Search

Tampilkan postingan dengan label General Networking. Tampilkan semua postingan
Tampilkan postingan dengan label General Networking. Tampilkan semua postingan

How Storage Device Problems on your computer?





Storage computer networking has become the important part of the overall IT infrastructure.  Before troubleshooting it is important to understand the storage infrastructure and technologies.  Data from the hard disks can be protected effectively by various methods such as mirroring, backup recovery and remote copy.  There are other advanced storage methods such as virtual storage technologies and network virtualization. 
An organization that has been existed for a couple a years may face many technological changes.  For an enterprise storage solution there is a huge number of technologies that provide required functionalities.
Computer hard disk is an important part of the PC.  In case of any errors in the hard disks computer stops working and operating system fails to load. Following are the most common symptoms of the hard disk failure.

Antivirus great for network security server


Norton Personal Firewall
The key features of the Norton personal firewall are the personal firewall, stealth technology Trojan horses blocking, automatic updating, and monitors and regulates all incoming and outgoing traffic to the internet.  One click administrative control allows limiting the access to the computer or the users on the network.  You can select that which user can connect to you.  It provides defense against the Trojan horses and the spyware.  History log provides access attempt information and the test mode shows how the firewall is providing protection against the hackers.
McAfee Personal Firewall Pro
McAfee Personal Firewall Pro blocks unwanted and unauthorized inbound and outbound internet traffic.  McAfee Personal Firewall Pro is integrated with McAfee virus scan, virus detection and removal.  McAfee Personal Firewall Pro safeguards your personal documents, financial data, photos and online communication by preventing and blocking the unauthorized access to your computer.  One click home network support allows you to configure multiple computers within your home network.  New advanced control features control internet application access.  Intelligent application handling denies outbound internet access to the malicious applications that transfers your personal data to the hackers.
Sygate Personal Firewall Pro
Sygate Personal Firewall Pro is a firewall intrusion defense system.  It protects your personal computer from the hackers and the intruders.  It makes your protected computers invisible to the outer world.  When your network has been compromised then every adjacent computer or network is at risk.  Sygate Personal Firewall Pro can stop the intruders from gaining access to your computer.  Sygate Personal Firewall Pro’s control panel allows you to control the running applications.
Norman Personal Firewall
Norman Personal Firewall protects your computer against the attacks from the internet.  The key features of this software are ports scanning, real time protection, active content control and parental control.
Panda Platinum Internet Security
Panda Platinum Internet Security 2008 protects your personal information and blocks the intruders and hackers.  With Panda Platinum Internet Security all your computer activities will be fully protected and you will be kept secure from the viruses, spyware, Trojan horses, intruders and the hackers.  Panda Platinum Internet Security is a complete security suite that includes firewall system, anti spy ware, anti phishing, anti rootkit, parental control and personal bi directional firewall.  Panda Platinum Internet Security also provides automatic backup system that protects your files from the accidental deletion.  It also allows the deep scanning of your computer with the TotalScan Pro.
Webroot Desktop Firewall
With the Webroot’s two way Desktop Firewall protection system keep your data in and the intruders and hackers out. Webroot Desktop Firewall protects your computer from the unauthorized access, worms, internet threats and the Trojans.  Webroot Desktop Firewall creates comprehensive internet activity logs.  Webroot Desktop Firewall easily allows you to share file and printer with the other computers in your network.  With Webroot Desktop Firewall you get the automatic security alerts when suspicious programs, applications or computers attempt to send information to or from your computer.

In An Introduction to Network Firewalls





A computer and a network without a firewall system can easily be attacked by the hackers, intruders, viruses and spyware. A firewall is a security system, software or hardware that provides a security boundary around a computer system or a computer network and it protects the computer from internal and external security threats such as unauthorized user access and hackers attacks.  There are some positive and negative effects of the firewall software and hardware.  Among the positive effects are the user authentication, auditing and security and the negative effects include network bottleneck, single point of failure and increased management. 
A firewall software or hardware is usually installed or attached on the gateway computer that is directly exposed to the external network such as internet.  Firewall limits the access to the computer and the network resources. A firewall computer is a trusted and secure computer between the internal and external network.  In the following section you will find the best paid and free firewall software and hardware reviews.

Is the Friend's WAN network?





A WAN (Wide Area Network) is a data communication network that covers a broad geographic area.  The term WAN applies to the broader telecommunication infrastructure.  Router is the main communication device in the WAN networks.
How WAN Works?
A WAN is a network of interconnected devices such as router, switches, modems, wireless devices, DSL services, frame relay devices, access servers, ISDN terminal adapters, DSU devices and WAN switches.  The most common WAN circuits are packet switching, circuit switching and point to point communication.  In WAN routing the routing table contains the IP addresses of the source and destination devices.  On the basis of the routing table, the router chooses the best possible shortest path for the packets. 
A point to point link is also known as a leased line and which provides the communication between two remote locations through a carrier network such as Telecommunication Company.  In circuit switching a carrier network is involved in establishing, maintaining and terminating communication session. In packet switching, the communication devices share point to point link to transfer packets from the source and destination. Dial-up services provide cost effective solutions for WAN connectivity.

WAN Technologies
The WAN technologies operate at the lowest level of the OSI layer model.
ATM
ATM or Asynchronous Transfer Mode is a high bandwidth and high speed wide area network technology that operates at the speed of 155Mbps.  ATM is also called cell relay and it supports multiple data types such as data, voice, video etc.  ATM uses fixed sized packets for data communication that are also known as packets.
Dial UP
Dial up WAN provide the cost effective communication solutions.  Dial up demand and dial up backup is the two WAN dial up services.  In a DDR, a router dynamically initiates a call on a switched circuit when it requires sending data. 
In dial backup, switched circuit is used to provide the backup services for other types of networks such as PPP or packet switching.
X.25
X.25 is a data communication protocol in the packet switched networks.  X.25 allows computers at the remote locations to communicate with each other through a centralized computer.
Frame Relay
Frame relay is a very high speed and high performance WAN protocol.  Frame relay operates at the physical and data link layers of the OSI model.  Frame relay is a networking method that is designed for the data transmission between LAN and WAN.
ISDN Lines
Integrated Services Digital Network is a WAN communication method over the regular telephone lines.
Circuit Switching
In WAN, when a router has data for the remote site the switched circuit is initiated.  When two remote networks communicate and authenticate then the communication starts.  ISDN is the best example of the circuit switching network.
Packet Switching
In packet switching the common carrier resources are shared between the remote networks.  ATM, Frame Relay and X.25 are the examples of the packet switched networks.  In this technology, the network has connections into the carrier networks and some portion of the carrier network is shared.
CSU/DSU
Channel Circuit Unit/Digital Circuit Unit is a device that is used to connect a router with the digital circuit like T1.
WAN Routing
WAN routing is a technique of forwarding the packets towards the destination based on the IP address of the next hop.

Introduction to Bluetooth Technology In





Bluetooth is a short range, wire free, secure and international standardized wireless technology that provides wireless communication system between the Bluetooth enabled devices in a short ranged network. Bluetooth technology is a short range wireless technology that was developed by the collaboration of mobile phones and IT companies such as Nokia, Intel, Toshiba, Erickson and IBM. Bluetooth develops short range wireless connections between the laptops, handheld pcs, wireless communication devices and mobile phones. Bluetooth is only available to the personal area networks in an office or a home network.
It reduces the usage of power as compared to the Wi-Fi. Bluetooth is an international standardized technology that is used for the wireless communication between the Bluetooth held devices such as mobile phones, digital camera, laptops, desktop computers, keyboard, mouse, mp3 players, video cameras and other devices.
Bluetooth is free technology and it is provided by the mobile phone operators who are having the capability of GSM and CDMA technology. Bluetooth uses radio waves frequency as a medium and is suitable for the 1, 10 and 100 meters distance. Every Bluetooth enabled devices such as mobile phones, laptops, digital cameras, video games consoles have built-in microchip. There are about more than 1800 members of the Bluetooth consortium from all over the world. Every GSM and CDMA mobile operates must provide the features of the Bluetooth technology to its users. Like the Bluetooth, Wi-Fi uses the same frequency but the power onsumption f th wi-fi is high so it produces more powerful signals.

Blogger Template