically at random).


The purpose of a firewall is to drop unwanted traffic, such as traffic from worms, while allowing legitimate traffic, such as authorized file sharing. The more precisely you use firewall rules to identify legitimate traffic, the less you risk exposure to unwanted traffic from worms.


Firewall Profiles


When you create firewall rules to allow or block traffic, you can separately apply them to the Domain, Private, and Public profiles. These profiles enable mobile computers to allow incoming connections while connected to a domain network (for example, to allow incoming Remote Desktop connections) but block connection attempts on less-secure networks (such as public wireless hotspots).


Domain


Applies when a computer is connected to its Active Directory domain. Specifically, any time a member computer’s domain controller is accessible, this profile will be applied.


Private:


Applies when a computer is connected to a private network location. By default, no networks are considered private—users must specifically mark a network location, such as their home office network, as private.


Public


The default profile applied to all networks when a domain controller is not available.
For example, the Public profile is applied when users connect to Wi-Fi hotspots at airports or coffee shops. The Public profile by default allows outgoing connections but blocks all incoming traffic that is not part of an existing connection.
Most servers will always be connected to a domain environment. To ensure consistent operation even if a domain controller is not available, configure the same firewall rules for all three profiles when configuring a server.


Creating Inbound Filters


By default, Windows Firewall (as well as most other firewalls) blocks any inbound traffic that hasn’t been specifically allowed. By default, the Public profile allows absolutely no incoming connections—this provides excellent security when connecting to public hotspots or other non-trusted networks. The Domain and Private profiles allow some incoming connections, such as connections for file and printer sharing.
If you install or enable a Windows feature that requires incoming connections, Windows will automatically enable the required firewall rules. Therefore, you do not need to manually adjust the firewall rules.
Profile Public Private Domain
Inbound Traffic Blocked Allowed Allowed
File and Print sharing Blocked Allowed Allowed
Windows component Blocked Automatically added Automatically added


Creating an Inbound Filter


If you install an application that does not automatically enable the required firewall rules, you will need to create the rules manually. You can create firewall rules using the standalone Windows Firewall With Advanced Security console.
To create an inbound filter, expand Configuration>Windows Firewall with Advanced Security and right-click Inbound Rules. Select New Rule.


Program


A rule that allows or blocks connections for a specific executable file, regardless of the port numbers it might use. You should use the Program rule type whenever possible. The only time it’s not possible to use the Program rule type is when a service does not have its own executable.


Port


A rule that allows or blocks communications for a specific TCP or UDP port number, regardless of the program generating the traffic.


Predefined


A rule that controls connections for a Windows component, such as
Active Directory Domain Services, File And Printer Sharing, or Remote Desktop.
Typically, Windows enables these rules automatically.


Custom


A rule that can combine program and port information.
Select Predefined. From the drop down list select the required service, Click Next. From the list select the required service and click Next.


Allow The Connection Allows any connection that matches the criteria you specified on the previous pages.


Allow The Connection If It Is Secure Allows connections that match the criteria
you specified on the previous pages, only if they are protected with IPsec.
Optionally, you can select the Require The Connections To Be Encrypted check box, which requires encryption in addition to authentication. Selecting the Override Block Rules check box configures the rule to take precedence over other rules that might prevent a client from connecting. If you select this rule type, the wizard will also prompt you to select users and computers that are authorized to establish this type of connection.
Block The Connection Drops any connection attempt that matches the criteria you specified on the previous pages. Because inbound connections are blocked by default, you rarely need to create this rule type. However, you might use this action for an outbound rule if you specifically want to prevent an application from initiating outgoing connections.Select the appropriate action and click Finish.


Creating an Inbound Filter – Program Rule


To create an inbound filter, expand Configuration>Windows Firewall with Advanced Security and right-click Inbound Rules. Select New Rule > Program > Next.
Then select This program path and click Browse. Select the required Program and click Open. Click Next and then select Allow the Connection and click Next. Select all Profiles and click Next. Type in a name. The new rule has now been added to the firewall.


Creating an Outbound Filter


By default, Windows Firewall allows all outbound traffic. Allowing Outbound traffic is far less risky than allowing inbound traffic. However, outbound traffic still carries some risk:
If malware infects a computer, it might send outbound traffic containing confidential data (such as content from a Microsoft SQL Server database, e-mail messages from a Microsoft Exchange server, or a list of passwords). Worms and viruses seek to replicate themselves. If they successfully infect a computer, they will attempt to send outbound traffic to infect other computers. After one computer on an intranet is infected, network attacks can allow malware to rapidly infect computers on an intranet. Users might use unapproved applications to send data to Internet resources and either knowingly or unknowingly transmit confidential data.


By default, all versions of Windows (including Windows Server 2008) do not filter outbound traffic. However, Windows Server 2008 does include outbound filters for core networking services, enabling you to quickly enable outbound filtering while retaining basic network functionality.


To create a new rule right-click Outbound Rules. In the Following example, we will create a port rule to block Limewire File sharing. Select New Rule and then Select Rule Type. For this example Select Port. Then click Next. Type in Specific Local Ports 6346 the default port for Limewire. Then click Next.
Select Block the Connection and then click Next. Select All Profiles. Then click Next. Type in Name and Description for the new rule and click Finish.


Firewall Profiles


One of the most powerful ways to increase computer security is to configure a firewall scope. Using scopes, you can allow connections from your internal network and block connections from external networks. This can be used in the following ways.
For a server that is connected to the Internet, you can allow anyone on the Internet to connect to public services (such as the Web server) while allowing only users on your internal network to access private servers (such as Remote Desktop). For internal servers, you can allow connections only from the specific subnets that contain potential users. When planning such scope limitations, remember to include remote access subnets.


For outgoing connections, you can allow an application to connect to servers only on specific internal subnets. Example as you might allow SNMP traps to be sent to only your SNMP management servers. Similarly, you might allow a network backup application to connect to only your backup servers.


You can allow specific communications for mobile computers (such as Remote Desktop) from only the subnets you use for management. For mobile computers, you can allow specific communications (such as Remote Desktop) from only the subnets you use for management. Profiles can be created for either Inbound or Outbound connections.
Right, click the rule and select Properties. Select Scope and then These IP Addresses. Fill in the IP Address and click OK. The addresses have been added. Select These IP Addresses in the remote IP address. Then click Add. Select a Predefined set of computers. Select from the drop down list. Click OK. Click OK to complete.


Authorizing Connections


If you are using IPsec connection security in an Active Directory environment, you can also require the remote computer or user to be authorized before a connection can be established. For example, imagine that your organization had a custom accounting application that used TCP port 1073, but the application had no access control mechanism—any user who connected to the network service could access confidential accounting data. Using Windows Firewall connection authorization, you could limit inbound connections to users who are members of the Accounting group—adding access control to the application without writing any additional code.
Right, click the rule to be configured and select Properties. Then select Allow only secure connections. Select Require encryption, then select Users and Computers. Select Allow only connections from these users. Click Add. Click OK to complete. The connection is now secured.


Logging for Windows Firewall


If you are ever unsure about whether Windows Firewall is blocking or allowing traffic, you should enable logging, re-create the problem you’re having, and then examine the log files.
Right-click Windows Firewall with Advanced Security. Select Properties. Click Customize. Enable logging by selecting Yes from the drop down lists and then Click OK. Logging should be enabled on all Profiles. Click OK to finish. Output in the Windows Firewall Log.
In most production environments, this log will be almost constantly written to, which could impact on system performance. You should enable logging only when actively troubleshooting a problem and then immediately disable logging when you’re done.
Identifying Network Communications


If you use Port firewall rules or if you need to configure a network firewall that can identify communications based only on port number, and the application’s documentation does not list the firewall requirements, then you can examine the application’s behavior to determine the port numbers in use.
The simplest tool to use is Netstat. On the server, run the application, and then run the following command to examine which ports are listening for active connections:
netstat -a -b.


 

Saturday, 3 September 2016

Types of Networks

There are several different types of a computer network such as local area network, Metropolitan area network and wide area network. it can be characterized with following:-




  • Size of the area covered




  • Number of users connected




  • Number and types of services available




  • Area of responsibility




Following are the different network types


Local Area Network (LAN) 


A network infrastructure that provides access to users and end devices in a small geographical area such as home network, or small business networks and a network in the same building. Following are the key points for LANs:-


typical-lan-devices



  • A limited geographic area such as home, office, and building.

  • Allow multi-access to high bandwidth media.

  • Full-time connectivity to local users.

  • Control the network under local administration privately. 

  • Connected physically to adjacent devices.


LAN Devices


Metropolitan Area Network (MAN) 


A network infrastructure that spans a physical area larger than a LAN but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization.


A metropolitan area network (MAN) is a hybrid between a LAN and a WAN. Like a WAN, it connects two or more LANs in the same geographic area. A MAN, for example, might connect two different buildings or offices in the same city. However, whereas WANs typically provide low- to medium-speed access, MANs provide high-speed connections, such as T1 (1.544Mbps) and optical services.


The optical services also provided  SONET (the Synchronous Optical Network standard) and SDH (the Synchronous Digital Hierarchy standard). With these services, carriers can provide high-speed services, including ATM and Gigabit Ethernet.  Devices used to provide connections for MANs include high-end routers, ATM switches, and optical switches



[caption id="attachment_354" align="alignnone" width="300"]typical-man Typical MAN[/caption]

 


 Wide Area Network (WAN) 


A network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a telecommunications service provider. 


Any network whose communications links cross metropolitan, regional, or national boundaries is called WAN. This is in contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to its area of responsibility.

Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. 


WAN provide access through a serial interface which is generally slow speed. Its provide full time and part time connectivity.WAN users 



[caption id="attachment_356" align="alignnone" width="477"]wide area networks devices WAN Devices[/caption]

 


Wireless LAN(WLAN) 


Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.  


 


Storage Area Network (SAN) 


A network infrastructure designed to support file servers and furthermore its provide data storage, retrieval, and replication.


 


Personal Area Network (PAN)


A Personal Area Network (PAN) is a computer network for communication between computer devices, including telephones and personal digital assistants, in proximity to an individual's body. The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters. 

Component of Network

Any network infrastructure contains three types of the component which is Devices, Media, and Services. Data takes a path from source to destination can be simple as a single connecting one device to another.


Devices and media are the physical elements, or hardware, of the network. Hardware is visible components of the network. we can touch or its take some physical place such as  PC, switch, router, wireless access point, or the cabling used to connect the devices.


Services include many of the common network applications people use every day, like email hosting services and web hosting services. Processes provide the functionality that directs and moves the messages through the network. Processes are less obvious to us but are critical to the operation of networks.


Network Component


End Devices


The network devices that majority of the people familiar with are called end devices. An end device is either the source or destination of a message or data transmitted over the network. To differentiate one end device from another, each end device on a network is recognized by an address. When an end device initiates communication, it uses the address of the destination end device to specify where the message should be sent. Laptop, Desktop, Printer, IP Phone, tablet, and telepresence are the examples of end devices.


Intermediary devices


Intermediary devices connect the individual end devices to the network.It can connect multiple individual networks to form an internetwork. These intermediary devices provide connectivity. These devices also ensure data flows across the network. Intermediary devices use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network. Router, Switch, Wireless router, and firewall are the examples of intermediary devices.


Media


The Communication Medium plays an important role in Networks. If the medium works well and properly, then the speed of transferring data is good but if the medium is not working properly, then your data would be delayed or would not be sent or even can be lost during transmission wires, Optical fiber cable and, wireless is the main components of Media

Friday, 2 September 2016

Breaking Down The Winter Break For 1Ls

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio.

[caption id="attachment_69" align="alignleft" width="200"] Shot of legal books and a wig on top of a table[/caption] Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe eveniet ut et voluptates repudiandae sint et molestiae non recusandae. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat.

Sed virtutem ipsam inchoavit, nihil amplius. Similiter sensus, cum accessit ad naturam, tuetur illam quidem, sed etiam se tuetur; Non enim iam stirpis bonum quaeret, sed animalis. Efficiens dici potest. Ergo, si semel tristior effectus est, hilara vita amissa est?

Tu enim ista lenius, hic Stoicorum more nos vexat. Quod eo liquidius faciet, si perspexerit rerum inter eas verborumne sit controversia. Apud ceteros autem philosophos, qui quaesivit aliquid, tacet; Omnes enim iucundum motum, quo sensus hilaretur.