Wednesday, October 16, 2013

basic configuration the Mikrotik

0 komentar
Before configuring the IP addresses and routes please check the /interface menu to see the list of available interfaces. If you have Plug-and-Play cards installed in the router, it is most likely that the device drivers have been loaded for them automatically, and the relevant interfaces appear on the /interface print [admin@MikroTik] interface> print Flags: X - disabled, D - dynamic, R - running # NAME...

Basics proxy setup for beginners

0 komentar
Normally you connect to the router by IP addresses with any telnet or SSH client software (a simple text-mode telnet client is usually called telnet and is distributed together with almost any OS). You can also use graphical configuration tool for Windows (also can be run in Linux using Wine) called Winbox. To get Winbox, connect to the router's IP address with a web browser, and follow the link to download winbox.exe...

Wednesday, September 18, 2013

The purpose programming language design

0 komentar
A good language should be easy to compile. Not complicate the compilation process. Complexity can arise because of the symbol have different meanings. Example signs parenthesis (brackets open / close): Grouping sub-expression Restricted arguments in the function / procedureIndex on the arrays (in VB) Expression of mathematics and logic Examples of simple...

What Role Did She Play in Miley-Liam Split? : January Jones

0 komentar
At least one tabloid has said Hemsworth was caught cheating with Eiza Gonzalez over the weekend, a Mexican singer/actress with whom he hooked up in Las Vegas. But other reports have claimed tension between Liam and Miley for weeks, dating back to the latter's lewd Video Music Awards performance and continuing when Cyrus went naked for her "Wrecking Ball" video. Then there's January Jones. Rumors first surfaced in...

Hamming code

0 komentar
Hamming code Richard Hamming invented at Bell Labs in 1950 Error detection mechanisms by adding a data word (D) with a code, usually a parity check bit (C). The data stored in length D + C. Known errors by analyzing the data and parity bits # Data Bits # Bit Paritas SEC # Bit Paritas DEC 8 4 5 16 5 6 32 6 7 64 7 ...

Query for checking

0 komentar
/*before running this script run the report from backoffice first to store the data to table itemsales*/ /*this query will find out variance between sales after tax/gross sales and collected*/ --1.run this script to group all item per salesno SELECT salesno,splitno, Sum(([ItemSales].[Quantity]*[ItemSales].[ItemAmount])*case when ([ItemSales].[TransMode]='REG') then 1 else -1 end *case when ((FunctionID)=26) then 1 else 0 end...

Tuesday, August 24, 2010

Duplex Settings

2 komentar
There are two types of duplex settings used for communications on an Ethernet network: half duplex and full duplex. The figure shows the two duplex settings available on modern network equipment. Half Duplex: Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. This is similar to how walkie-talkies or two-way radios function in that only one person can...

key elements ethernet 802.3 networks

0 komentar
In this topic, you will learn about key components of the Ethernet standard that play a significant role in the design and implementation of switched networks. You will explore how Ethernet communications function and how switches play a role in the communication process. CSMA/CD Ethernet signals are transmitted to every host connected to the LAN using a special set of rules to determine which station can access the network....

Thursday, August 5, 2010

LOGIC GATE

0 komentar
Computer system architecture is composed of a series of logic 1 (true) and 0 (false) combined with a number of logic gates are AND, OR, NOT, NOR, XOR, NAND.The computer program running on the basic structure of good reasoning from a solution to the problems with the help of the program component that is if-then, if - then-else and o...

Friday, July 23, 2010

Access Layer Switch Features

0 komentar
Now that you know which factors to consider when choosing a switch, let us examine which features are required at each layer in a hierarchical network. You will then be able to match the switch specification with its ability to function as an access, distribution, or core layer switch.Access layer switches facilitate the connection of end...

Switch Features

0 komentar
Switch Form FactorsWhat are the key features of switches that are used in hierarchical networks? When you look up the specifications for a switch, what do all of the acronyms and word phrases mean? What does "PoE" mean and what is "forwarding rate"? In this topic, you will learn about these features.When you are selecting a switch, you need...

Sunday, July 18, 2010

Considerations for Hierarchical Network Switches

1 komentar
Traffic Flow AnalysisTo select the appropriate switch for a layer in a hierarchical network, you need to have specifications that detail the target traffic flows, user communities, data servers, and data storage servers.Companies need a network that can meet evolving requirements. A business may start with a few PCs interconnected so that they can share data. As the business adds more employees, devices, such as PCs, printers,...

what is converged network

0 komentar
Small and medium-sized businesses are embracing the idea of running voice and video services on their data networks. Let us look at how voice and video over IP (VoIP) affect a hierarchical network.Legacy EquipmentConvergence is the process of combining voice and video communications on a data network. Converged networks have existed for a while now, but were only feasible in large enterprise organizations because of the network...
 
Trends K N A Copyright © 2009
Fresh Girly Blogger Template Designed by Herro | Powered By Blogger