tag:blogger.com,1999:blog-17277786135408670522024-03-14T06:22:30.311-07:00Networking ConceptsSauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.comBlogger72125tag:blogger.com,1999:blog-1727778613540867052.post-66706848015355954382013-07-01T11:57:00.001-07:002013-07-01T11:57:51.553-07:00Mortgage Rates<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://click.discountclick.com/go/click.php?tid=946830">Mortgage Rates</a>
<br /></div>
Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-63399005027772823112013-02-05T10:42:00.002-08:002013-02-05T10:42:35.953-08:00Hello Protocol<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
The hello protocol is a fundamental protocol for wired and wireless networks. In mobile ad-hoc networks, a hello protocol helps nodes to establish a neighbor table for link detection. If nodes exchange position information in hello packets, then it also helps them in packet forwarding decisions. In ad-hoc networks, due to node mobility, neighbor relationships change frequently. To cope with mobility, and to have an up-to-date neighbor table, nodes advertise hello packets periodically. These hello packets create congestion, which may cause control and data packets to be dropped in the network.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The Hello Protocol works differently on broadcast networks, as compared to non-broadcast networks. On broadcast networks, each router advertises itself by periodically multicasting Hello Packets. This allows neighbors to be discovered dynamically. These Hello Packets contain the router's view of the Designated Router's identity, and the list of routers whose Hello Packets have been seen recently.
On non-broadcast networks some configuration information is necessary for the operation of the Hello Protocol. Each router that may potentially become Designated Router has a list of all other routers attached to the network. A router, having Designated Router potential, sends Hello Packets to all other potential Designated Routers when its interface to the non- broadcast network first becomes operational. This is an attempt to find the Designated Router for the network. If the router itself is elected Designated Router, it begins sending Hello Packets to all other routers attached to the network.</div>
</div>
Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-8832934137559714672011-12-31T03:20:00.001-08:002011-12-31T03:20:21.875-08:00Cloud Computing in Simple Terms<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
A simple example of cloud computing is Yahoo email, Gmail, or Hotmail etc. You dont need a software or a server to use them. All a consumer would need is just an internet connection and you can start sending emails. The server and email management software is all on the cloud ( internet) and is totally managed by the cloud service provider Yaho , Google etc. The consumer gets to use the software alone and enjoy the benefits. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The analogy is , 'If you need milk , would you buy a cow ?' All the users or consumers need is to get the benefits of using the software or hardware of the computer like sending emails etc. Just to get this benefit (milk) why should a consumer buy a (cow) software /hardware ?
Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world.</div>
</div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-23652053849650917462011-12-20T01:57:00.000-08:002011-12-20T01:57:36.886-08:00Actuators<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
An <a href="http://progressiveautomations.com/" target="_blank">Actuator</a> is something that converts energy into motion. It also can be used to apply a force. An actuator typically is a mechanical device that takes energy, usually energy that is created by air, electricity or liquid, and converts it into some kind of motion. That motion can be in virtually any form, such as blocking, clamping, ejecting or many other types of motion.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In simple words, an actuator that generates linear motion or movement is called <a href="http://progressiveautomations.com/" target="_blank">Linear Actuator</a>. Most of these actuators are operated using hydraulic or mechanical actuation techniques and they are using non-linear motion as their input.
Electric <a href="http://progressiveautomations.com/" target="_blank">Linear Actuators</a> are most suitable for the movement of final control elements which require linear movement. The rotary to linear conversion is done without any wear and thrust rod can transfer force directly to the final element. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Many actuators are designed to be used in hazardous areas. They are operated by standard electronic units.
Literally hundreds of actuators are available in the market. One needs to understand the required force, rated speed, maximum stroke range, and whether explosion protection is needed or not. Then one can select appropriate linear actuator for their needs.
A standard linear actuator commonly has the motor as a separate cylinder attached to the side of the actuator, It is attached either in parallel way with the actuator or it sticks out to the side 90 degrees to the actuator. Motion control also plays an important role in the working of this device.The motor may also be attached to the back of the actuator. The drive motor has a solid drive shaft. This shaft is geared to the drive nut or drive screw.
</div>
</div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-15984657817320604722011-11-26T00:45:00.001-08:002011-11-26T00:47:30.760-08:00Google+ was never a comptetior to Facebook<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
The social web is a well reported topic within the media today, and
for good reason. We are in a transitional change with how we communicate
with each other online, how brands reach consumers and how
organisations market to their audience. We are undoubtedly immersed in
the technology age, and our lives, the way we </div>
<div style="text-align: justify;">
interact with others, is
changing totally.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
The monumental success of Facebook, Mark
Zuckerberg's world leading social platform, has enticed brands,
consumers, investors alike, and the world is continually awaiting for
that 'next big thing'. A likely reason therefore that the majority of
news stories, magazine articles and blog posts on Google's latest foray
into the social web repeatedly draw up comparisons to Zuckerberg's
global giant.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Predicting
the next big thing is often easier than some might think. You simply
have to look at what is already out there, not at who's focusing on
doing something different, but rather someone who's doing it better. </div>
<div style="text-align: justify;">
Take
the iPod for example. Certainly not the first digital music player on
the market, but Apple's cult status products have led the way in both
design and function. Google was certainly not the first search engine.
Remember the likes of Lycos, Hotbot and AltaVista? Google simply
developed a product that was faster, cleaner, and easier to use than its
rivals, and they now command a dominating portion of the search market.</div>
<div style="text-align: justify;">
Skype
too was not the first online video chat service, but with successful
brand building and fantastic integration with offline communication, it
continues to be the world's favourite online audio/video communication
tool.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Contrary to popular belief, Google+ was never created to directly
compete for people's time on the internet. A simple, ad free system,
Google+ was launched to compete for users' personal data. Becoming the
primary platform for social networking would simply be a bonus.</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
Speaking
at the Monaco Media Forum recently, Nikesh Arora, Google's chief
business officer said that Google+ is a platform that allows the
bringing together of all the services and products that they currently
offer. It was never 'just about getting people together on one site and
calling it a social network'.</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
The real power behind what Google
has created comes down to the integration of Google's products, meaning
that as people are using the search engine, they are also logged into
Google+. The combination of that user data and knowing when people are
actively searching for something opens up the possibility of the most
targeted advertising platform in history, and Google are very aware of
the fact.</div>
<div style="text-align: justify;">
</div>
<div class="pullquote" style="text-align: justify;">
Contrary to popular belief,
Google+ was never created to directly compete for people's time on the
internet. A simple, ad free system, Google+ was launched to compete for
users' personal data. Becoming the primary platform for social
networking would simply be a bonus</div>
<div style="text-align: justify;">
Little over a week into taking
the reigns as CEO, Larry Page prioritised the company's social media
strategy, by directly linking the annual bonuses of over 25% of Google
employees to the success or failure of their social products. </div>
<div style="text-align: justify;">
<br /></div>
</div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-62344292990518535982011-08-12T08:35:00.000-07:002011-08-12T08:38:41.924-07:00What is Subnet and Subnet Mask?<div style="text-align: justify;"><span style="font-weight:bold;">Subnet:</span>A subnet (short for "subnetwork") is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN). Having an organization's network divided into subnets allows it to be connected to the Internet with a single shared network address. Without subnets, an organization could get multiple connections to the Internet, one for each of its physically separate subnetworks, but this would require an unnecessary use of the limited number of network numbers the Internet has to assign. It would also require that Internet routing tables on gateways outside the organization would need to know about and have to manage routing that could and should be handled within an organization.
<br />
<br />A subnet is a also logical grouping of connected network devices. Nodes on a subnet tend to be located in close physical proximity to each other on a LAN. Network designers employ subnets as a way to partition networks into logical segments for greater ease of administration. When subnets are properly implemented, both the performance and security of networks can be improved.
<br />
<br /><span style="font-weight:bold;">Subnet Mask:</span>
<br />A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.
<br />
<br />Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is:
<br />
<br />10010110.11010111.00010001.00001001
<br />
<br />The Class B network part is:
<br />
<br />10010110.11010111
<br />
<br />and the host address is
<br />
<br />00010001.00001001
<br />
<br />If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet.
<br />
<br />The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address:
<br />Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000
<br />IP Address 150.215.017.009 10010110.11010111.00010001.00001001
<br />Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000
<br />
<br />The subnet address, therefore, is 150.215.016.000.
<br />
<br />Hope you enjoyed !!!
<br />
<br />Please visit my other blogs
<br /><a href="http://operatingsystemconcepts4u.blogspot.com/">Operating System Concepts</a>
<br /><a href="http://technoworld4u.blogspot.com/">Technomedia</a>
<br /><a href="http://programminginfo4u.blogspot.com/">Enter into world of Technology</a>
<br /><a href="http://news73.blogspot.com/2011/07/hina-rabbani-khar.html">Hina Rabbani Khar</a>
<br /></div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-58248623937114397582011-08-03T07:41:00.000-07:002011-08-03T07:47:51.962-07:00Unicast,Multicast,Broadcast<span style="font-weight:bold;">Unicast:</span>Unicast traffic is traffic addressed to a single device on the network.Unicast packets are sent from host to host. The communication is from a single host to another single host. There is one device transmitting a message destined for one reciever.Unicast uses IP delivery methods such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which are session-based protocols. When a Windows Media Player client connects using unicast to a Windows Media server, that client has a direct relationship to the server.<br /><span style="font-weight: bold;"><br /></span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2pKYD-h54fUbzUwbOUpSDHVO3dkboVjkcrrBvTP1dUsEqp73zcGfctMOaYBkCxsWN1ijvh27DvOzjc1KRBkuBTgJNiNL5p3QU_eokcG6F2wtoAbwbEkfvvAcauMEnXHSvS7om6nwJ7mI/s1600/unicast.jpeg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 288px; height: 122px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2pKYD-h54fUbzUwbOUpSDHVO3dkboVjkcrrBvTP1dUsEqp73zcGfctMOaYBkCxsWN1ijvh27DvOzjc1KRBkuBTgJNiNL5p3QU_eokcG6F2wtoAbwbEkfvvAcauMEnXHSvS7om6nwJ7mI/s400/unicast.jpeg" alt="" id="BLOGGER_PHOTO_ID_5636641051607329554" border="0" /></a><span style="font-weight:bold;">Multicast:</span>Multicast is a special protocol for use with IP. Multicast enables a single device to communicate with a specific set of hosts, not defined by any standard IP address and mask combination. This allows for communication that resembles a conference call.Multicast is a true broadcast. The multicast source relies on multicast-enabled routers to forward the packets to all client subnets that have clients listening. There is no direct relationship between the clients and Windows Media server. The Windows Media server generates an .nsc (NetShow channel) file when the multicast station is first created. Typically, the .nsc file is delivered to the client from a Web server.<br /><br /><span style="font-weight:bold;">Broadcast:</span>Broadcast is when a single device is transmitting a message to all other devices in a given address range. This broadcast could reach all hosts on the subnet, all subnets, or all hosts on all subnets. Broadcast packets have the host (and/or subnet) portion of the address set to all ones. By design, most modern routers will block IP broadcast traffic and restrict it to the local subnet.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-66657228364349784182011-07-29T10:27:00.000-07:002011-07-29T10:46:16.820-07:00IEEE StandardsIEEE 802.1 Bridging (networking) and Network Management<br /> IEEE 802.2 Logical link control (upper part of data link layer)<br /> IEEE 802.3 Ethernet (CSMA/CD)<br /> IEEE 802.4 Token bus (disbanded)<br /> IEEE 802.5 Defines the MAC layer for a Token Ring (inactive)<br /> IEEE 802.6 Metropolitan Area Networks (disbanded)<br /> IEEE 802.7 Broadband LAN using Coaxial Cable (disbanded)<br /> IEEE 802.8 Fiber Optic TAG (disbanded)<br /> IEEE 802.9 Integrated Services LAN (disbanded)<br /> IEEE 802.10 Interoperable LAN Security (disbanded)<br /> IEEE 802.11 Wireless LAN & Mesh (Wi-Fi certification)<br /> IEEE 802.12 demand priority (disbanded)<br /> IEEE 802.13 Not Used<br /> IEEE 802.14 Cable modems (disbanded)<br /> IEEE 802.15 Wireless PAN<br /> IEEE 802.15.1 (Bluetooth certification)<br /> IEEE 802.15.4 (ZigBee certification)<br /> IEEE 802.16 Broadband Wireless Access (WiMAX certification) <br /> IEEE 802.16e (Mobile) Broadband Wireless Access<br /> IEEE 802.17 Resilient packet ring<br /> IEEE 802.18 Radio Regulatory TAG<br /> IEEE 802.19 Coexistence TAG<br /> IEEE 802.20 Mobile Broadband Wireless Access<br /> IEEE 802.21 Media Independent Handoff<br /> IEEE 802.22 Wireless Regional Area NetworkSauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-65898007431193772392011-07-26T05:13:00.000-07:002011-07-26T05:18:36.981-07:00Ethernet<div style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6FAZWeWZL4ZcAwYLxZQEFz-pDgTr-hvqkMOQj6QBH0Exj_3DNHrZjqLANSiZgJ8jRjAA9Hb7kRhigQEGuHkWAkxWv2VBu-Gu7a4pVo3Kih5IfveJMwcs4erByXcuI5gRUoAIh59bnjyA/s1600/enet.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 249px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6FAZWeWZL4ZcAwYLxZQEFz-pDgTr-hvqkMOQj6QBH0Exj_3DNHrZjqLANSiZgJ8jRjAA9Hb7kRhigQEGuHkWAkxWv2VBu-Gu7a4pVo3Kih5IfveJMwcs4erByXcuI5gRUoAIh59bnjyA/s400/enet.jpg" alt="" id="BLOGGER_PHOTO_ID_5633634315705393922" border="0" /></a>The ethernet is a system for connecting computers within a building using hardware running from machine to machine. It differs from the Internet, which connects remotely located computers by telephone line, software protocol and some hardware. Ethernet uses some software (borrowed from Internet Protocol), but the connecting hardware was the basis of the patent (#4,063,220) involving newly designed chips and wiring. The patent* describes ethernet as a "multipoint data communication system with collision detection".<br /></div><br />In simple terms ethernet is the most common LAN (Local Area Network) technology in use today.Ethernet was developed by Xerox in the 1970s, and became popular after Digital Equipment Corporation and Intel joined Xerox in developing the Ethernet standard in 1980.Ethernet was officially accepted as IEEE standard 802.3 in 1985.<br />The original Xerox Ethernet operated at 3Mbps. Ethernet networks up to 10Gbps now exist.<br /><br />Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is an algorithm, for transmitting and receiving packets over a common network hardware medium, by aiding in avoiding transmission collisions. The network is checked for other transmissions; when the way is clear, the computer transmissions can begin. If a collision is detected the packet is retransmitted later.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-56348394241495314432011-07-23T03:52:00.000-07:002011-07-23T03:56:22.763-07:00Routing TablesA routing table is an electronic document that stores the routes to the various nodes in a computer network. The nodes may be any kind of electronic device connected to the network. The Routing Table is usually stored in a router or networked computer in the form of a database or file. When data needs to be sent from one node to another on the network, the routing table is referred to in order to find the best possible route for the transfer of information.<br /><div style="text-align: justify;"><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdPtF7Bh_jRX9sisBILFfMHQkdoMhhQdywIrtTKHZRSjj-MWtu_4Pj10dzP-CYbo3K-WmeZtOSyvgKBGcK7Acyd4DmhSRbCnlHAuHsgSQAttMUlCEUr-hWR-Q1PfGkaumkx0eWIDuIVY4/s1600/6658481-0-large.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 230px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdPtF7Bh_jRX9sisBILFfMHQkdoMhhQdywIrtTKHZRSjj-MWtu_4Pj10dzP-CYbo3K-WmeZtOSyvgKBGcK7Acyd4DmhSRbCnlHAuHsgSQAttMUlCEUr-hWR-Q1PfGkaumkx0eWIDuIVY4/s400/6658481-0-large.jpg" alt="" id="BLOGGER_PHOTO_ID_5632499802425390066" border="0" /></a>Almost all computers and network devices connected to Internet use routing tables to compute the next hop for a packet. It is electronic table that is stored in a router or a networked computer. The routing table stores the routes (and in some cases, metrics associated with those routes) to particular network destinations. This information contains the topology of the network immediately around it. The construction of routing table is the primary goal of routing protocols and static routes.<br /><br />Routing tables can generally be maintained manually when the network is small and static. The routing tables for all static network devices never change unless and until the administrator of the network changes them manually. In dynamic routing, the devices themselves automatically build and maintain their own routing tables. They do this by exchanging information regarding the network topology using routing protocols. This enables the devices in the network to automatically adapt to the changes in the network like device failures and network congestion as and when they occur.<br /></div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-49934842271890704562011-07-21T01:51:00.000-07:002011-07-21T01:59:32.857-07:00Network Topologies<div style="text-align: justify;">In this post we are going to discuss about the type of network topologies that are available to a network administrator.Based on the requirement he can select any of them.In this post we will also see for which type of network which type of topology suited most.<br /></div><br />A network topology is like a framework, although purely in virtual terms. A topology is a layout of how computers should connect, not how they are physically arranged in a space.<br /><span style="font-weight:bold;"><br />Bus Topology:</span><br />The most common network topologies include the bus topology, which connects all the computers with a single cable. The computers are all able to see when a machines taps into the wire to connect to another machine, however privacy is assured as only the connecting units can access the data. This arrangement work well with less devices, it’s easy enough to set up (10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") cables work well). However the downside is that if the connecting cable fails all the units attached cannot interact.<br /><br /><span style="font-weight:bold;">Ring Topology:</span><br />The second one is the ring topology, typically used in schools; the arrangement is such that each unit is connected to two other units, hence like a ring. If one of the units crashes however the whole network ceases to function properly (FDDI, SONET, or Token Ring technology are good for implementing this topology).<br /><span style="font-weight:bold;"><br />Star Topology:</span><br />Next, the star topology typically has a hub (hub, router or switch) to which all units are connecting using a unshielded twisted pair cable. The benefits of this type are that if a unit crashes, the network still continues to function. The downside is that more cable is required.<br /><br /><span style="font-weight:bold;">Tree Topology:</span><br />The tree topology consists of a number of star topologies connected through a bus topology. Confusing? It’s actually quite simple; we simple connect the central hubs of the star networks in the form of a bus topology. This type of network is easy to expand.<br /><br /><span style="font-weight:bold;">Mesh Topology:</span><br />The mesh topology uses routes, therefore any messages transferred can take a number of routes to get to their destination, in a full mesh network, every device connects to every other device.<br /><br />The type of topology you choose to implement really depends on you requirements, so look carefully at the number of units involved and how complicated your network is expected to be.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-1646306099050845192011-07-19T12:12:00.000-07:002011-07-19T12:16:44.957-07:00Golf Platzreife<div style="text-align: justify;">Golf is now the emerging game that is popularized among all the people. Earlier only the rich and educated people played it. Now the popularity of the game is wide spread, so that every one has interest in playing the game. This particular game attracts all the types of crowds regardless of their age. Many people are now interested in learning this game. Mainly students involve themselves in this game so much and are very eager to learn the game. They are interested in learning in all the nuances, rules and regulations of the game. Since many people are interested in learning the game, there are many golf academies newly erecting in and around the city. Golf academies bear the responsibility to teach the young generation about the game. The rules of the golf etiquette are the first and fore most things, the golf academies teach their students. The rules of the game mainly aim at the safety of the golfers and to the pace of the play, which helps in keeping the game enjoyable. The golf etiquette is an essential part of the game. This is something very vital that all the new comers and the new beginners should learn on the course. For any game to be played successfully, the instruments used for the play should be manufactured or prepared with utmost care and you can found all these instruments at their <a href="http://www.golfakademie-gmbh.de/shop/intro.php%20">Golf shop</a>. A standard set of a golf club mainly consists of three woods, eight irons and a putter. Actually according to the rules and regulations of the play a golfer is allowed to carry 14 clubs in the bag. The more clubs the player carries the easier is his victory. To know more about golf academies, please visit <a href="http://www.golfakademie.com%20/">Golfkurse</a>.<br />The above site explains you all the details about the game. They are one of the largest German golf shops with a full range of all brand names. You can also visit <a href="http://www.golfkurs.com%20/">Golf Platzreife</a> it will be useful for you.</div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-23256097425420174052011-07-14T22:29:00.000-07:002011-07-18T02:58:27.129-07:00Ideal Destination for Golf LoversA truly exciting sport that requires patience and skill. The sport of men. The Sport of sophisticates. The sport of men with way too much money. Jokes aside but, no gaming console is really complete without its own golf game.<br /><br />Yesterday I was visiting some sites on golf club house locations and in those the one that i really found interesting is Whisper Rock Golf Course Homes.They provides you such a wonderful location in Scottsdale area that is ideal for any golf course home.<br /><br />The <a href="http://www.theholmgroupaz.com/WhisperRock.htm">whisper rock country club</a> is nestled in amongst meandering hillsides and is laid out in a jungle setting. This golf course has some of the most beautifully designed holes on the Eastern side. The 18-hole course is carved through a virgin forest of full-grown trees that make for excellent playing under mature conditions.<br /><br />Fairways and greens are kept in excellent condition. Utilizing water hazards, dog-legs and four island greens to good effect, the relatively short 18-hole course is well suited for golfers of all levels.<br /><br />Greens are fast and generally have large undulations making reading the correct line especially important. The narrow palm tree lined fairways make it a challenge to recover from errant tee shots. Adding to the difficulty is also the relative long distance between the tees and the fairways. Shorter tee shots often wind up in the difficult to hit out of semi rough.<br /><br />If you have any doubt or queries regarding buying or selling the club house in the space you can always contact to Holm Group that will help you in exploring more.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-90752513112556292442011-07-11T06:35:00.000-07:002011-07-11T06:48:48.618-07:00More Ideas On Business GiftsAs all we know christmas is on its way and like always we want to gift something to our specials.In this post i am going to majorly concentrate on <a href="http://yourcoworkers.blogspot.com/">business gifts</a> ideas that you can gift to your loving ones.If you are tired of always gifting the same type of thing always then here this post can help you in selecting the ideal business gift for your lovable.You can gift the same old type of items like umbrella,pens,mugs,briefcase and etc but in little bit different fashion.<br /><br />Lets assume that you want to gift a Mug to your dear one.A lovely coffee mug designed with your business name and logo on it is a great way to give your business a leg up. It may seem like a small item but it is one that is extremely significant because it is an item that is used in homes and offices all around the world. It is used on the go and in the public eye on many occasions and it is also the type of item that can be given out alone for a business referral or to a special customer or one that can serve a variety of other purposes can be jazzed up to make a nice gift or even an incredible centerpiece.<br /><br />You can also consider umbrellas as an option for <a href="http://yourcoworkers.blogspot.com/">business gifts</a> because wherever it goes it will promote your business.Logo umbrellas can will help you to make your business stand out at a tradeshow or community event and what you will find is that colorful umbrella will make people take notice and come in for a closer look of what is being offered under the umbrella. Because these items are so large and eye catching they really do help to attract customers to your booth or table and help to get you more attention than others when at such a large event.<br /><br />If you are interested in knowing more,please leave a comment or you can visit <a href="http://yourcoworkers.blogspot.com/">yourcoworkers.blogspot.com</a>.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-67273841289457273332011-07-10T22:59:00.000-07:002011-07-10T23:13:53.303-07:00Format FAT32 DriveThere are many cases where you need a FAT32 drive. For example, I had to reformat my HDD in FAT32 for transferring files to my PS3.<br /><br />You can format your drive (HDD, usb etc) easily by using the mkfs utility. But before you issue the mkfs command you need to verify that your system supports FAT32. Open your terminal and type:<br /><br />cat /proc/filesystem<br /><br />If the output contains vfat, you can proceed. Now issue the following command:<br /><br />sudo mkfs.vfat -n <label> <device></device></label>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-44143502036814505112010-11-27T04:09:00.000-08:002010-11-27T04:10:53.171-08:00Once again Ticket America RocksIf you plan to attend any kind of ticketed event on your travels to the USA, then I can give a big thumbs up to Ticketamerica.com, the biggest provider around, and in my experience, also the best. I've used this service several times when attending sporting events in the USA, and it works quite smoothly, so I have no real complaints at all about the service. The biggest point for Ticketamerica is that they are far from unique in applying these extra costs, and it is symptomatic of the ticketing industry in general, rather than this one individual supplier. With ticket america can get a chance to visit all the best stadiums across whole america which includes <a href="http://www.ticketamerica.com/venue/bank_of_america_stadium_tickets.html">Bank of America Stadium</a>,Lucas Oil Stadium,<a href="http://www.ticketamerica.com/venue/lambeau_field_tickets.html">Lambeau Field</a>,<a href="http://www.ticketamerica.com/venue/fedex_field_tickets.html">FedEx Field</a>,<a href="http://www.ticketamerica.com/invesco_field_tickets.html">Invesco Field</a> and may more in the same list.<br /><br />Assuming there are tickets remaining to your show, the tickets you have selected will be presented to you. Once they are in your 'basket', you have a limited amount of time to complete the transaction before the tickets are released for other people to buy. This is normally a few minutes worth, but it's often best to have all of your card details at hand to avoid any wasted time. Another alternative is to create an account on the site, whereby all of your personal information is stored, thus making the checkout process a lot quicker.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-36195322110513150762010-10-15T06:25:00.000-07:002010-10-15T06:27:01.547-07:00Take Expertise adavantage on Ticket AmericaIf you enjoy going to see live music then you should check out TicketAmerica.com. They have a huge list of arenas and stadiums all over the country. For example, they offer tickets to events at <a href="http://www.ticketamerica.com/green_bay_packers_tickets.html">Green Bay Packers</a>,Philadelphia,New York Yankees,<a href="http://www.ticketamerica.com/detroit_lions_tickets.html">Detroit Lions</a>,San Fransisco Giants, Arco Arena, <a href="http://www.ticketamerica.com/chicago_bears_tickets.html">Chicago Bears</a>,Staples Center, Texas rangers,<a href="http://www.ticketamerica.com/carolina_panthers_tickets.html">Carolina Panthers</a> and many, many others.<br /><br />The website is easy to navigate and contains all of the information you need to choose the perfect seat and area. They also have phone numbers, layouts and maps. The maps open up into a Google Map page so you can see the entire area (in case you need driving directions or just want to see if there's a restaurant or hotel nearby.)<br /><br />They're touted as having the most comprehensive inventory of tickets online, and tickets are sent via FedEx. Some of the current list of shows are Kelly Clarkson, John Mayer, Leonard Cohen, No Doubt, and Neil Diamond (yes, he's still performing!) There are many, many other tickets available for other shows as well. And you can order from the comfort of your own home.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-92186811247551147352010-10-15T06:23:00.000-07:002010-10-15T06:25:14.021-07:00My Favorite Ticket AmericaIf you enjoy going to see live music then you should check out TicketAmerica.com. They have a huge list of arenas and stadiums all over the country. For example, they offer tickets to events at <a href="http://www.ticketamerica.com/philadelphia_phillies_tickets.html">Philadelphia</a>, <a href="http://www.ticketamerica.com/new_york_yankees_tickets.html">New York Yankees</a>,<a href="http://www.ticketamerica.com/san_francisco_giants_tickets.html">San Fransisco Giants</a>, Arco Arena, Staples Center, <a href="http://www.ticketamerica.com/texas_rangers_tickets.html">Texas rangers</a>, and many, many others.<br /><br />The website is easy to navigate and contains all of the information you need to choose the perfect seat and area. They also have phone numbers, layouts and maps. The maps open up into a Google Map page so you can see the entire area (in case you need driving directions or just want to see if there's a restaurant or hotel nearby.)<br /><br />They're touted as having the most comprehensive inventory of tickets online, and tickets are sent via FedEx. Some of the current list of shows are Kelly Clarkson, John Mayer, Leonard Cohen, No Doubt, and Neil Diamond (yes, he's still performing!) There are many, many other tickets available for other shows as well. And you can order from the comfort of your own home.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-46245884139805942722010-06-24T10:50:00.000-07:002010-06-24T10:51:16.756-07:00Fight against anti aging with OxisAntioxidants are intimately involved in the prevention of cellular damage -- the common pathway for cancer, aging, and a variety of diseases. The scientific community has begun to unveil some of the mysteries surrounding this topic, and the media has begun whetting our thirst for knowledge. Athletes have a keen interest because of health concerns and the prospect of enhanced performance and/or recovery from exercise. The purpose of this article is to serve as a beginners guide to what antioxidants are and to briefly review their role in exercise and general health. What follows is only the tip of the iceberg in this dynamic and interesting subject.<br /><br />Endurance exercise can increase oxygen utilization from 10 to 20 times over the resting state. This greatly increases the generation of free radicals, prompting concern about enhanced damage to muscles and other tissues. The question that arises is, how effectively can athletes defend against the increased free radicals resulting from exercise? Do athletes need to take extra antioxidants?<br /><br />Because it is not possible to directly measure free radicals in the body, scientists have approached this question by measuring the by-products that result from free radical reactions. If the generation of free radicals exceeds the antioxidant defenses then one would expect to see more of these by-products. These measurements have been performed in athletes under a variety of conditions.<br /><br />Glutathione (gamma-glutamyl-cysteinyl-glycine; GSH) is the most abundant low-molecular-weight thiol, and GSH/glutathione disulfide is the major redox couple in animal cells. The synthesis of GSH from glutamate, cysteine, and glycine is catalyzed sequentially by two cytosolic enzymes, gamma-glutamylcysteine synthetase and GSH synthetase. Compelling evidence shows that GSH synthesis is regulated primarily by gamma-glutamylcysteine synthetase activity, cysteine availability, and GSH feedback inhibition. Animal and human studies demonstrate that adequate protein nutrition is crucial for the maintenance of GSH homeostasis. In addition, enteral or parenteral cystine, methionine, N-acetyl-cysteine, and L-2-oxothiazolidine-4-carboxylate are effective precursors of cysteine for tissue GSH synthesis.<br /><br />These initial products position OXIS for a feasible entry into the wellness market with a lot of room for expansion. This paves the way for solid partnerships with leaders in the industry with an established customer base or those with the capacity to build one. The ultimate goal is to be regarded as a health partner. For now, it may be penny stocks for <a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/16206/0">OXIS</a>, but with more nutraceutical products lined up (including functional foods like nutrition bars and energy beverages sold over the Internet and through multi-level marketing, infomercials, direct mail, and retail outlets), the future of OXIS is secure and will benefit people all over, allowing them to be healthy and young.<br /><br /><a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/16206/0">http://www.oxis.com</a><br /><br /><a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/16206/1">Oxis on Twitter</a><br /><br /><br /><a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/16206/2">Oxis on facebook</a><br /><br /><a rel="nofollow" href="http://www.bloggerwave.com/Bloggerwave/c/403/16206/0"><img src="http://www.bloggerwave.com:8080/Bloggerwave/uploadImages/719412972_1274113599711_oxis_video.jpg" style="border-style: none;" alt="" /> </a><br /><br /><a href="http://www.bloggerwave.com/" target="_blank" rel="nofollow"><img style="border-style: none;" src="http://www.bloggerwave.com/Bloggerwave/v/403/16206" /></a>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-71579449683748863682010-06-17T05:44:00.000-07:002010-06-17T05:46:35.075-07:00Netware<div style="text-align: justify;">The NetWare operating system was one of the first software products built for the networking of personal computers (PCs). NetWare emphasizes file and print serving capabilities, and the predominant use of NetWare is as a LAN server. Early version of NetWare appeared in the late 1980s, and today NetWare enjoys an installed base of millions of computers.NetWare is just one of many networking software products and services developed by Novell, Inc. Despite stiff competition from Microsoft and various other companies, Novell continues to offer strong network technology.The netware operating system is also known as Novell NetWare. </div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-58737641398043741692010-05-14T07:14:00.000-07:002010-05-14T07:16:47.375-07:00Know more about USBUSB is a high-performance serial bus communication technology. Most new computers and associated peripheral devices like printers and scanners contain built-in support for this technology. USB hubs for file and printer sharing also exist. USB and FireWire are the most popular, competing standards for networking computer peripherals.<br /><br />Multiple versions of USB have been developed by the computer industry:<br /><br /> * USB 1.0 and 1.1: the first commercial versions supported a maximum data rate of 12 Mbps<br /> * USB 2.0: the current version supports a much faster theoretical maximum rate of 480 Mbps<br /> * USB 3.0: the future standard is expected to support up to 4.8 Gbps<br /><br />Using USB for Local Networking<br />To build a USB network, simply connect USB cables to the USB ports on those devices. USB is plug and play compatible, meaning the operating system USB driver software automatically detects and configures device connections. One USB network supports up to 127 devices.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4MxYVm2W7q7guS7mNYPKiD_QpPz5ZyAlv_Q_U8m27fWyReMDdciVMHAwYLZWvBSyNjeGNVVkRkPnndcB5DM-6d5QZxOdXQCUJ9Wizn_mdRXwBMQMIDj7vx5Ob134xNsKR4OQ5Wpx7SU4/s1600/USB-Dimensions.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 395px; height: 278px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4MxYVm2W7q7guS7mNYPKiD_QpPz5ZyAlv_Q_U8m27fWyReMDdciVMHAwYLZWvBSyNjeGNVVkRkPnndcB5DM-6d5QZxOdXQCUJ9Wizn_mdRXwBMQMIDj7vx5Ob134xNsKR4OQ5Wpx7SU4/s400/USB-Dimensions.gif" alt="" id="BLOGGER_PHOTO_ID_5471129373691319698" border="0" /></a><br /><div style="text-align: justify;">USB interfaces are backward compatible; for example, a USB 2.0 and a USB 1.1 can be networked. When two ends of a connection support different versions of USB, the link automatically runs at the lower speed of the older version. </div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-26122754999955143792010-04-27T06:17:00.000-07:002010-04-27T06:21:01.168-07:00Hotspot in WiFi Network<div style="text-align: justify;">A hotspot is any location where Wi-Fi network access (usually Internet access) is made publicly available. You can often find hotspots in airports, hotels, coffee shops, and other places where business people tend to congregate. Hotspots are considered a valuable productivity tool for business travelers and other frequent users of network services.Technically speaking, hotspots consist of one or several wireless access points installed inside buildngs and/or adjoining outdoor areas. These APs are typically networked to printers and/or a shared high-speed Internet connection. Some hotspots require special application software be installed on the Wi-Fi client, primarily for billing and security purposes, but others require no configuration other than knowledge of the network name (SSID). </div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-66578089288849084892010-04-13T07:10:00.000-07:002010-04-13T07:13:26.787-07:00TraceRoute command<div style="text-align: justify;">Traceroute is a utility program that monitors the network path of test data sent to a remote computer. On Unix and Linux computers, the "traceroute" application is available in the shell, while on Windows computers, the "tracert" program can be accessed from DOS.Traceroute programs take the name or IP address of a remote computer on the command line. When run, traceroute sends a series test messages over the network (using ICMP) to each intermediate router progressing until the last message finally reaches its destination. When finished, traceroute displays the ordered list of routers that represent the path from that computer to the destination.</div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com1tag:blogger.com,1999:blog-1727778613540867052.post-10796340835826017232010-04-07T06:49:00.000-07:002010-04-07T06:55:07.120-07:00Concept of Aircards<div style="text-align: justify;">An aircard is a type of wireless broadband modem used for connecting to cellular networks. Aircards provide roaming access to the Internet from mobile computers outside the range of Wi-Fi hotspots. They may also be used as an alternative to home dial up Internet service in rural areas.<br /><br /><span style="font-weight: bold;">Types of Aircards</span><br />Several manufacturers produce wireless network modems including Kyocera, Novatel, Option and Pantech. In recent years, however, the term "aircard" has become associated most closely with the Sierra Wireless AirCard brand of wireless modem products.<br /><br />Cellular network service providers typically bundle (and sometimes rebrand) compatible wireless modems together with their service contracts. In the U.S., for example, both AT&T and Verizon utilize Sierra Wireless products even though these may be called "AT&T AirCard" and "Verizon AirCard."<br /></div>Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0tag:blogger.com,1999:blog-1727778613540867052.post-1595389148787101282010-04-01T07:14:00.000-07:002010-04-01T07:18:20.024-07:00Understand Broadband Router<div style="text-align: justify;">A broadband router combines the features of a traditional network switch, a firewall, and a DHCP server. Broadband routers are designed for convenience in setting up home networks, particularly for homes with high-speed cable modem or DSL Internet service. A broadband router supports file sharing, Internet connection sharing, and home LAN gaming.<br /><br />A broadband router follow the Ethernet standard for home networking. Traditional broadband routers required Ethernet cables be run between the router, the broadband modem, and each computer on the home LAN. The newer wireless routers also support broadband Internet access and the Ethernet standard without the need for cabling.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCgQQ68X45LqyH5UYj0ysUMdIv9yusD0MlzWOswztmeiEORSO13YSdHWhDfFxTa0_9L4bMP152FWP9qCR27yo80TwRwFSq9WyQEw0kcTEidcDfhM_xBccPU-cQ54PrJkHpFb9h1byyDo0/s1600/CABROUT1.GIF"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 330px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCgQQ68X45LqyH5UYj0ysUMdIv9yusD0MlzWOswztmeiEORSO13YSdHWhDfFxTa0_9L4bMP152FWP9qCR27yo80TwRwFSq9WyQEw0kcTEidcDfhM_xBccPU-cQ54PrJkHpFb9h1byyDo0/s400/CABROUT1.GIF" alt="" id="BLOGGER_PHOTO_ID_5455172806570370850" border="0" /></a><br />Several manufacturers offer broadband router products to the consumer. Features that differentiate broadband router products include the number and type of ports available on the unit for cabling computers, external modems, or other network devices.</div><br /><br />Note: Image reference is taken from the answers.com.Sauravhttp://www.blogger.com/profile/04469940135980090242noreply@blogger.com0