Saturday, 28 April 2012

What is ISDN?




ISDN stands for Integrated Services Digital Network. It is a set of standards used to digital transmission of voice and data over already existing telephone line. The ISDN uses the multiplexing technique to carry three or more data signals at once through the telephone line. The data transfer speed of ISDN line is very fast than old dial-up connection. ISDN connections are more useful in applications like videoconferencing, to run online movies and upload and download heavy files. In ISDN line, both ends of connections require the ISDN modem and a special telephone set for voice communication.

Basically ISDN divides its total bandwidth into three channels. The basic two channels send data at the speed of 64 Kbps and third one at the speed of 16 Kbps. The 64 kbps channels carry data, voice, image and movies and 16 Kbps channels carry single information and link management data. A computer connected to ISDN service can use both channels. ISDN is twice as fast than a dial-up connection but not much expensive. Its data transmission speed is up to 128 Kbps.

DSL is much easier to install and provides much faster data transfer rate. ADSL connections are more useful in applications like videoconferencing, to run online movies and upload and download heavy files. This connection is ideal for today business requirements.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Friday, 27 April 2012

What is IDSL?





ISDL is a hybrid of ISDN and DSL (Digital Subscriber Line) technology that uses a little of each to deliver a service that is slightly faster than ISDN, but significantly slower than most DSL services. A person might opt for ISDL if standard DSL service is not available in his or her area.

Standard ISDN (Integrated Services Digital Network) service uses existing copper telephone lines to deliver data transfer speeds up to 128 kilobits per second (kbps). It also provides voice channels for telephone and fax, making it superior to standard dial-up, which cannot share an Internet connection with a telephone or external fax machine. Standard dial-up is also much slower than ISDN at about 53 kbps. However, ISDN is still a dial-up service, as opposed to an “always on” service like DSL.

IDSL uses the same technology as ISDN except that it routes the signals through different equipment at the Phone Company or Telco. While ISDN uses the standard switching equipment, IDSL uses DSL-like equipment. The difference is two-fold: an increase in speed to 144 kbps, and an “always on” connection.

IDSL can be expensive to set up, but may be worth it to businesses or individuals that require faster service without the option of DSL. One of the advantages of IDSL over DSL is that the former is not limited by distance from the Telco. To be a DSL subscriber, the client must be within the limit of 18,000 wire-feet (5,486 wire-meters) from the Telco hub. If the residence or business falls at the outer limits of this range, the maximum speed of the DSL connection will be significantly reduced and signal quality will not be optimal. The closer to the Telco hub, the better the DSL service. IDSL does not have this limitation, allowing clients at further distances to have an “always on” connection.

One drawback of IDSL is that it requires its own telephone line for the IDSL service, while a second line provides phone services. This makes it more expensive than ISDN.

Ascend Communications developed IDSL technology. If you think it might be the right solution for your needs, contact your local telephone company to ask about ISDN or IDSL services in your area.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Wednesday, 25 April 2012

How do I use an HD TV as my computer monitor?







How do I use an HD TV as my computer monitor?

Many modern HDTV’s include two popular options for connecting your computer. Older computers (and some recent ones) will use a connection called Dsub (or VGA), and is usually a blue tipped 15 Pin connection on the back of your computer. It uses a male to male cable VGA cable to plug into the PC on one end and the TV on the other. It only transmits video, so you’ll also need to connect an audio cable from your computers speaker port to the audio input. Dsub can be be labeled VGA, PC IN, Monitor or Dsub, depending on your TV.
Newer computers will include a HDMI output, which is a flat male to male ended cable which transmits both video and sound, and is capable of displaying at the highest resolutions. If your computer includes a HDMI connection, it is the best way to connect it to a HDTV.
Once you connect your computer you must make sure to reference your TV’s manual for the proper resolution settings for your computer, as a 720p TV or 1080p TV will have a different resolution then most typical computer monitors. You can change the resolution by going to Display in Control Panel in Windows or System Preferences > Display on a mac. It is always recommended to use the native resolution of the TV as described in the manual.



Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Thursday, 19 April 2012

What is Bluetooth Technology?







Bluetooth is a wireless technology that enables any electrical device to wirelessly communicate in the range of 2.5 GHz ISM frequency band. Mobile phones, headsets, PDA's and portable computers can communicate and send data to each other without wires or cables to link to devices together. The name of Bluetooth derived from the name of an English king Harold Bluetooth.

It a low cost, low power, radio technology, which is particularly suited to the short range Personal Area Network (PAN) application. Bluetooth Special Interest Group is authorized to develop its specifications & license.

The Main Features of Bluetooth are given below:

    It operates in the 2.4GHz frequency band without having a license for wireless communication.
    Up to 10-100 meters data can be transfer in real time.
    Close proximity & accuracy is not required for Bluetooth as in case of infrared data (IrDA) communication device. Bluetooth does not suffer from interference from obstacles such as walls while infrared suffers due to obstacles.
    Bluetooth supports both point-to-point and point-to-multipoint wireless connections without cables between mobile phones and personal computers.
    Data transfer rate of blue tooth varies from version to version. Data rate of 1 Mbps for Version 1.2 Up to 3 Mbps for Version 2.0.

Then major parts of Bluetooth system are RF transceiver, base band, and protocol stack. Bluetooth is used for small-area networking without user intervention. Due to extremely low transmission power in Bluetooth technique battery power is saved. It is a networking standard that works at two levels: 

·         Physical level.

·         Protocol level


Due to these levels mobiles have to agree on these levels when bits are sent. It decides the amount of data to be sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message sent.

Bluetooth networking transmits data through low-power radio waves. It can connect up to eight devices simultaneously. With in the range of about ten meters you must think that the devices will not interfere with each other. Bluetooth solved the problem of devices interference while sending the data by using the technique of Spread-Spectrum Frequency Hopping due to which devices may transfer data at the same frequency at the same time. The question rises here is how Bluetooth send the same data using same frequency band without devices interferences? In Bluetooth technique, transmitters change frequencies 1,600 times in every second. In this way devices can make full use of a limited band of the radio spectrum.

When Bluetooth devices came into the range of each other, conversations take place automatically. This conversation automatically determines whether they have the data to share or not. In this way Bluetooth devices not only share the data but also control the data to be transferred. When the connection is established, the devices either they are part of a computer system or a network, Bluetooth systems create a personal-area network.

The technology used in Bluetooth also provides security in three ways:

·         Pseudo-random frequency hopping,

·         Authentication,

·         Encryption.

Frequency hops make it difficult for anyone to eavesdrop. Authentication allows a user to limit connectivity to specified devices. Encryption uses secret keys to make data intelligible only to authorized parties.

Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission.

Many serious problems create only due to improper security issues. Some of them are given below:

    Blue jacking
    Blue bugging
    Car Whisperer

Blue Jacking

It is used to send a business card in the form of text message via Bluetooth to other users. It should be noted that the distance between two users is not more than 10 meters. If the user doesn't found the proper text, he should add the contact to his phone book. After saving his contact in his address book retry to send the same message. In this way the user can get business card from other user via Bluetooth. Its all because of the known destination from where the massage is being coming.

Blue Bugging

Due to this hackers can access users phone. It not only access one's mobile phone, but also use its features including placing call, messaging. Even though the user doesn't realize its happening.

Car Whisperer
Car whisper is a type of software due to which hackers can send and receive audio file from a Bluetooth-enabled car stereo. 

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Tuesday, 17 April 2012

Ten Steps to a Healthy and Easily Maintainable Wide Area Network








1.   Have a working modem attached to the maintenance port or console of your networking equipment, so your maintenance provider can quickly diagnose problems.

2.   Maintain an up-to-date cable diagram and label all cables, wall jacks, etc., so that problems can be quickly isolated and cables can be quickly identified and reconnected should they ever be disconnected.

3.   Have WAN circuit info documented and readily available (i.e. circuit id, vendor, contact, phone numbers) for sales and trouble calls.

4.   Mount equipment so it is easily accessible, front and rear.

5.   Have good power. Have your electrician put in ample outlets on a dedicated circuit. Consider a UPS or surge suppressor. Always provision additional power outlets for test equipment and for ease of expansion.

6.   Don't skimp on cables. Ensure that the cables and connectors you utilize meet the specifications for the application they are being used in. Never use a cable that does not meet the specification, even if it works in the short run. In the long run , you may very well have all kinds of problems. You may save
money in the short run, but lose a lot of time later trying to isolate a intermittent cable fault.

7.   Take anti-static precautions. If the floor in your comm. area is carpeted, install an anti-static mat.

8.   Have a telephone within easy reach of your equipment - this can be a big time saver in the event of a problem. Testing of WAN circuits often involves end-to-end tests, and point-to-network tests with the local RBOC and Common Carriers. These tests require a telephone near the equipment.

9.   Try to have your equipment in a dry, temperature-controlled, and well-lighted area.

10.  Have all cables and power cords firmly attached and/or tied down. Use plastic cable tie wraps to secure cables, and to ensure that the strain on the cable ends is minimized. Always keep cables from areas where they might be walked on, stepped on, or otherwise damaged. Improper cable strain relief and installation procedures are a common cause of network failures.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Monday, 16 April 2012

Mobile Tips and Tricks







 Tips on Mobile Maintenance  

Looking after your mobile helps to ensure it has a long and productive life.  There are 8 easy maintenance tips to help you get the best out of your mobile phone. All of the points below should also apply to your battery, charger and any other accessories.

KEEP YOUR MOBILE:

=>Charged: Ensure your battery is fully charged, and then completely run it down before recharging. Recharging too early causes your battery to run out of power more quickly. 
   
=>Secure: For security reasons, enable the PIN on your SIM Card and Phone-lock on your phone to avoid unauthorized used. These security checks will also be activated when the phone is power cycled. You can check with your carrier or the phone manual for the features and also for information on blocking your SIM card and phone IMEI number if the phone is stolen. For more information please see the Security Tips located on the AMTA Lost and Stolen website.
   
=>Protected: Make sure you use a keypad lock to lock your phone. Unplanned calls can cost a fortune and even though your phone may be in a safe place, such as in a bag, your phone will still get knocked around to a surprising degree. Rough treatment can damage electronic circuit boards so avoid dropping or unnecessarily shaking your phone.
   
=>Battery: Be safe with your batteries. Use only genuine batteries from your phone manufacturer and only buy from authorized dealers. Going for the cheap option of a counterfeit battery can be dangerous.
   
=>Clean: Don't use harsh detergents, cleaning solvents or harsh chemicals to clean your phone. Wipe only with a soft cloth.
   
=>Covered: a protective cover will help repel dust and dirt, and prevent scratches. Make sure the cover you choose is of good quality. Low quality covers with no air pockets can damage you phone by creating humidity inside the cover.
   
=>Storing your phone: Always store your phone in a dry place. Avoid rain, high humidity and liquids. All of these may contain minerals that could corrode the electronic circuits.
   
=>At the right temperature: To ensure a long life, keep your phone in a stable temperature. Avoid exposing your phone to liquid and/or exposing your phone to extreme temperature change from hot to cold and vice versa. This might create condensation and damage the phone.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Sunday, 15 April 2012

Mobile Tips and Tricks








Mobile phone viruses,  simple measures to protect yourself   

The Australian Mobile Telecommunications Association (AMTA) has developed consumer tips to assist users to protect themselves against the risk of mobile phone viruses.

This guide explains what viruses are, how they spread, and what can be done about them.

 What’s a mobile phone virus?

A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.

A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.

Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.

Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves.

What can I do to protect my phone?

The following tips can help prevent problems with viruses on your phone:

1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.

2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software. Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.

3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source.

4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.

5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Saturday, 14 April 2012

Wireless Keyboard






Choosing the Right Wireless Keyboard

Wireless keyboards come with a variety of features and in a variety of styles. Choose the shape of the keyboard which is most comfortable for your hands. Some people prefer the ergonomic keyboards. The Logitech wireless keyboard offers several styles and features, from basic to advanced. The more advanced keyboards will allow you to easily access the internet, email, online radio and media. Decide what features you will need or want, and what your budget is before you decide on a wireless keyboard.

Wireless Keyboard Range

The range of your wireless computer keyboard will depend on the type of keyboard that you have. Most wireless keyboards have to be within the line of sight of the receiver, making the range around 10 feet maximum. If you have a wireless keyboard which uses radio signals, the range could be upwards of 100 feet.

Benefits to a Wireless Keyboard

As with any wireless technology, a wireless keyboard will help reduce clutter and improve mobility. By using a wireless computer keyboard, you will not be bound to your desk at all times during use. You can simply place the keyboard on your lap and answer phones, move around, etc while you are working. Wireless computer keyboards also reduce unsightly wires and clutter in both an office and home setting.

Wireless Keyboard Troubleshooting

If your wireless computer keyboard starts acting slower then normal or does not perform optimally, there are a few things you can check. Make sure the batteries are charged or fresh. Also, make sure that the receiver, which is connected to the computer, is not blocked in some fashion. Finally, make sure that you are within the range given by the manufacturer for the wireless keyboard.

How a Wireless Keyboard Works

Similar to a wireless mouse, a wireless keyboard works by plugging a receiver into your computer via a USB or PS/2 port. The keyboard sends a signal to the receiver. If you start to notice slower performance then usual, make sure that nothing is blocking the receiver and that the batteries in the keyboard are charged.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Friday, 13 April 2012

Wireless Security




Wireless Security: Encryption

Encryption is widely used for security of data, including wireless network security. Encryption is where data is translated into code for transmission via the radio waves. An encryption key, similar to a password, is needed to encrypt the code for transfer. If you are only minimally concerned with security, such as in wireless home network security, you may consider WEP encryption, which some find easier to configure with their current equipment.

Wireless Security: Protecting your password

Your passwords are crucial to your wireless network security and should not be revealed to unauthorized individuals. Do not leave your password lying around or written in an obvious location. When entering your username and/or password, make sure people are not milling around and looking over your shoulder. Be very careful of responding to emails asking for passwords. Most legitimate companies do not ask for passwords via email due to the lack of security. These tips are useful for both wireless security and wired security.

Protect your business from online threats with the best internet security software.

Wireless Security: File Sharing

Wireless network security is important. Always make sure to require a password from users connecting to your computer. Be careful about what folders you allow others to have access to. You can also set passwords on specific folders to further increase security.

Deciding on a Firewall

The firewall you choose should be based primarily on the level of needed security, budget, reliability and the potential need to expand the wireless network. The most basic firewall, with minimal security is one that is part of a basic wireless router. The next level up is a dedicated firewall. After that comes a dedicated firewall device with a gateway. Finally, the highest level of wireless security is a dedicated firewall device (such as a computer) with a combination of proxy firewall and full packet filtering.

Wireless Security Encryption:

WEP, wired equivalent privacy, is the standard encryption security that is built into all Wi-Fi devices. WEP does not provide as good of wireless security as WPA does, but is adequate for minimal security purposes.

Wireless Security: MAC filtering

All devices on a wireless network have a MAC (media access control) address. This is a unique identification number that is part of the individual hardware. MAC filtering is where the access points on a wireless network will only speak with devices that you specify. MAC filtering is an excellent tool to use to enhance wireless security. This works great for wireless home network security, because the number of wireless devices will be manageable to work with.

Wireless Security: Firewall

A firewall is either a piece of hardware or software which is used to block outsiders from accessing a network. Firewalls are an essential part of wireless network security. It works by controlling traffic between given zones of trust. A user has the ability to determine what is trustworthy and what is not. If you are running a wireless network, you may want to consider using a firewall which is built into a wireless router.

Wireless Security: Securing your laptop

One of the benefits of a wireless network is the portability of computers. However, this can also lead to a serious wireless security risk and theft of computer. If you are traveling and using your computer in a hot spot area, do not leave it lying around outside of your eyesight. Consider investing in a cable lock, which will secure your laptop (or desktop) to a stationary object. There are higher levels of security you can look into, such as cards that sound an alarm with unauthorized movement.

Using more then one firewall

You should only run one firewall on your network. This is true for both office and wireless home network security. If you run additional firewalls, you run the risk of conflicts. However, for wireless security, you can run one hardware firewall and one software firewall. For example, you can use a wireless router for the hardware firewall and firewall software on the computer.

Wireless Security: Setting Password

Remember that your wireless home network is broadcast via radio waves, and can be accessible to anyone with range. If you do not set a password on your ad hoc network, then anyone within range can access the network. For this reason, it is crucial to set a password to protect your systems and to increase your wireless network security.

Basic Wireless Network Security

There are several basic steps that everyone should do to help ensure wireless network security. When configuring your network, change the default names on the computers and set the SSID not to broadcast. Use wired equivalent privacy (WEP) encryption at a minimum. Change all default passwords for software and hardware. Finally, make sure to run antivirus software and antispyware software on all your computers.

Choosing a good password for wireless security

There are several tips to keep in mind when choosing a good password for wireless security. Do not use your name, initials or easy to guess numbers, such as address, birthday, etc. Any password based on personal information is a poor choice. Passwords should be at least eight characters long, and includes both numbers and characters. And remember, no matter how clever your password is, if you write it down where it is easily found, it won't be very secure.


Wireless Security Encryption: WPA

WPA, Wi-Fi protected access, is an upgraded version of WEP. This newer protocol is more secure then WEP and, if you use a good password, is much tougher to crack. WPA devices are backwards compatible with WEP; however, in order to use WPA for wireless network security, all devices need to have WPA.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Thursday, 12 April 2012

WiFi Hotspots






If you want to take advantage of public WiFi hotspots or start a wireless network in your home, the first thing you'll need to do is make sure your computer has the right gear. Most new laptops and many new desktop computers come with built-in wireless transmitters. If your laptop doesn't, you can buy a wireless adapter that plugs into the PC card slot or USB port. Desktop computers can use USB adapters, or you can buy an adapter that plugs into the PCI slot inside the computer's case. Many of these adapters can use more than one 802.11 standard.
Once you've installed your wireless adapter and the drivers that allow it to operate, your computer should be able to automatically discover existing networks. This means that when you turn your computer on in a WiFi hotspot, the computer will inform you that the network exists and ask whether you want to connect to it. If you have an older computer, you may need to use a software program to detect and connect to a wireless network.
Being able to connect to the Internet in public hotspots is extremely convenient. Wireless home networks are convenient as well. They allow you to easily connect multiple computers and to move them from place to place without disconnecting and reconnecting wires. In the next section, we'll look at how to create a wireless network in your home.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Wireless Network






Office Wireless Network

A wireless network is ideal is an office environment. There is no need to worry about running cables, drilling holes, or having large closets or rooms full of cables for the office. It is cheaper to run a wireless network due to lower start up costs. If employees have laptops, it increases productivity as they can work in several locations and clients can easily hook up to the network. An office will also look more professional due to the lack of cables and wires running across the office floor.

 Wireless Network and Your Health

There have been no scientific studies to indicate that wireless signals can affect your health in a negative manner. A wireless network uses radio waves to transmit information and transmit less then an average cell phone.

Wireless Network: WLAN vs. LAN

A LAN is also known as a local area network. A WLAN is a wireless local area network. If your home or office currently uses a LAN, it can easily be converted over to a wireless network, or a wireless network can be added onto the LAN to increase portability, functionality and productivity.

Running Windows XP on a Wireless Network

If you are running Windows XP and having issues with your wireless network connection, check to see what service pack you are running. Most problems can be fixed by upgrading to service pack 2. Service pack 2 addressed an issue with it’s Wireless Zero Configuration, which affects your wireless network connection ability.

Peer to Peer Wireless Network

A peer to peer network is a network where computers talk directly to one another for the purpose of sharing files and resources. This form of network is also known as an ad hoc network. This can be set up on a wireless network without the use of an access point or router. All the computers and devices will need to have a wireless internet card and be configured to run on an ad hoc basis. You will not be able to share an internet connection on a peer to peer network.

Wireless Network Equipment

Setting up a wireless network is simple, and the equipment you will need depend on the kind of wireless network you decide to set up. For a peer to peer network, you will simply need wireless network cards for all the computers. If you are also sharing a network connection, you will need a wireless router and maybe a wireless hub, depending on the amount of devices on the network. You will also need an access point, which can be a dedicated piece of hardware, or a computer with specific software.

Benefits to a Wireless Network

There are several benefits to a wireless network, the main focus being portability. It is common for notebook computer users to use a wireless network card, which will allow them to access the internet, other computers on the network, devices, etc from anywhere within the range of the wireless network. Wireless network management can be simpler then a wired network, because adding new systems does not require wiring of an office or home, plus there are no unsightly cables to troubleshoot.

Trouble Shooting Wireless Network Problems

If your wireless network is acting sluggish or not working properly, check to make sure that all batteries are charged and working properly in your wireless devices. This includes laptop computers as well. Next, check to make sure you are within range of the access points and/or wireless router and that it is not covered with unnecessary objects. Check to make sure that all configurations are set properly and that there are no objects, such as cordless phones or microwaves in the area that can interfere with the signal.

Wireless Antenna

A wireless antenna is used to boost the increase the range of a wireless network. However, be sure to check the hardware of the wireless router or access point that you have, because not all are compatible with a wireless antenna. An alternative to boost the range is to add additional access points to the network.

Wireless Network without a Laptop

Even if you do currently own a laptop, there are benefits to considering a wireless network in your home or office. It is easy to expand and add additional computers and devices without having to special wire cables. There are no unsightly cables to look at or trip over. If you ever do purchase a laptop, it will be easy to add into the network. There are no holes to drill, no cables to string, and a wireless network can potentially be less expensive to start up and maintain then a wired one.

Switching to Wireless Network

There are several benefits to running a wireless network. You do not have the costs of running and maintaining cables and you do not need to worry about cables when designing the layout of an office area. Wireless network equipment is comparable in cost to wired equipment. Changing from a wired to a wireless network will give your employees greater freedom and can increase productivity. Clients can stop by the office and access the network, making transfer of files and data easier. Finally, wireless network management can be less complex and costly then that of a wired network.

Trouble with Access Point on Wireless Network

If you are sure that you have configured the wireless access point/wireless router exactly as stated per manufactures instructions, there is a chance the hardware is defective. While this does not happen often, make sure you save all receipts and contact customer service and tech support of the manufacture to attempt to fix the problem.

Wireless Network: Access Point Definition

An access point is a station that broadcasts wireless internet to other computers in the wireless network. An access point can be a router, computer, or special access point equipment. It can also be called a base station or hot spot.

Wireless Network: Hot Spot

A hot spot is essentially the same as an access point, but is usually found in restaurants, stores, etc, where people with Wi-Fi laptops can access the internet. Sometimes this service is free, but sometimes it is a paid service.

Wireless Network Kits

There are several wireless network kits available for setting up computers on a wireless network. These kits include a wireless router and network card.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Wireless Router




What to look for when buying a wireless router

There are a wide variety of wireless routers on the market today. The features you need will depend on the extent of your network. In general it is good to look for one that has a built in firewall for security, decent speed and the ability to act as both a wired and wireless router, and good range. Belkin routers and Linksys routers are two popular brands. For the best range and speed, look for a wireless router which uses 802.11g technology.

Sharing an internet connection with a wireless router

A wireless router hooks up directly to your cable or DSL modem via a cable. The wireless router will then transmit the broadband single to the computers with a wireless card in the range of the network. You will need to make sure that the cards are configured for the home network, same as with a wired network, but after that, you will be wire free!

Linksys wireless router

Linksys wireless routers are an excellent brand which offers many benefits to users. Linksys makes routers which use 802.11g technology, which offers increased speed and range over older standards. They offer wireless routers in a variety of price ranges so they are affordable and functional for a wide variety of wireless networks. You can also purchase a linksys router with speed booster technology to further increase network speed and productivity.

Wireless Router

A router is a device which connects one network to another. It is most used for connecting the internet (one large network) with a home or business network. Wireless routers allow you to share a broadband internet connection between several computers.

Wireless Router with Firewall

Not all wireless routers come equipped with a firewall, but it is worth investing in a router that has one. Linksys wireless routers come in a variety of prices with a variety of firewall capabilities. Depending on the security needs of your wireless network, you may want to consider getting a wireless router with sophisticated firewall technology.

Belkin wireless router

Belkin wireless routers offer excellent range and speed. One of their newest routers, the Belkin Pre-N has 8 times the range and 6 times the speed of regular 802.11g technology routers. They offer a variety of other wireless routers to meet the needs of small and large wireless network administrators.

Best Wireless Router

The best wireless router will depend on your wireless network. If you have a small network within a small range of one another, it may not be necessary to purchase the latest and greatest wireless router on the market. However, if you run an office or business and want to maintain quality speed and performance, it is in your best interest to purchase the latest technology for the wireless router.

Wireless Router Password

Most wireless routers come with a default password of admin. To maintain optimal wireless network security, it is a good idea to change this password so others will not be able to access the router, firewall, etc and hack your wireless network.

Wired and wireless router

Many wireless routers offer the ability to use both a wired and wireless network. If you are not ready, and cannot make the switch fully to a wireless network, consider purchasing a wireless router which offers both options.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Wednesday, 11 April 2012

What is Broadband?








Broadband is another communication technique in which large amount of data for example audio and video, is transmitted over long distances simultaneously. In broadband transmission, FDM (Frequency Division Multiplexing) technique is used, in which multiple signals can be transmitted simultaneously. Broadband is the bandwidth used for direct communication between very high speed in mainframe computer. This bandwidth includes satellites, fiber optics media.

What is DSL Broadband?

DSL Broadband basically a high bandwidth internet connection that can transmit and download large amounts of date or information with high speed. You can transmit data 10 times faster than a dial-up connection. We can transmit data in broadband with 512 Kbps to 10 Mbps speed and more. There are many broadband Internet connection providers are available for users but the main competitor of DSL broadband is the cable internet broadband. If the both services are available in your area then always go for DSL broadband due to its reliability and dedicated internet connection as compare to cable broadband.

Advantages and Disadvantages of DSL Broadband Internet Connection                                                

    DSL Broadband Internet data transmission speed start from 128 Kbps up to 10 Mbps.
    DSL is dedicated connection not shared with other internet user.
    DSL monthly rates are between 50$ to 100$.
    Your internet speed will depends upon the distance between your home to DSL provider.

Advantages and Disadvantages of Cable Broadband Internet Connection

    Cable Broadband Internet Connection data transmission speed is start from 64 Kbps to 30Mbps.
    Cable internet is not a dedicated connection but shared with other internet user.
    Cable monthly rates are between 30$ to 60$.
    No distance matter with Cable connection between your home to Cable provider.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Finding Cheap DSL Connection Tips






Today there are different types of  cheap DSL Internet connections available in the  market with different rates according the need of users, for example ADSL, R-ADSL, HDSL, SDSL, and VDSL. Monthly rates of DSL connection depends upon its speed and downloading or uploading traffic allowed. DSL providers offering traffic allowed up to 1 GB with basic 128 Kbps internet connection. But if you want to play online games, downloading audio or video files and uploading data, then the traffic allowed(1 GB) in one month from DSL provider will be the main issue for you. Visit the market for the best rate DSL, may be some DSL providers offering you up to 2 GB or more traffic allowed with the same rates. Almost all DSL providers offering per month connection with the same rate but you can minimize your DSL cost to share your connection on many computers using any Internet sharing software. Normally DSL connection is available on unlimited usage but you can also buy connection for certain amount of time or hourly packages to control the monthly spend. Finally, you can reduce your DSL cost to share the business internet connection with your home, if your business or home is located near. 

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Tuesday, 10 April 2012

Digital DSL Modem





The modem that is used to send and receive data to and from a digital telephone line, for example ISDN and DSL modems. These modems send and receive the digital signals to and from the digital line. These modems are available in market with USB and Ethernet ports, for single computer the USB modem is the best choice but if you want to share one DSL connection on more than two computers then you should try Ethernet port modem. DSL modems use the digital signal that is why these modems do not convert the digital signals into analog. DSL modem provide higher speed internet up to 24 Mbps downstream and 3.5 Mbps upstream. The price range of DSL modems between 60$ to 225$ but Some DSL providers offer more benefits for you with DSL connection to compete with others services provider like free modem with one year warranty. If you want your DSL working with good speed and error free then make sure there is no any joint between telephone line tower and modem line. Your DSL modem may be heat up, hang and slow, if your DSL modem continually on for 24-hours, then restart it to solve this problem.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Direct TV: TV plus DSL?





DSL can be considered an extension of phone service. Cable internet can be considered an extension of cable TV service. Direct TV DSL was at one point an extension of the DirecTV-style mini-dish satellite TV service. But it struggled to find and audience and DirecTV pulled the plug. Since then, a number of satellite internet providers have sprung up, but apparently none of them offer a TV plus DSL service. If you are interested in such a package of TV plus high speed internet, keep an eye on the internet, and write your nearest cable company, asking if they can extend service to your area. Watch tv shows online  or full length movies as an alternative to DSL channels.

Disadvantages of Direct TV DSL

More about Direct TV DSL: Though cutting edge and effective worldwide, Direct-TV DSL has many downsides. Most prohibitive of all is the cost. A dish and specialized modem must be purchased for use. This costs upwards of 500 dollars. Additionally, service fees tend to be higher than cable and DSL. Unlike wire-based systems, Direct TV DSL packages generally do not offer a fixed IP address, meaning that it is very difficult to run your own webpage over a satellite connection. Partial service outages or slowdowns can also be caused by bad weather or something blocking the dish.

Advantages of Direct TV DSL

There are many unique advantages to Direct TV DSL. Unlike regular DSL, or even cable, Direct TV DSL is available anywhere worldwide. Even ships at sea can receive broadband internet access by using it. Since the connection from source to user contains no wires, damage to phone lines does not affect service. Also, due to the relatively low numbers of users, it is essentially immune to signal slowdown due to overuse. It is also incredibly cool to show off to friends visiting your home.

 Obtaining Direct TV DSL

Direct TV DSL is available all over the world. However, it can be hard to find a provider. Unlike DSL, which is backed largely by phone companies, and cable internet, which is backed by cable internet services, Direct-TV DSL is largely provided by independent companies. A local phone directory will most likely not mention any providers. Try internet searches for best results, or asking a friend who has experience with the service.

Direct TV DSL

About Direct TV DSL: Direct TV DSL is very unlike conventional DSL. However, it is very much like direct TV. With Direct TV DSL, Internet connectivity is provided by a satellite, which broadcasts to a small dish, much like satellite TV companies use. Though sometimes called Direct-TV DSL, this service is almost entirely unlike DSL. The only real similarities are that different users link directly to a singular central point.

 Choosing Direct TV DSL

The question of whether or not to choose broadband DSL television is an important one. After all, the service costs many times what comparable-speed connections do. However, it offers a level of reliability well above that of other services. Whether it's the right choice for you might have more to do with whether or not you have access to other services than anything else. If other broadband options are not there, Direct TV DSL fills the gap nicely.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]







Monday, 9 April 2012

What is DSL?

When you connect to the Internet, you might connect through a regular modem, through a local-area network connection in your office, through a cable modem or through a digital subscriber line (DSL) connection. DSL is a very high-speed connection that uses the same wires as a regular telephone line.


Here are some advantages of DSL:
  • You can leave your Internet connection open and still use the phone line for voice calls.
  • The speed is much higher than a regular modem
  • DSL doesn't necessarily require new wiring; it can use the phone line you already have.
  • The company that offers DSL will usually provide the modem as part of the installation.
But there are disadvantages:
  • A DSL connection works better when you are closer to the provider's central office.
  • The connection is faster for receiving data than it is for sending data over the Internet.
  • The service is not available everywhere.
In this article, we explain how a DSL connection manages to squeeze more information through a standard phone line -- and lets you make regular telephone calls even when you're online.

Telephone Lines
If you know how telehones work, then you know that a standard telephone installation in the United States consists of a pair of copper wires that the phone company installs in your home. The copper wires have lots of room for carrying more than your phone conversations -- they are capable of handling a much greater bandwidth, or range of frequencies, than that demanded for voice. DSL exploits this "extra capacity" to carry information on the wire without disturbing the line's ability to carry conversations. The entire plan is based on matching particular frequencies to specific tasks.
To understand DSL, you first need to know a couple of things about a normal telephone line -- the kind that telephone professionals call POTS, for Plain Old Telephone Service. One of the ways that POTS makes the most of the telephone company's wires and equipment is by limiting the frequencies that the switches, telephones and other equipment will carry. Human voices, speaking in normal conversational tones, can be carried in a frequency range of 0 to 3,400 Hertz . This range of frequencies is tiny. For example, compare this to the range of most stereo speakers, which cover from roughly 20 Hertz to 20,000 Hertz. And the wires themselves have the potential to handle frequencies up to several million Hertz in most cases.
The use of such a small portion of the wire's total bandwidth is historical -- remember that the telephone system has been in place, using a pair of copper wires to each home, for about a century. By limiting the frequencies carried over the lines, the telephone system can pack lots of wires into a very small space without worrying about interference between lines. Modern equipment that sends digital rather than analog data can safely use much more of the telephone line's capacity. DSL does just that.
Asymmetrical DSL
Most homes and small business users are connected to an asymmetric DSL (ADSL) line. ADSL divides up the available frequencies in a line on the assumption that most Internet users look at, or download, much more information than they send, or upload. Under this assumption, if the connection speed from the Internet to the user is three to four times faster than the connection from the user back to the Internet, then the user will see the most benefit (most of the time).
Other types of DSL include:
  • Very high bit-rate DSL (VDSL) - This is a fast connection, but works only over a short distance.
  • Symmetric DSL (SDSL) - This connection, used mainly by small businesses, doesn't allow you to use the phone at the same time, but the speed of receiving and sending data is the same.
  • Rate-adaptive DSL (RADSL) - This is a variation of ADSL, but the modem can adjust the speed of the connection depending on the length and quality of the line.

Splitting the Signal and DSL Equipment

The CAP System

There are two competing and incompatible standards for ADSL. The official ANSI standard for ADSL is a system called discrete multitone, or DMT. According to equipment manufacturers, most of the ADSL equipment installed today uses DMT. An earlier and more easily implemented standard was the carrierless amplitude/phase (CAP) system, which was used on many of the early installations of ADSL.


CAP operates by dividing the signals on the telephone line into three distinct bands: Voice conversations are carried in the 0 to 4 KHz (kilohertz) band, as they are in all POTS circuits. The upstream channel (from the user back to the server) is carried in a band between 25 and 160 KHz. The downstream channel (from the server to the user) begins at 240 KHz and goes up to a point that varies depending on a number of conditions (line length, line noise, number of users in a particular telephone company switch) but has a maximum of about 1.5 MHz (megahertz). This system, with the three channels widely separated, minimizes the possibility of interference between the channels on one line, or between the signals on different lines.
The DMT System

DMT also divides signals into separate channels, but doesn't use two fairly broad channels for upstream and downstream data. Instead, DMT divides the data into 247 separate channels, each 4 KHz wide.



One way to think about it is to imagine that the phone company divides your copper line into 247 different 4-KHz lines and then attaches a modem to each one. You get the equivalent of 247 modems connected to your computer at once! Each channel is monitored and, if the quality is too impaired, the signal is shifted to another channel. This system constantly shifts signals between different channels, searching for the best channels for transmission and reception. In addition, some of the lower channels (those starting at about 8 KHz), are used as bidirectional channels, for upstream and downstream information. Monitoring and sorting out the information on the bidirectional channels, and keeping up with the quality of all 247 channels, makes DMT more complex to implement than CAP, but gives it more flexibility on lines of differing quality.
Filters

CAP and DMT are similar in one way that you can see as a DSL user.



If you have ADSL installed, you were almost certainly given small filters to attach to the outlets that don't provide the signal to your ADSL modem. These filters are low-pass filters -- simple filters that block all signals above a certain frequency. Since all voice conversations take place below 4 KHz, the low-pass (LP) filters are built to block everything above 4 KHz, preventing the data signals from interfering with standard telephone calls.
ADSL uses two pieces of equipment, one on the customer end and one at the Internet service provider, telephone company or other provider of DSL services. At the customer's location there is a DSL transceiver, which may also provide other services. The DSL service provider has a DSL Access Multiplexer (DSLAM) to receive customer connections.



The Transceiver

Most residential customers call their DSL transceiver a "DSL modem." The engineers at the telephone company or ISP call it an ATU-R. Regardless of what it's called, it's the point where data from the user's computer or network is connected to the DSL line.

Wireless DSL Router

DSL modem


The transceiver can connect to a customer's equipment in several ways, though most residential installation uses USB or 10 base-T Ethernet connections. While most of the ADSL transceivers sold by ISPs and telephone companies are simply transceivers, the devices used by businesses may combine network routers, network switches or other networking equipment in the same platform.

The DSLAM

The DSLAM at the access provider is the equipment that really allows DSL to happen. A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the Internet. DSLAMs are generally flexible and able to support multiple types of DSL in a single central office, and different varieties of protocol and modulation -- both CAP and DMT, for example -- in the same type of DSL. In addition, the DSLAM may provide additional functions including routing or dynamic IP Address assignment for the customers.
The DSLAM provides one of the main differences between user service through ADSL and through cable modems. Because cable-modem users generally share a network loop that runs through a neighborhood, adding users means lowering performance in many instances. ADSL provides a dedicated connection from each user back to the DSLAM, meaning that users won't see a performance decrease as new users are added -- until the total number of users begins to saturate the single, high-speed connection to the Internet. At that point, an upgrade by the service provider can provide additional performance for all the users connected to the DSLAM.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

Saturday, 7 April 2012

What is Internet Fax?



Internet fax is a type of online service that provides subscribers with the ability to send and receive faxes without a fax machine. Instead, Internet access and an email account is all that is required.
To use an Internet fax service, a subscriber signs up for a small monthly fee and is assigned a fax number. When a fax is sent to the subscriber's number, the service accepts the fax, turning it into a file that is forwarded to the subscriber's existing email address.
To send an Internet fax, the subscriber creates an email. The fax content can be written in the body of the email, and attachments are normally permitted. The destination fax number is entered in the "To" field, along with "@" and the Internet fax service name. For example, if the fax number were 1-550-234-5678, the email would be addressed to 15502345678@site.com. In the "Subject" field the user enters the name of the recipient, "Attn: Mr. Jam" for example.
A small toolbar, available for download from the Internet fax service, is used as a plug-in inside the email program. Clicking on the "Send" button on the toolbar sends the email to the Internet fax service. Upon receipt, an automated program converts the email to a fax format, then faxes to the number supplied in the "To" header. The recipient receives the fax normally, through his or her fax machine.
This service can be very convenient. Of the many advantages, your assigned fax number is active 24 hours a day, so that your account can accept faxes around the clock. Contrast this with using a fax machine, which relies on your phone system being free to accept a fax. For those that use one phone line for fax, telephone, and dial-up, an Internet fax service is especially handy. Internet fax services also save paper and fax toner, and do not rely on a serviceable fax machine. All faxes are sent and received as files. They can be printed by choice, but it isn't necessary.
A further advantage of an Internet fax service is that the subscriber does not need to be familiar with faxing software or fax machines. The convenience of sending and receiving faxes by using the familiar email interface appeals many people.
One of the best features of Internet fax services is that many offer toll-free fax numbers for the U.S. and Canada, so that your U.S. and Canadian clients can fax you for free. Sending faxes is also free of phone charges for the subscriber, as he or she is only sending emails.
When looking into Internet fax services, consider a service that offers a secure website. This provides a mobile "portal" to send/receive faxes while you're on the road or away from home. Confirmation of sent faxes should be standard, so you can be sure your client got your communication. The ability to send to more than one fax number at a time can also be valuable. Check for a page capacity, as some services may limit the amount of pages the subscriber can send/receive in a month.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]    
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]               
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]
 

Friday, 6 April 2012

What is the EDGE Network?



Enhanced Data rates for GSM Evolution (EDGE) (also known as Enhanced GPRS (EGPRS), or IMT Single Carrier (IMT-SC), or Enhanced Data rates for Global Evolution) is a digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM. EDGE is considered a pre-3G radio technology and is part of ITU's 3G definition. EDGE was deployed on GSM networks beginning in 2003 – initially by Cingular (now AT&T) in the United States.
EDGE is standardized also by 3GPP as part of the GSM family.
Through the introduction of sophisticated methods of coding and transmitting data, EDGE delivers higher bit-rates per radio channel, resulting in a threefold increase in capacity and performance compared with an ordinary GSM/GPRS connection.
EDGE can be used for any packet switched application, such as an Internet connection.
Evolved EDGE continues in Release 7 of the 3GPP standard providing reduced latency and more than doubled performance e.g. to complement High-Speed Packet Access (HSPA). Peak bit-rates of up to 1Mbit/s and typical bit-rates of 400kbit/s can be expected.

Technology

EDGE/EGPRS is implemented as a bolt-on enhancement for 2.5G GSM/GPRS networks, making it easier for existing GSM carriers to upgrade to it. EDGE is a superset to GPRS and can function on any network with GPRS deployed on it, provided the carrier implements the necessary upgrade.
EDGE requires no hardware or software changes to be made in GSM core networks. EDGE-compatible transceiver units must be installed and the base station subsystem needs to be upgraded to support EDGE. If the operator already has this in place, which is often the case today, the network can be upgraded to EDGE by activating an optional software feature. Today EDGE is supported by all major chip vendors for both GSM and WCDMA/HSPA.

Transmission techniques

In addition to Gaussian minimum-shift keying (GMSK), EDGE uses higher-order PSK/8 phase shift keying (8PSK) for the upper five of its nine modulation and coding schemes. EDGE produces a 3-bit word for every change in carrier phase. This effectively triples the gross data rate offered by GSM. EDGE, like GPRS, uses a rate adaptation algorithm that adapts the modulation and coding scheme (MCS) according to the quality of the radio channel, and thus the bit rate and robustness of data transmission. It introduces a new technology not found in GPRS, Incremental Redundancy, which, instead of retransmitting disturbed packets, sends more redundancy information to be combined in the receiver. This increases the probability of correct decoding.
EDGE can carry a bandwidth up to 236.8 kbit/s (with end-to-end latency of less than 150 ms) for 4 timeslots (theoretical maximum is 473.6 kbit/s for 8 timeslots) in packet mode. This means it can handle four times as much traffic as standard GPRS. EDGE meets the International Telecommunications Union's requirement for a 3G network, and has been accepted by the ITU as part of the IMT-2000 family of 3G standards. It also enhances the circuit data mode called HSCSD, increasing the data rate of this service.
EDGE modulation and coding scheme (MCS)
EDGE is four times as efficient as GPRS. GPRS uses four coding schemes (CS-1 to 4) while EDGE uses nine Modulation and Coding Schemes (MCS-1 to 9).


Coding and modulation
scheme (MCS)
Bit Rate
(kbit/s/slot)
MCS-1
8.80
GMSK
MCS-2
11.2
GMSK
MCS-3
14.8
GMSK
MCS-4
17.6
GMSK
MCS-5
22.4
8-PSK
MCS-6
29.6
8-PSK
MCS-7
43.8
8-PSK
MCS-8
54.4
8-PSK
MCS-9
59.2
8-PSK

Evolved EDGE

Evolved EDGE improves on EDGE in a number of ways. Latencies are reduced by lowering the Transmission Time Interval by half (from 20 ms to 10 ms). Bit rates are increased up to 1 Mbit/s peak bandwidth and latencies down to 80 ms using dual carriers, higher symbol rate and higher-order modulation (32QAM and 16QAM instead of 8-PSK), and turbo codes to improve error correction. And finally signal quality is improved using dual antennas improving average bit-rates and spectrum efficiency. EDGE Evolution can be gradually introduced as software upgrades, taking advantage of the installed base. With EDGE Evolution, end-users will be able to experience mobile internet connections corresponding to a 500 kbit/s ADSL service.

Networks
The Global mobile Suppliers Association (GSA) states that, as of January 2009, there were 413 GSM/EDGE networks in 177 countries, from a total of 441 mobile network operator commitments in 184 countries.


Thanks & regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation/176215539101271    @[176215539101271:0]   
http://www.facebook.com/pages/Beauty-of-islam/223983470988333?sk=wall        @[223983470988333:0]              
http://www.facebook.com/pages/Health-is-wealth/289486761065829?sk=wall        @[289486761065829:0]

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...