Tuesday, 30 October 2012

How 3G Technology Works

    
How 3G Technology Works

As every generation has been introduced with a new advanced technology, third generation (3G) is no exception. Latest developments in technology are not stunning now rather people are waiting impatiently for the newest modification and improvements and ready to go for it. 3G technology is the modified form of second generation it is better to say that all the best features of different versions of 2nd generation are combined into third generation. Resultantly 3G Technology is known as Smartphone with high data transfer rate, WiFi hotspots connectivity and multimedia features.

Three important technologies which make the 3G standard are CDMA 2000, WCDMA (UMTS), and TD-SCDMA. The prominent features after the integration of high capability technologies are like high speed data transfer rate at 3Mbps prop up the usage of internet. It’s the matter of your need now to which mode you want to switch as to PC, internet, or phone mode, simply it’s a 3 in 1. Let see the technologies used in 3G and their function how they work.

How 3G (CDMA 2000) Works

Code Division Multiple Access 2000 is approved by 3GPP2 Organization. CDMA200 hybrid with IS-95 B provides an unlimited access to IMT-200 Band as well as cdma 200 1x and ideal conditions for the highest data transfer rate. The cdma 2000 1x evolves into cdma 200 1x EV. This cdma 200 1x EV IS put into service in two different forms;

    Cdma 2000 1x EV-DO-    1X Evolution data only able to use 1.25 MHz

    Cdma 2000 1x EV-DV-     1x Evolution Data and Voice also use 1.25 MHz

All these versions are supposed to attain the highest speed for greater efficiency of the mobile phones.

How 3G (W-CDMA / UMTS) Works

3G mobile technology has been marked by the CDMA accomplishment. ETSI Alpha group develop this technology on radio access method. W-CDMA offers challenges in shapes of versatility and complexity of its design. Its multifaceted single algorithm made the complete system more difficult hence the receiver becomes a more complex device. It provides friendly environment to the multi-users with greater simulation and broader interface able to transfer data with time variations.


UMTS network group is experimenting on this new technology to maintain previous 2G module features and the added features as well in 3G.

How 3G (TD-SCDMA) Works

Developed by China Wireless Telecommunication Standard group TD-SCDMA is approved by the ITU. This technology is based on time synchronization with CDMA. This time division is based on duplex approach where uplink and downlink traffic transmit in different time slots. This synchronization gives flexibility to the spectrum for uplink and downlink transmission depending on symmetrical or asymmetrical information. Asymmetrical information comprises e-mail and internet applications while call system comes under symmetrical information. During asymmetrical applications downlink is given preference over uplink. Preference is given to uplink during telephony.


3G Mobile technology is providing 144 kbps connectivity speed which is the highest one in the present era. It is offering wireless broadband facility an entertainment opportunity of downloading music and videos, games with 3D effects and conference calls with video facility.


Based on the services, feature plans and areas with the 3G coverage there are many carriers who are providing it. It is still not fully accessible in all the countries so limitations hinder the availability. The real 3G technology can be enjoyed with a new mobile phone set and the 3G service pack.

 
All the three technologies mentioned above are working in 3G at their best. Now everyone is looking forward with expected amazement for the 4G standard as they have for sure belief on the further advancement in the field of telecommunication already reaches the peak of cellular technology.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

What is 3G Technology?


    
3G Technology

If you want augmented bandwidth, multiple mobile applications and clarity of digital signals, then 3G (Thrid Generation Technology) is your gateway. GSM technology was able to transfer circuit switched data over the network. The use of 3G technology is also able to transmit packet switch data efficiently at better and increased bandwidth. 3G mobile technologies proffers more advanced services to mobile users. It can help many multimedia services to function. The spectral efficiency of 3G technology is better than 2G technologies. Spectral efficiency is the measurement of rate of information transfer over any communication sytem. 3G is also known as IMT-2000.

3G technology and 3g Technologies characteristics

3G technologies make use of TDMA and CDMA. 3G (Thrid Generation Technology) technologies make use of value added services like mobile television, GPS (global positioning system) and video conferencing. The basic feature of 3G Technology (Thrid Generation Technology) is fast data transfer rates. However this feature is not currently working properly because, ITU 200 is still making decision to fix the data rates. It is expected that 2mbit/sec for stationary users, while 348kbits when moving or traveling. ITU sell various frequency rates in order to make use of broadband technologies. Network authentication has won the trust of users, because the user can rely on its network as a reliable source of transferring data.3G technology is much flexible, because it is able to support the 5 major radio technologies. These radio technologies operate under CDMA, TDMA and FDMA.CDMA holds for IMT-DS (direct spread), IMT-MC (multi carrier). TDMA accounts for IMT-TC (time code), IMT-SC (single carrier). FDMA has only one radio interface known as IMT-FC or frequency code. Third generation technology is really affordable due to the agreement of industry. This agreement took pace in order to increase its adoption by the users. 3G (Thrid Generation Technology) system is compatible to work with the 2G technologies. 3G (Thrid Generation Technology) technologies holds the vision that they should be expandable on demand. The aim of the 3G (Thrid Generation Technology) is to allow for more coverage and growth with minimum investment.

3G technologies (Third Generation Technologies)

There are many 3G technologies as W-CDMA, GSM EDGE, UMTS, DECT, WiMax and CDMA 2000.Enhanced data rates for GSM evolution or EDGE is termed to as a backward digital technology, because it can operate with older devices. EDGE allows for faster data transfer than existing GSM.EDGE was introduced by AT& T in 2003.EDGE has increased the GSM coverage up to three times more. EDGE is a 3G Technology (Thrid Generation Technology); therefore it can be used for packet switched systems. Universal mobile telecommunications systems .UMTS conforms to ITU IMT 2000 standard. It is complex network and allows for covering radio access, core network and USIM (subscriber identity module). It is a relatively expensive technology for the network operators because it requires new and separate infrastructure for its coverage. The GSM is the base of this technology. CDMA is also referred to as IMT-MC. this technology is close to 2G technology GSM because it is also backward compatible. Digital enhanced cordless telecommunications (DECT) is another 3G Technology (Thrid Generation Technology). DETC was developed by European telecommunications standards institute; however it is now widely popular in the other countries of the world as well. It runs over a frequency of 1900Mhz. WiMax is a 3G Technology (Thrid Generation Technology) and it is referred to as worldwide interoperability for microwave access. It is a wireless technology. It transmits variety of wireless signals. It can be operated on the multi point and point modes. it is portable technology. This technology is based on the wireless internet access. Name of the WiMax was developed in 2001 by WiMax forum. This technology removes the need for wires and is capable enough to provide 10mbits/sec. it can connect you to hotspot.
 
 
Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Monday, 29 October 2012

How 2G Works

How 2G Works
   
How 2G Technology Works

Advancement in mobile phones technology has been marked by generation (G). Analog phones are related to the 1st generation (1G), and then come digital phones marked by second generation (2G). This second generation mobile phones has changed the concept of mobile phones by introducing high data transfer rate, increased frequency band and wireless connectivity.

There are three different types of technologies in the second generation these are FDMA (Frequency Division Multiple Access), TDMA (Time Division Multiple Access) and CDMA (Code Division Multiple Access). All types have one common feature of multiple access which means that many users are able to use the same number of cells. First part of all the technologies makes difference.


Because of different types of technologies utilizes in 2G mobiles, there are different types of mobiles according to the technology incorporate in them. Let see the 2G technologies use in mobiles and their functions as they work.

How 2G (FDMA) Works

Frequency Division Multiple Access (FDMA) enables the calls to use different frequency by splitting it into small cells. Each call uses different frequency. The phenomenon is same as in radio where different channels broadcast on separate frequency. So every radio station has been assigned different frequency according to the specific band available. FDMA is best in case of analog transmission but also support digital transmission. No doubt it is accommodating to the digital signals yet with poor service.

How 2G (TDMA) Works

Different technologies are categorized in second generation’s TDMA standard according to the different time zones indifferent countries in the world. These technologies are

GSM (Global System for Mobile Communication) nearly used in the whole world.

IDEN (Integrated Digital Enhanced Network) is introduced by Motorola used in US and Canada.

IS-136 (Interim Standard-136) also known as D-AMPS (Digital Advanced Mobile Phone System) prevail in South and North America.

    PDC (Personal Digital Cellular) is used in Japan.

TDMA is a narrow band of 30 KHz wide and 6.7 millisecond long. It is divided into three slots of time. Using the CODEC, stands for Compression / Decompression algorithm, compresses the digital information and use less space leaving for the other users. Division of this narrow band into three time slots increases the capacity of frequency band. TDMA supports both frequency bands IS-54 and IS-136. GSM (TDMA) is a different standard and provide basis for IDEN and PCS. Being an international standard, it covers many countries of the world. There is only the need for changing the SIM and you can get connected no need to buy a new phone. Having two different bands

    900-1800 MHz band covers Europe and Asia

    850-1900 MHz band covers United State  

First band is in sync widely but second is limited to the United State. It is better to go for the first one if you need to go on extensive traveling.

How 2G (CDMA) Works

Contrary to TDMA, CDMA works in a singular way. Like TDMA, It also converts the information into digital data and sends it. Now the information is extended upon the bandwidth. Incoming calls are spread over the surface of the channel and a code is allocated to them. As the data is spread over the surface of channel it is known as spread spectrum. It compresses the data into small packets and sends it to a separate frequency columns.

Every caller sends out data to a similar spectrum. Every caller’s signals are spread over the channel having a unique code. Reaching at the receiving point, codes are to be matched and hence data delivers. CDMA refers to the GPS standard for marking the time stamp on the broadcast signals. CDMA supports Interim Standard (IS-95) and operational at the frequency bands of 800 MHz and 1900 MHz.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Sunday, 28 October 2012

Finding the Right Career

Finding the Right Career
Choosing or Changing Career Paths

Whether you’re just leaving school, finding opportunities limited in your current position or, like many in this economy, facing unemployment, it may be time to consider your career path. Regardless of your reasons, the right career is out there for everyone. By learning how to research options, realize your strengths, and acquire new skills, as well as muster the courage to make a change, you can discover the career that’s right for you.

Finding meaningful work in today’s world

You may have fallen into the trap of thinking the sole point of work is to bring home enough money to live comfortably. While adequate compensation is important in any job, it’s not the whole story. If you are unsatisfied with what you do every day, it takes a toll on your physical and mental health. You may feel burned out and frustrated, anxious, depressed, or unable to enjoy time at home knowing another workday is ahead. What’s more, if you don’t find your work meaningful and rewarding, it’s hard to keep the momentum going to advance in your career. You are more likely to be successful in a career that you feel passionate about.

Whether you’re looking to enter the work force for the first time or contemplating a career change, the first step to choosing a fulfilling career is to uncover the activities that get you excited and bring you joy.
Discovering new possibilities

The first step in considering a career change is to think carefully about what really drives you. You might find it hard to get past thinking about “what pays the most” or “what is most secure,” especially in today’s economy. However, it’s important to first discover your primary interests and passions. This can open doors to careers that you might not have considered. Once you have that foundation, you can start fine tuning your search for the right career. You may be surprised at how you can fit your passions into a new career.

Overcoming obstacles to career happiness

It’s always challenging to consider a huge change in your life, and there may be many reasons why you think changing careers is not possible. Here are some common obstacles with tips on how to overcome them:

=>It’s too much work to change careers. Where would I ever begin? Changing careers does require a substantial time investment. However, remember that it does not happen all at once. If you sit down and map out a rough plan of attack, breaking down larger tasks into smaller ones, it is a lot more manageable than you think. And if the payoff is a happier, more successful career, it’s worth it.
  
=>I’m too old to change careers. I need to stay where I am. If you have worked for a number of years, you may feel that you’ve put too much time and effort into your career to change midstream. Or you may be concerned about retirement and health benefits. However, the more you’ve worked, the more likely you are to have skills that can transfer to a new career. Even if you are close to receiving a pension or other benefits, you can start to plan now for a career transition after retirement.
  
=>I don’t have enough skills to consider a new career. You may be unaware of the skills you have, or low self-esteem may lead you to underestimate your marketability. Either way, you probably have more skills than you think. Consider skills you’ve learned not only from your job but also from hobbies, volunteering, or other life experiences. And gaining skills is not an all-or-nothing proposition. You can volunteer once a week or take a night class to move forward, for example, without quitting your current job.
  
=>In this economy, I’m lucky to have a job. I don’t want to rock the boat. In today’s climate, it might feel like too much of a risk to consider changing careers. However, if you’re unhappy in your current job, doing research on other options will only benefit you in the long run. You may discover a career with a more stable long-term outlook than your current career, for example. And you don’t have to quit your current job until you are confident of your new career path.

Finding the right career tip 1: Identify occupations that match your interests

So how do you translate your interests into a new career? With a little research, you may be surprised at the careers that relate to many of the things you love to do.
Career tests

Different online tools can guide you through the process of self-discovery. Questions, quizzes, and personality assessments can’t tell you what your perfect career would be, but they can help you identify what’s important to you in a career, what you enjoy doing, and where you excel. One example, frequently used by universities and the U.S. government, is the RIASEC/Holland interest scale. It outlines six common personality types, such as investigative, social, or artistic, and enables you to browse sample careers based on the type of personality you most identify with. Find links to this and other online career tests in the Resources section below.
Researching specific careers

If you have narrowed down some specific jobs or careers, you can find a wealth of information online, from description of positions to average salaries and estimated future growth. This will also help you figure out the practical priorities: How stable is the field you are considering? Are you comfortable with the amount of risk? Is the salary range acceptable to you? What about commute distances? Will you have to relocate for training or a new job? Will the new job affect your family?
Get support and information from others

Get support and information from othersWhile you can glean a lot of information from research and quizzes, there’s no substitute for information from someone currently working in your chosen career. Talking to someone in the field gives you a real sense of what type of work you will actually be doing and if it meets your expectations. What’s more, you will start to build connections in your new career area, helping you land a job in the future. Does approaching others like this seem intimidating? It doesn’t have to be. Networking and informational interviewing are important skills that can greatly further your career.

You may also consider career counseling or a job coach, especially if you are considering a major career shift. Sometimes impartial advice from others can open up possibilities you hadn’t considered.

Finding the right career tip 2: Evaluate your strengths and skills

Once you have a general idea of your career path, take some time to figure out what skills you have and what skills you need. Remember, you’re not completely starting from scratch—you already have some skills to start. These skills are called transferable skills, and they can be applied to almost any field. Some examples include:

    management and leadership experience
    communication (both written and oral)
    research and program planning
    public speaking

    conflict resolution and mediation
    managing your time effectively
    computer literacy
    foreign language fluency

Tips for discovering your transferable career skills

=>Don’t limit yourself to experiences only at work. When you are thinking about your skills, consider all types of activities including volunteering, hobbies, and life experiences. For example, even if you don’t have formal leadership or program planning experience, founding a book club or organizing a toy drive are ways that you have been putting these skills into practice.
  
=>List your accomplishments that might fit in. Don’t worry about formatting these skills for a resume at this point. You just want to start thinking about what skills you have. It can be a tremendous confidence booster to realize all of the skills you’ve developed.
  
=>Brainstorm with trusted friends, colleagues, or mentors. They may be able to identify transferable skills you’ve overlooked or help you better articulate these skills in the future.
  
=>Uncover more transferable skills by taking the online tests listed in the Resources section below.

Finding the right career tip 3: Develop your skills and experience

If your chosen career requires skills or experience you lack, don’t despair. There are many ways to gain needed skills. While learning, you’ll also have an opportunity to find out whether or not you truly enjoy your chosen career and also make connections that could lead to your dream job.
Gaining career skills:

=>Utilize your current position. Look for on-the-job training or opportunities to do projects that develop new skills. See if your employer will pay part of your tuition costs.
  
=>Identify resources in the community. Find out about programs in your community. Community colleges or libraries often offer low cost opportunities to strengthen skills such as computers, basic accounting, or how to start a business. Local Chambers of Commerce, Small Business Administrations, or state job development programs are also excellent resources.
  
=>Volunteer or work as an intern. Some career skills can be acquired by volunteering or doing an internship. This has the added benefit of getting you in contact with people in your chosen field.
  
=>Take classes. Some fields require specific education or skills, such as an educational degree or specific training. Don’t automatically rule out more education as impossible. Many fields have accelerated programs if you already have some education, or you may be able to do night classes or part-time schooling so that you can continue to work. Some companies even offer tuition reimbursements if you stay at the company after you finish your education.

Finding right career tip 4: Consider starting your own business

If you’re getting worn down by a long commute or a difficult boss, the thought of working for yourself can be very appealing. And even in a slower economy, it’s still possible to find your perfect niche. Depending on the specialty, some companies prefer to streamline their ranks and work with outside vendors. However, it is especially important to do your homework and understand the realities of business ownership before you jump in.

=>Make sure you are committed to and passionate about your business idea. You will be spending many long hours getting started, and it may take a while for your business to pay off.
  
=>Research is critical. Take some time to analyze your area of interest. Are you filling an unmet need? Especially if you are considering an online business, how likely is your area to be outsourced? What is your business plan, and who are your potential investors? Learn more in the Resources section below.
  
=>Expect limited or no earnings to start. Especially in the first few months, you are building your base and may have start-up costs that offset any profit initially. Make sure you have a plan on how to cope during this period.

Final tips for career changers

=>Pace yourself and don’t take on too much at once. Career change doesn’t happen overnight, and it is easy to get overwhelmed with all the steps to successfully change careers. However, you will get there with commitment and motivation. Break down large goals into smaller ones, and try to accomplish at least one small thing a day to keep the momentum going.
  
=>Don’t rush into a change because of unhappiness in your current job. If you are stressed and unhappy in your current job, or unemployed, you might be feeling a lot of pressure to make a quick change. However, if you don’t do enough research, you might end up in an even worse position than before, with the added stress of a new position and new learning curve.
  
=>Ease slowly into your new career. Take time to network, volunteer, and even work part-time in your new field before committing fully. It will not only be an easier transition, but you will have time to ensure you are on the right path and make any necessary changes before working full-time in your new field.
  
=>Take care of yourself. You might be feeling so busy with the career transition that you barely have time to sleep or eat. However, managing stress, eating right, and taking time for sleep, exercise, and loved ones will ensure you have the stamina for the big changes ahead.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Saturday, 27 October 2012

What is 2G Technology?

  
2G Technology, Second Generation Technology

Second generation (2g) telephone technology is based on GSM or in other words global system for mobile communication. Second generation was launched in Finland in the year 1991.

How 2G works, Uses of 2G technology (Second Generation technology)

2G network allows for much greater penetration intensity. 2G technologies enabled the various mobile phone networks to provide the services such as text messages, picture messages and MMS (multi media messages). 2G technology is more efficient. 2G technology holds sufficient security for both the sender and the receiver. All text messages are digitally encrypted. This digital encryption allows for the transfer of data in such a way that only the intended receiver can receive and read it.

2G Technologies (Second Generation Technologies)

Second generation technologies are either time division multiple access (TDMA) or code division multiple access (CDMA). TDMA allows for the division of signal into time slots. CDMA allocates each user a special code to communicate over a multiplex physical channel. Different TDMA technologies are GSM, PDC, iDEN, iS-136.CDMA technology is IS-95. GSM has its origin from the Group special Mobile, in Europe. GSM (Global system for mobile communication) is the most admired standard of all the mobile technologies. Although this technology originates from the Europe, but now it is used in more than 212 countries in the world. GSM technology was the first one to help establish international roaming. This enabled the mobile subscribers to use their mobile phone connections in many different countries of the world’s is based on digital signals ,unlike 1G technologies which were used to transfer analogue signals. GSM has enabled the users to make use of the short message services (SMS) to any mobile network at any time. SMS is a cheap and easy way to send a message to anyone, other than the voice call or conference. This technology is beneficial to both the network operators and the ultimate users at the same time.

Another use of this technology is the availability of international emergency numbers, which can be used by international users anytime without having to know the local emergency numbers. PDC or personal digital cellular technology was developed in Japan, and is exclusively used in JAPAN as well. PDC uses 25 KHz frequency. Docomo launched its first digital service of PDC in 1993.integrated digital enhanced network (iDEN) was developed by MOTOROLA, as a major mobile technology. It enabled the mobile users to make use of complex trunked radio and mobile phones. iDEN has a frequency of about 25Khz.i DEN allows three or six user per mobile channel.iS-136 is a second generation cellular phone system. It is also known as digital AMPS. D-AMPS were widely popular in America and Canada. However now it is in the declining phase. This technology is facing a strong competition by GSM technologies.  Now the network carriers have adopted GSM and other CDMA 2000 technologies at large. Interim standard 95 is a first and the foremost CDMA cellular technology. It is most famous by its brand name known as cdmaOne. It makes use of the CDMA to transfer the voice signals and data signals from cellular phones to cell sites (cell sites is cellular network).

Benefits of 2G technology (Second Generation)

Digital signals require consume less battery power, so it helps mobile batteries to last long. Digital coding improves the voice clarity and reduces noise in the line. Digital signals are considered environment friendly. The use of digital data service assists mobile network operators to introduce short message service over the cellular phones. Digital encryption has provided secrecy and safety to the data and voice calls. The use of 2G technology requires strong digital signals to help mobile phones work. If there is no network coverage in any specific area, digital signals would be weak. 

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth
      

Mobile Communication Technologies

Mobile communication allows transmission of voice and multimedia data via a computer or a mobile device without having connected to any physical or fixed link. Mobile communication is evolving day by day and has become a must have for everyone. Mobile communication is the exchange of voice and data using a communication infrastructure at the same time regardless of any physical link.

Mobile communication technologies not only benefiting businesses to perform their operation faster and efficiently but also raising the standard of human lives.  Mobile communication or mobile computing is just the two different names for the ability to use the mobile technology while on the move, most of the portable computers and computing equipment which are particular for the use in stationary place or configuration.

Ever since the population has been increasing, it urges the need for communication. Human beings are constantly busy to build up the easiest and the quickest way to communicate. Advancement in technology as the invention of telephone is one of such examples. Every coming generation is marked with one step ahead. Bigger telephones continuously passes through the modification process till the first mobile phone introduced. This journey of mobile communication technology started from late nineties with the 1st generation mobile technology has now reached till 3rd generation totally changes the canvas of communication mode. Third generation of the mobile phones virtually shrink distant places of the earth into a global village.

There are so many types of mobile computers, such as laptops, PDAs, PDA phones and other mobility devices were introduced in the mid of 1990s including wearable technology as well. And to use these types of mobility equipments we need to use right technology to make it more secure and reliable infrastructure.  If we talk about the mobile communication technologies we can count on many mobile technologies available today such as 2G, 3G, 4G, WiMAX, Wibro, EDGE, GPRS and many others.

Mobile computing or mobile communication technologies based on different security standards and as well as the transmission protocol behind it. In this section we have discussed in detail about different mobile computing technologies and mobile communication systems. What makes mobile communication or mobile computing different fromThanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth other wired and wireless technologies.


Friday, 26 October 2012

How to see hidden files in Windows 8

Introduction
Windows 8 hides certain files so that you are not able to view them while exploring the files and folders on your computer. Windows has two types of files that Windows will classify as hidden and hide from the user. The first type are actually hidden files, which are ones that are given the +H attribute or specified as Hidden in a file or folder's properties. The second type of file are System files, which are files that are required for the proper operation of Windows 8 as thus are hidden so that they are not changed or deleted by accident.
There are times, though, that you need to see the files that are hidden on your computer. Whether it is because malware has created them and set them to be hidden or you need to repair a problem on your computer that requires you to view Hidden or System files. Due to this it can be beneficial at times to be able to see all files, including hidden ones, that may be on your computer. This tutorial will explain how to show all hidden files in Windows 8.
 
How to show Hidden files in Windows 8
If you just need to see hidden files and you do not wish to see the files that are classified as Windows 8 System files, then please follow these steps. Please note that this is the recommended setting if you wish to see just hidden files.
  1. From the Windows 8 Start Screen, select the Windows Explorer app as shown by the black arrow in the image below.


    Metro User Interface Start Screen


     
  2. When Windows Explorer, please single-click on the View tab. Once you click on this tab, you will be shown a screen similar to the one below.


    Windows Explorer


     
  3. In this screen, put a check mark in the checkbox labeled File name extensions and Hidden items.
     
  4. You can now close Windows Explorer.
You will now see hidden files and a filename's extension.
 
How to view Hidden and System files in Windows 8
If you need to see system and hidden files in Windows 8, then please follow these steps:
  1. From the Windows 8 Start Screen, select the Control Panel app as shown by the black arrow in the image below.


    Metro User Interface Start Screen


     
  2. When the Control Panel opens, scroll to the very bottom and select the More Settings option. This will open the traditional Windows Control Panel.
     
  3. When the Control Panel opens you will see a screen similar to Figure 1 below.


    Figure 1. Windows 8 Control Panel
    Figure 1. Windows 8 Control Panel


     
  4. Click on the Appearance and Personalization link.
     
  5. You will now be in the Appearance and Personalization control panel as shown in Figure 2 below.


    Figure 2. Windows 8 Appearance and Personalization screen
    Figure 2. Windows 8 Appearance and Personalization screen


    Now click on the Show hidden files and folders option under the Folder Options category as shown by the red arrow in Figure 2 above.
     
  6. Under the Hidden files and folders section select the radio button labeled Show hidden files, folders, and drives.
     
  7. Next, remove the check mark from the checkbox labeled Hide extensions for known file types. This will make it so that you will see the full filename and their extensions.
     
  8. Finally, remove the check mark from the checkbox labeled Hide protected operating system files (Recommended). This will allow you to see files that have been flagged with the +S attribute, which causes them to be considered System files by Windows. By default Windows will not allow you to see System files unless you uncheck this checkbox.

    Once this is done, your Folder Options screen should look similar to the following image.


    Figure 3. Folder Options screen
    Figure 3. Folder Options screen

     
  9. Press the Apply button and then the OK button.
     
  10. You can now close the Windows 8 Control Panel.
You will now be able to see all Windows 8 system files and any files that have been marked as hidden on your computer. To reverse these changes, simply go back into the Folder Options screen as described above and change the settings to Don't show hidden files, folder or drives and uncheck Hide extensions for known file types and Hide protected operating system files (Recommended).
 
Conclusion
Without a doubt, being able to view any and all the files on your computer is an immensely useful tool when troubleshooting Windows problems. Using the instructions above you can enable the viewing of all hidden and system files so that you can properly troubleshoot your issues, and when finished, revert them back to Windows' default settings.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Saturday, 20 October 2012

Understanding and Using Firewalls

Introduction
The Internet is a scary place. Criminals on the Internet have the ability to hide behind their computers, or even other peoples computers, while they attempt to break into your computer to steal personal information or to use it for their own purposes. To make matters worse, there always seems to be a security hole in your software or operating system that is not fixed fast enough that could potentially allow someone to hack into your computer. Where does this leave you? Are you supposed to cancel your Internet access, or is there something you can do to protect yourself?
The answer is that you can protect yourself with a firewall. In the past, firewalls were expensive pieces of hardware that only companies would use. Most people were not on the Internet, and if they were they were connected via a dial up which is not fast enough for most hacker's purposes. Therefore, hackers predominantly targeted companies who normally had larger pools of available bandwidth. Now with almost everyone being able to connect to the Internet, and many with extremely fast and cheap bandwidth, hackers tend to target the home user as they are more apt to not secure their computers properly thus becoming an easy target. With this in mind developers have created cheap but powerful home firewall solutions for the home users to protect themselves.
This tutorial will help to increase your knowledge on how to protect yourself with a firewall so you are not an easy target to hackers and viruses in the future.
The Firewall
A firewall is a hardware device or software application that sits between your computer and the Internet and blocks all Internet traffic from reaching your computer that you have not specifically requested. What this means is that if you browse to a web site, the firewall will allow the traffic from that web site to reach your computer and therefore yourself. On the other hand, if you did not request information from that web site, and the web site sent traffic to you, it would be denied from reaching your computer because you did not specifically ask for it. This behavior can be changed if you wish, and we will discuss that further in the document.
Firewalls for the home user can either be a piece of hardware or a piece of software. The differences will be discussed below.
A Hardware Firewall is a device that sits between your Internet connection and the rest of the computers plugged into it. These firewalls usually come with a built in hub that allows you to connect multiple computers to it in order for them all to be able to share one Internet connection. These firewalls provide protection to all the computers connected to it using a technology called Network Address Translation, or NAT. This protection is performed by all the protected machines using private IP addresses, such as 192.168.1.X, that can not be reached via the Internet. The firewall then convert these internal IP addresses to the single public IP address that is assigned to the firewall. This makes it so that your hardware firewall accepts all incoming requests you asked for and then forwards them on to the requesting internal computer. Using this method, outside machines are never able to connect directly to your computers.
A Personal Firewall is a piece of software installed on each computer that needs to be protected. This software then filters all incoming, and sometimes outgoing traffic, and only allows only data that has been requested or explicitly allowed to pass through. Personal firewalls tend to be more feature rich than hardware versions, but they do not have the ability to allow you to share your Internet connection with multiple computers on the network.
The decision as to which type of firewall to use depends on what you plan on using it for. If you would like to protect just one computer, then a personal software based firewall is more than adequate. If you would like to protect multiple computers, then a hardware based solution may be most cost effective. Some people even state that you should use both a hardware firewall to protect your network and a personal firewall that further protects your computer. Though this is not a bad idea, it may be cost prohibitive for many users. If money is not an option, then using both will add an extra level of security as well as provide you with the greater functionality found in personal firewalls.
For the rest of this tutorial we will predominantly focus on personal firewalls that are installed on your computer, though many of the topics discussed here apply to hardware firewalls as well.
Firewall Features
When choosing your firewall it is important to pay attention to what features they offer you as these features can make a large difference in how your computer is protected. For some people certain features are more important than others, but in terms of security the most important are inbound and outbound filtering, application protection, notifications, and stealth mode. These features and others will be discussed below:
Inbound and Outbound Filtering
Filtering is when a firewall examines information passing through it and determines if that information is allowed to be transmitted and received or should be discarded based on rules or filters that have been created. This is the primary function of a firewall and how it handles these tasks is very important for your security. Most people feel inbound filtering, which is the processing of inbound data towards your computer, is the most important function of a firewall. Outbound filtering, though, plays just as an important role for securing your computer. You may have had malware installed on your computer without your knowledge, and suddenly when you install a firewall with outbound filtering, you will find that software on your computer is attempting to transmit data to a remote host somewhere on the Internet. Now, not only do you know that this software is installed, but the outbound filtering stopped it from passing on private information.
These filters can also be modified to allow certain computers on the Internet to reach your computer or for certain applications on your computer to transmit data to the Internet. How these rules should be modified is determined by your needs. For example if you would like remote users to be able to connect to you remotely using remote desktop you will need to open up the port associated with Remote Desktop, which is tcp port 3389, in order for your firewall to allow that traffic to flow through. An example of this can be seen below where a particular remote computer is given permission to access the computer behind the firewall.

Figure 1. Example of a Firewall allowing a remote computer access to a computer behind a firewall

Stealth Mode
It is important for your firewall to not only block requests to reach your computer, but to also make it appear as if your computer does not even exist on the Internet. When you are connected to the Internet and your computer can not be detected via probes to your computer, you are in what is called Stealth mode. Hackers have the ability to detect if you are on the Internet by probing your machine with special data and examining the results. When you are in Stealth mode the firewall does not send this information back making it seem like you are not even connected. Due to this hackers will not continue targeting your computer as they will think you are not online.
Privacy protection
Many firewalls now have the ability to block spyware, hijackers, and adware from reaching your computer. This allows you to protect your computer from being infected with software that is known to reveal private information about what you do on the Internet or other computing habits. These features are usually bundled into the commercial versions of the firewall software packages.
Application Integrity
Application Integrity is when the firewall monitors the files on your computer for modification in the file or how they are launched. When it detects such a change it will notify the user of this and not allow that application to run or transmit data to the Internet. Many times these modifications may have been part of an upgrade, but if it was modified by a malicious program you will now be made aware of it.
Intrusion detection
Intruders use various methods to penetrate the security of your computer. Intrusion detection scans incoming data for signatures of known methods and notifies you when such attacks are recognized. This allows you to see what means a hacker is trying to use to hack your computer.
Notifications
Notifications allow you to see the activity of what is happening on your firewall and for the firewall to notify you in various ways about possible penetration attempts on your computer.
Firewall Monitoring and Good Practice
Monitoring
Regardless of the firewall you use it is good practice to monitor the firewall logs occasionally. With good monitoring of your logs you will increase your security immediately. Statistically most hacks could have been avoided if people monitored their logs as most hackers will probe a computer before they hack it. If an administrator of the computer had noticed these probes, they may have been able to determine if their computers were vulnerable to what was being probed for. When you first install your firewall and examine the logs you will be simply amazed as to the amount of people who are attempting to access your computer without your knowledge.
There are three main reasons for monitoring your log files and are discussed below:
Preventative Measures: By monitoring the logs of your firewall you can see what ports and services hackers are attempting to exploit. You can then use this information to make sure your computer is secure from these exploits. For example, if you notice on your logs that many people are scanning your computer for port 3127 and did some research, you will find that it could be that people or viruses are looking for backdoors into your computer left by an early variant of the MyDoom virus. You can then make sure your computers are not affected by this potential exploit.
Forensics: If your computer gets compromised by a remote computer, and you find the files placed on your computer by the hacker you can determine the date and time that they were placed there. Using this information you can check your log archives for activity during that time and date to determine how the hacker was able to penetrate your computer. This information can then be used to secure your computer.
Reporting to the authorities: Using the information found in the log files will allow you to present information to authorities in the case of a successful hack or an attempt. The logs will give you the IP address of the offending computer, the method used, and the time and date it was performed. This information can be given to the appropriate ISP or authorities in case of criminal activities.
Good Practice
It is good practice to occasionally examine any custom rules or filters that you have created for allowing incoming traffic or outbound traffic to or from your computer. You may at times allow certain protocols to connect to your computer for various reasons including file sharing, mail, ftp, or web. Many times these rules are created, and then they are forgotten and remain open. It is good practice to examine your firewalls configuration occasionally to make sure these rules are disabled if they are no longer needed. If you keep these rules open when you do not need them, you are creating a potential avenue for hackers to compromise your computer.
Common Issues with Firewalls
It is important to note that almost all Internet applications are created with the thought that there is no firewall in place that could change how these applications can communicate with the Internet. Sometimes using a firewall can make certain features of the applications no longer work properly. In the majority of cases, these services can be enabled to work by changing certain settings in your firewall to allow incoming traffic to be received by your computer. When this type of situation occurs you can create a custom rule that allows that particular application to work.
An example of this would be if you have Windows XP Professional and would like to be able to remotely connect to your Remote Desktop from another computer. Since firewalls by default block all incoming traffic to your computer when you attempt to connect to Remote Desktop the connection will be denied. If you search on Remote Desktop using Google you will find that Remote Desktop uses TCP port 3389 to accept incoming connections. You would then change your rules on your firewall to allow incoming connections to TCP port 3389, thus allowing you to connect to your computer remotely.
Therefore, when using applications with a firewall and you find that there are problems, you should search the Internet on how to use that program with a firewall and what ports should be opened. Then you would create a custom rule that would allow the specific traffic to reach your computer.
Popular Firewalls
There are many types of firewalls on the market, each with their own strengths and weaknesses. I have listed these personal software firewalls and hardware vendors as resources for you to research further. If a firewall is noted as free it is important to note that their commercial equivalents will probably contain more features that may be beneficial to you.
Free Personal Firewalls
Commercial Personal Firewalls
Hardware Router/Firewalls Vendors
Conclusion
As you can see having a firewall protecting your computer is a necessity in protecting your computer from hackers or viruses. With the proper monitoring and rules you will be able to use your applications on the Internet as you would like to with the added benefit of securing your computer. When you leave your house, you lock your doors to prevent robbery, why not use a firewall to put a lock on your computer.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Friday, 19 October 2012

How to Copy, Cut, and Paste in Windows

Introduction
A basic, but important, concept to understand when using a computer is cut, copy and paste. These actions will allow you to easily copy or move data between one application and another or copy and move files and directories from one location to another. Though the procedures in this tutorial are considered to be basic concepts, you would be surprised as to how many people do not understand these essential features. Even more importantly, once you understand these fundamentals you will be able to use this knowledge on almost any computer operating system as long as you know the corresponding keys that are used for these features. For the purpose of this tutorial I will cover how to cut, copy and paste with the Windows operating system. Other operating systems, such as Linux, Unix, and Apple support these concepts as well but will not be discussed in this tutorial.

Introducing the Windows Clipboard

Windows has a feature called the Windows Clipboard. The clipboard gives Windows users the ability to store information in memory and than retrieve that information for later use. The cut, copy and paste functions rely on the clipboard in order to work. The process of placing data into the clipboard is know as copying or cutting. The process of retrieving the data from that clipboard and placing it into another location is called pasting. We will cover the specifics on these actions in more detail later in the tutorial. For now it is important to understand that the clipboard is used to contain the data that you want to paste into another location. If there is no information contained in the clipboard, then you will not be able to paste anything. Any data that is stored in the clipboard via a copy or cut command will stay there until it is overwritten by another copy or cut command. When you paste that data, the data is not removed from the clipboard, and can be pasted over and over as many times as wish. The data in the clipboard will be erased, though, when you shut down or restart your computer.

How to highlight text in a document

Before you can copy, cut, or paste text data you must be able to highlight, or select, the text that you want to perform the action on. This is called highlighting and allows you to select all the information in a document or certain portions of it. Once the text is highlighted you can then copy or cut that information depending on your needs. An example of what highlighted text looks like is below:
 

Figure 1: Example of highlighted text
 
There are four standard methods used to highlight text and they are as follows:
Use your mouse
Using your mouse to select text could not be any easier. Simply find the location you would like to start selecting from and place your mouse cursor there. Then press and hold the left mouse button and drag the cursor to the last area you would like to highlight. You will find that as your are holding the left mouse button and dragging the mouse cursor, the text between where you first pressed the button and where you dragged the cursor to will now be highlighted.

Use the applications edit menu to select all
Windows applications that support copy and paste will usually contain an edit menu. Under this edit menu you will see an option to Select All. When you click on that menu option the entire contents of the file you are working for will be highlighted.

Right click your document
Many programs give you the ability to select all the data in your document, as described above, by right-clicking on the document and then clicking on Select All. the entire contents of the file will now be highlighted.

Use your keyboard
You can use your keyboard to select text by using the arrow keys while holding down the shift key. Place your cursor at the location you would like to start highlighting and then press and hold the shift key while you move your cursor with the keyboards arrow keys. As long as you are holding down the shift key, as you move the cursor with the arrow keys the data that you are moving the cursor over will become highlighted.
 
Pressing Control+A
When you press Control and then the letter A on your keyboard at the same time the program will select all the data in the document similar to how Select All works in the previous methods.
Now that you know how to highlight text, you should practice the the art of highlighting text. You can do this by opening Notepad and typing in a few lines of text. Then practice the different methods of highlighting text. To open Notepad you can double-click its icon found in the Start Menu under the Accessories submenu.
 
How to select files and folders

Just as you can highlight, or select, text you can also highlight files and folders for use with the copy, cut, and paste commands. Selecting files and folders work a little differently then text though. When selecting text you must select the text so that the highlighted text is next to the other highlighted text. Files and folders, on the other hand, can be selected as seen fit and the files do not have to be next to each other. You can see an example of this in the figure below:
 

Figure 2. Select Files and Folders

As you can see from the image above, files and folder can be selected as needed and do not have to be right next to each other.
To select files or folder you can use the following methods:
Drag your mouse around the desired files or folders
You can select multiple files and folders to work with by dragging the mouse cursor around these files. Simply left click in an empty space next to a folder, and while keeping your left mouse button pressed, drag your mouse to create a square or rectangle around those files or folder you want to select. As you drag the mouse, those items contained in the box will become selected. When you are done, release the left mouse button.

Use the applications edit menu to select all
Windows applications that support copy and paste will usually contain an edit menu. Under this edit menu you will see an option to Select All. When you click on that menu option all the files in the folder you are looking at will become selected.

Use the Shift key
The shift key is used to automatically select all the items between one selected item and another. Click once on a file or folder to select it. Then press and hold the shift key, and click again on another item. You will now see that all items between the first selected one and the next selected one will be highlighted.
Use the Control
The control key is used to choose individual items to be selected at the same time. Simply hold down the control key and, with that key held down, use your mouse to left click on other items to select . As long as the control is kept pressed down, you can choose as many individual items you would like to select at the same time.
To test this, open your My Documents folder and practicing selecting files and folders.
 
Copying text

What if you were working on a word processing document and you need to take text that is located in another document and add it to the current document. You could manually type the information found in the original document into the new document but that could take quite a long time. Luckily for us, operating systems give us the ability to copy text from one document to another document called Copy. When you copy highlighted data, this data is stored in the clipboard until you are ready to paste that data into another program
To copy something you must first highlight the text that you would like to copy using one of the methods described above. When when you have the text highlighted that you would like to copy, you can copy it to the clipboard in one of three ways:
  • When the text is highlighted you can press the Control button and the C button at the same to copy the data.
  • Right-clicking on the highlighted text or files and then clicking on Copy.
  • If there is an Edit menu you can click on Edit and then click on Copy.
Once you use one of these methods a duplicate of the highlighted text will be placed in the clipboard allowing you to paste it in another document or application.
Cutting text

Cutting is very similar to copy in that they both place the highlighted item into the clipboard for future pasting. The difference is that you when you Cut the highlighted text, it will remove, or cut, the highlighted text from the original location and place it into clipboard. It is therefore important to be careful when using this command as it is possible to lose data if you mistakenly cut the data from the document and then save the file.
To cut text you must first highlight the text or data that you would like to cut using one of the methods described above. When when you have the text highlighted that you would like to cut, you can cut it to the clipboard in one of three ways:
  • When the text is highlighted you can press the Control button and the X button at the same to cut the data.
  • Right-clicking on the highlighted text and then clicking on Cut.
  • If there is an Edit menu you can click on Edit and then click on Cut.
Once you use one of these methods a copy of the highlighted text will be placed in the clipboard and the highlighted data will be removed from the document. It is important to note that the text will only be removed from a document if that document is editable. For example, you can not cut text from a document set to read-only or a web page because it is not editable.
 
Pasting text

Now that you know how to Copy and Cut data from a document and have it placed in the clipboard, you need to learn how to retrieve that data and place it in your document. Once data has been copied or cut from a document, you can then paste it into another document, or the same document, by retrieving that information from the clipboard using the Paste command.
Simply move your cursor to the location where you would like the data to be pasted into your document and then choose one of the methods for pasting the data.
  • When the cursor is at the location where you would like the data to be pasted press the Control button and the V button at the same to paste the data.
  • Right-clicking on the document and clicking on Paste.
  • If there is an Edit menu you can click on Edit and then click on Paste.
After you use one of the above commands the data contained in the clip board will now be pasted into the document.

Cut, Copy and Paste with Files and Folders

It is also possible to use the same key combinations and commands on files and folder. Simply select a file(s) or folder(s) and cut or copy it. Then you can select another location to paste it to. If you paste a copied file or folder in the same location that the original resides in, Windows will automatically append Copy of in front of the file name. For example if I copy and paste the file test.txt to the same directory the original is in, it will paste the file as a new file called Copy of test.txt.
When cutting files and folders, a duplicate of the file or folder will placed where you paste it to and the original will be deleted. Do not worry, though, as the original document you cut will not be deleted until a valid copy is pasted elsewhere.

Conclusion

Now that you know how to cut, copy and paste text and files from one location to another you have a powerful tool at your disposal. Now you can quickly take information from another document and paste it into a document of your choice. You also have the ability to cut or copy files from one location and place them into another location.

Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

Wednesday, 17 October 2012

An Introduction to your Computer

Introduction
Almost everyone uses a computer daily, but many don't know how a computer works or all the different individual pieces that make it up. In fact, many people erroneously look at a computer and call it a CPU or a hard drive, when in fact these are just two parts of a computer. When these individual components are connected together they create a complete and working device with an all encompassing name of computer. As a computer user it is important that you have a basic understanding of the core components that make up your computer.  This knowledge will prove invaluable if you decide to upgrade your computer or if a piece of hardware breaks and you need to purchase a replacement.  The purpose of this tutorial is to discuss the basic pieces in every computer and their function.

The Outside of your Computer
 
When you look at your computer what you are seeing is actually the computer case. Inside the case are all of the individual components that when connected together create your computer. On the outside of the case you will see various external ports that you can plug devices into as well as the ability to access your optical devices such as your CD and DVD drives.
Front of a computer case Back of a computer case
Front of a Dell Inspiron Desktop Back of a Dell Inspiron Desktop
Figure 1. Front and Back of a Computer Case
On the front of the computer you will commonly find a CD or DVD drive that can be opened by pressing a small button near the door of the drive. This will eject the drive tray where you can place a CD or DVD disk. When you press the button again, the tray will slide back into your computer so that you can access it from within your operating system.
On the front of the case, you will also typically find USB ports and media readers. A USB port is a small opening on the front of your computer that allows you to plug a USB device or cable into it. You can usually determine if a port on your computer is USB as it will have the USB Logo logo next to it. Common devices that you would plug into USB ports are iPod and iPads, flash drives, and external hard drives. The other common ports that you can find are for camera memory media. These media readers allow you to remove the memory card from your camera and insert it into the computer so you can access the images stored on it.
On the back of the case are connectors that are typically only used when you assemble your computer for the first time. These connectors allow you to connect external devices such as your printer, monitor, mouse, keyboard, and speakers. The back connections will also include an Ethernet port that will allow you to connect your computer to your network. Last, but not least, there will also be more USB ports available in the event that you need more USB connections than are available on the front of your computer.

The Inside of your Computer
Now that you know how to connect your various external components to your computer case, let's take a look at the inside of a computer as this is where the magic really happens. To open your case, you will need to typically unscrew a side panel or press a button on the bottom of the computer to open the computer like a clamshell. Once you can see inside a computer, you will see various individual components connected via cables or plugged directly into a large board attached to the side of the case. This board is the motherboard and is used to connect all the individual devices inside your case into a single computer. These individual devices and the motherboard they plug into can be seen in the image below.
 
Inside of a computer
Figure 2. Inside of a computer
 
As you can see from the image above, there are various components all connected to each other. Every device must be connected to the power supply unit, which provides electricity to various components. The add-on cards, each performing their own function, are inserted to the motherboard so that they can communicate with it. When all of these components are properly connected to each other, they can then communicate with each other and the computer will operate properly. In the next section we will discuss each individual component and what function they serve.

The individual parts of your computer
As already stated, a computer is nothing more than various individual hardware components connected to each through cables and the motherboard. These devices are then given electricity by the power supply unit so that they can function. In this section we will discuss the individual components and the function that each performs.

Computer Case
The computer case, also called a chassis, houses and protects other core parts of the computer.  Computer cases come in different sizes and shapes in order to accommodate the various environments that they will be stored in. These shapes are:
  • Tower - A tower case is vertical and usually sits on the floor. A tower case comes in a mini, mid, and full size, with the larger sizes being able to hold more components.
  • Desktop - A horizontal case that is designed to rest on a shelf or sit on your desk with the monitor on top of it.
  • Rackmount - Rackmount cases are horizontal and are typically used for servers. These servers will then mount in a rack so that there are stacks of computers in one computer rack.
Full Tower Case Rackmount Server Chassis
HAF 932 AMD Limited Edition Full Tower Case iStarUSA E3M8 Rackmount Case
Figure 3. Computer Cases
Computer cases also need to support the largest component that resides inside it, which is typically the motherboard. The motherboard can come in many different shapes and sizes, called form factors, and the specifications on a computer case will state which form factors can fit inside it.
Virtually all modern cases have:
  • Power switch
  • Indicator lights such as disk activity or network activity.
  • Back panel that contains holes to expose external ports.
  • Metal framework to house the PSU and hard disk/optical drives
  • Mounting points to secure the motherboard
  • Vented panels to allow airflow through the case
Depending on the model, some cases have other features as well such as headphone jacks or USB ports.


Motherboard
The motherboard, or mobo for short, is perhaps the most critical piece of the computer.  It is a relatively large, rectangular board filled with various circuits, chips , and slots that you plug things into The motherboard serves two functions.  First, the motherboard is home to a number of chips that dictate how the various components of the computer will talk to each other. It also has special slots that allow you to plug expansion cards in that add new or improved functionality to your computer.  Secondly, and perhaps most importantly, the motherboard is the connecting point for all of the other pieces of the computer.  Without the motherboard, the different parts cannot communicate with each other, and the computer cannot function.
Asus P8P67 PRO Motherboard
Figure 4. Computer Motherboard
Motherboards come in a variety of sizes, or form factors, such as ATX or microATX.  Generally speaking, the larger the form factor the more devices can be attached to it.  Motherboards connect with the other devices in your computer using a set of special slots and connectors called ports that are located on the top and back edge of the motherboard.  The ports on the back edge of the motherboard protrude out of the back panel of the computer case and allow you to connect external devices to the computer.  Virtually all modern motherboards have one or more USB ports and an Ethernet port mounted externally to allow connection to the internet and external devices.  Additionally, all modern motherboards contain at least one IDE or SATA port to allow the connection of a hard drive.
Central Processing Unit
The central processing unit, or CPU, is at the core of every computer.  Functioning as the "brain" of the computer, the CPU performs basic mathematical and logical functions as instructed by a computer program.  The CPU is located on the motherboard and is connected to it through a special port called the CPU socket. When the CPU is in use it generates heats, which must be transferred away from CPU chip so that it is not damaged. This is accomplished through the use of a heat-sink and fan which draws the heat out of the CPU chip and transfers it into the case instead.
Intel Processor
Figure 5. A computer's CPU or Processor
A CPU has a maximum speed at which it can safely process instructions.  This speed is called the clock rate and is measured in hertz (Hz).  Some CPUs will allow a user to raise the clock rate beyond the speed at which the CPU is safely rated.  This is called overclocking, and can provide increased computer performance at the cost of  potential system instability or damage.  Due to the complexity of overclocking and the potentially destructive side effects it can cause, overclocking is a technique not recommended for average or professional computer users.
A relatively recent development in the field of CPUs is the multi-core processor.  Having many processing cores in the CPU effectively multiplies its potential by allowing the CPU to simultaneously process as many instructions as it has cores.  However, the OS must be designed to make use of multiple cores for this ability to take effect.  The CPU of a modern PC will likely have anywhere from two to eight cores


Power Supply Unit
All parts of a computer require electricity in order to operate.  The part of the computer that provides this electricity is called the power supply unit, or PSU.  The PSU receives electricity from an external source, which is usually a wall outlet, and changes it into power that the other parts of the computer can use. 
Seasonic Power Supply
Figure 6. Power Supply
A PSU is necessary for two reasons.  First, computers require direct current, or DC, power.  However, electricity is supplied by power companies in alternating current, or AC, form.  The PSU takes the AC electricity and converts it into a DC form so that the computer can use it.  The second reason is that computer components use electrical power of relatively low voltage, while the electricity that comes out of a wall socket is of a significantly higher voltage.  The PSU converts the higher voltage energy into a low voltage form that the computer can properly use.
Power supplies are classified by the maximum amount of watts, such as 500 or 650 watts, which can be supplied to your computer system.  The amount of electricity that is required to power a computer depends on what components the computer is using.  For example, if you are using a high-end processor and a high-end video card your power you may need a more powerful PSU to support these power hungry devices. Therefore, when buying new components for a computer you should always look at the specifications for these devices to determine how much power they need and whether or not your PSU can support it.

Hard Disk Drive
The hard disk drive, or HDD, is the primary source of secondary storage in modern computers.  Secondary storage is any device where information is stored when it is not needed for immediate use.  An HDD uses magnetism to record information on a rotating disk of magnetic material.  It uses a moveable arm containing a device called a drive head to read from and write to different portions of the disk..  Since the disk remains magnetized even after power is removed, information is not lost when you turn off the computer.  One downside of HDDs is that they are very slow compared to other devices in the computer.  This is because the drive must position the arm and disk in the correct position in order to retrieve a particular piece of information. 
Western Digital Hard Drive
Figure 7. Hard Disk Drive
Modern HDDs have three major variables.  The first is the drive capacity.  This is how much information the drive can hold.  Drive capacity is measured in either gigabytes (GB) or terabytes (TB).  One terabyte is equal to one thousand gigabytes.  The second variable is the rotation speed.  This is how quickly the disk inside the HDD can rotate, and is measured in rotations per minute (RPM).  The faster the disk spins, the more quickly information can be retrieved from it.  The final variable is the type of interface the HDD uses.  The interface is the part of the HDD that connects to the motherboard and is how the HDD sends and receives information.  Most modern HDDs use SATA or SAS interfaces, although HDDs using IDE interfaces are still somewhat common.  It is important to know which interfaces your motherboard supports when purchasing a new HDD.
A recent addition to the personal computer market is a technology called a solid state drive, or SSD.  While not technically an HDD, SSD's fill the same functions.  The difference between HDDs and SSDs is that while an HDD uses a spinning disk to store data, an SSD uses special microchips.  Due to this, SSD's are less susceptible to physical shocks such as impacts and falls compared to a HDD.  Additionally, SSDs run silently and can access data more quickly.  However, SSDs have a higher cost per gigabyte than their HDD cousins do.

Optical Disk Drives
An optical disk drive is a component that uses a laser to read from or write to an optical disk.  Examples of optical disks include CDs, DVDs, and Blu-Rays.  An optical disk drive writes to a disk by using a laser to etch tiny grooves into the surface of the disk.  The disk is read by using a different, low-power laser to detect those grooves.  Modern optical disk drives usually have reading and writing (burning) capability.  Additionally, most optical drives are backwards compatible, which means that a new technology can read the media from an older technology. For example, a Blu-Ray drive can also play DVDs and CDs.
Optical Drive
Figure 8. Optical Drive
Optical disk drive speed is measured differently than HDD speed.  While HDD speed is measured in the number of RPMs, optical drive speed is measured by the maximum rate at which data can be read from the disk.  For each technology (CD, DVD, Blu-Ray) there is an industry-wide standard data rate that serves as a benchmark by which drive speeds are measured.  The speed listed is put in terms of multiples of that base speed.  For example, the base speed for Blu-Ray technology is 6.74 megabytes per second.  Therefore, a drive rated at 52x can read data at a maximum rate of 52 x 6.74 = 350.48 megabytes per second.

Cooling Devices
As a computer runs, it generates a lot of heat.  One or more cooling devices are part of any modern computer in order to keep the machine from overheating.  The two types of cooling devices that are in almost every modern computer are heat sinks and cooling fans.  Heat sinks are small metal structures that conduct heat well.  They function by absorbing the heat produced by a component and efficiently releasing it into the air, or a liquid in certain special situations, similarly to how the radiator in your car works.  Cooling fans work by removing warm air from components or heat sinks and pulling in cool air to replace it.  Fans are available in a variety of sizes that determine how much air they can move within your case.  When adding a fan, it is important to ensure that you purchase a fan that is compatible with your motherboard, since different fans have different kinds of power connectors.
CPU Heat Sink and Fan
Figure 9. CPU Heat Sink and Fan
Some extremely high-end PCs have liquid cooling systems which use tubes of flowing water or coolant instead of or in addition to cooling fans.  These systems are more effective, quieter, and more efficient than air cooling systems.  However, they are complex, expensive, and carry the danger of a coolant leak which can damage the system.  For a typical PC, air cooling systems are sufficiently effective.
Memory
Random Access Memory, or RAM, is the part of the computer where information is stored while it is being used by the computer's processor, operating system, programs, and other devices on your computer.  RAM is designed so that any of the information stored on it can be read in any order without losing performance.  This makes RAM faster and more efficient to store data compared to slower devices such as an HDD or CD-ROM. 
Memory
Figure 10. Computer Memory
When you are using your computer it copies information that it is currently using, such as parts of the operating system or currently running programs, into RAM so that it can work faster.  The more RAM that the computer has, the less often it needs to get information off of the much slower HDD.  To use a comparison, think of your HDD as a well.  The information on the HDD is the water in the well, and the RAM is a bucket.  The bigger your bucket, the fewer trips you have to make to the well to get the water you need.
One characteristic of RAM is that it is volatile.  This means that when you turn off the computer, any information in the RAM is erased.  To protect against loss of information, an operating system will copy any data that it needs to the HDD so that it is available the next time you start the computer.
RAM comes in different speeds and types.  When you upgrade your computer's memory, it is important that you ensure that you choose a speed and type of RAM that is compatible with a computer's motherboard.  A great tool for finding out what kind of memory your computer uses is Crucial's Memory Advisor
Expansion Cards
An expansion card is a device that is inserted into special slots on the motherboard and provides the computer with additional functions, resources, or features.  There are a number of different kinds of expansion cards available; two of the most common being video cards, which provide increased graphics processing ability, and sound cards, which enhance the audio ability of the computer.  Some expansion cards such as video cards also include their own processor, memory, and even cooling devices such as fans or heat sinks.
When purchasing expansion cards there are a number of important factors to consider.  First and foremost is the type of connection that the expansion card requires.  There are a number of different standards for expansion slots, and motherboards have only a limited number of each kind of slot.  Before purchasing you need to ensure that your motherboard has the required slots available for use.  Another important factor is the size of the expansion card.  The card needs to be able to fit inside your computer case, and should not make contact with any other parts of the computer except for the motherboard.  Finally, you should ensure that your PSU can output enough power to support all your connected expansion cards.  If the PSU cannot supply the computer with enough electricity then one or more of your devices will fail to function.
Two common types of expansion cards are sound and video graphic cards, which are described below.
Sound Cards
Sound cards are a kind of expansion card which deals with audio input and output. Sound cards generally fill two functions. First, sound cards enhance the sound processing capability of the computer, allowing for the creation and output of more complex sounds. Secondly, sound cards often possess input and output ports that allow for other audio devices such as microphones or speakers to be connected to it.
Sound Card
Figure 11. Sound Card
Video Cards
A video card is a type of expansion card which increases the computer's ability to handle different kinds of visual output. Video cards have two main functions. First, while nearly all modern motherboards have some basic graphics capabilities built in, a video card can handle graphics issues much more effectively than the graphic chips built into the motherboard.
As a result, a video card allows for the creation and display of more complex and detailed images without putting an additional strain on the CPU. Additionally, since many video cards have their own memory, this leaves more of the general computer memory available for other purposes. Second, many video cards add additional functions to the computer such as video capture, a TV-tuner which allows you to watch TV on your computer, or the ability to connect multiple monitors to the computer.
 
Video Card
Figure 12. Video Graphics Card

External Ports
As mentioned above in the motherboard section, a number of connectors on the motherboard are accessible from the back panel of the computer case.  These connections are called external ports because they can be accessed from outside the computer case.  There are a number of different kinds of connections available that include:
  • VGA or DVI Connector- These ports are used for connecting a monitor or other display device to your computer.
  • Ethernet Port - This port allows you to connect your computer to a network or the Internet.
  • HDMI - Allows you to connect your computer a High Definition display or TV.
  • eSATA - These ports allow you to connect an external SATA hard drive to your computer.
  • USB Port - A common connector for external devices. More information about USB ports can be found below.
External Ports of a Motherboard
Figure 13. External Ports on the back of a computer
Virtually every modern PC also includes one or more USB, or Universal Serial Bus, ports.  There are two primary kinds of USB ports in use right now: USB 2.0 and USB 3.0.  USB 3.0 ports can move data much more quickly than USB 2.0 ports.  However, the connected device must be designed to take advantage of USB 3.0 technology in order to use the increased speed. 
USB ports and devices are both backwards and forwards compatible.  This means that you can plug any standard USB device into any standard USB port, and the device will function.  However, if the USB version of the device and the port do not match then the device can only transfer data to and from the PC at a maximum rate set by the lower of the two versions.  For example, if you connect a USB 3.0 device to a USB 2.0 port, the device will only transfer data at a maximum rate of 60 megabytes per second, which is the maximum rate for USB 2.0 technology.
When purchasing an external device such as a monitor, keyboard, mouse, or printer it is important to ensure that you have the correct kind of port available for use.  Otherwise you will be unable to use the device.

Conclusion
As you can see, a computer is more than that box sitting on the side of your desk. In fact it is a very complex machine comprised of numerous parts, cables, and devices that all need to properly work together in order for the computer to operate correctly. Having this basic understanding of the parts of your computer is important for any computer user. Whether you need to purchase a new one, upgrade an existing one, or repair a broken one, you now have the knowledge to understand what you are looking at.


Thanks & Regards,

"Remember Me When You Raise Your Hand For Dua"
Raheel Ahmed Khan
System Engineer
send2raheel@yahoo.com
send2raheel@engineer.com
sirraheel@gmail.com
send2raheel (skype id)

My Blog Spot
http://raheel-mydreamz.blogspot.com/
http://raheeldreamz.wordpress.com/

My Face book pages
http://www.facebook.com/pages/My-Dreamz-Rebiuld-our-nation
http://www.facebook.com/pages/Beauty-of-islam
http://www.facebook.com/pages/Health-is-wealth

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...