Best movie sites in India | ||||
In India one can avail a variety of services by the Consultants. Consultants in India offer a wide array of services like placement, recruitment, Education, Business, immigration,Finance etc. Each kind of consultancy have their respective agenda and function,say the the placement consultancies provide jobs for the job seekers. The list below will give the names of the best consultants in India:
List Of Best movie sites in India :iMovies4you.com :It is one of the top movie sites of India. Just click to get your favorite movie. It is the one stop destination for the movie lovers. It offers movies in various categories like Bollywood , Hollywood , Kollywood , Live Radio etc. Check out the best movies in this movie site.IMDb :It is one of the major movie sites of India. The Internet Movie Database is the ultimate destination for the movie freaks in India. Browse the wide options like the Tops at the Box Office , Coming soon movies, New DVDs of the week etc. This movie site is visited by about 57 million movie lovers.MoviesFromIndia.com:It is one of the leading movie sites of India . You can view all types of movies like Hindi Movies , Telugu movies , Malayalam Movies , Kannada Movies etc. Just browse the mouse over the preferred movie category and enjoy. This site many options for the user.Hi Indians.com:It is one of the most popular movie sites of India. Download movies or watch movies through this movie site. Browse the hot movies , Hindi Movie , Hindi movie trailers ,dvd movies etc in this movie site. It offers full entertainment for the movie lovers in India. | ||||
Bollywoodsargam:This movie site in India satisfies all your whims related to movies. All kinds of movies like Hollywood , Bollywood , Lollywood , Kollywood , Tollywood is just awaiting the single click of a mouse. Watch out what is the latest and the hottest thing happening in the movies through this site.123onlinemovies.com :This movie site offers ample tools for the movie freaks. Check out the sections like Movie Index , Recent Movies in Bollywood , Tollywood through this site. You can also view the comments on the latest movies and write comments also. Watch out for the latest movies in all the Indian states in this movie siteYolike.com:You can view movies online through this site. The ideal movie site for Bollywood movies is yolike.com. You can also see the Bollywood news in this site. Search for the desired movie and then watch it online. You can also download music videos through this site.Filmymantra.com :In this movie site , you can get all information related to movies . Check out the director and cast of any Bollywood movie. You can also watch the comments about the movies and post comments in the site. It is very interesting for those who love movies.MovieKhoj.com :It encompasses a wide range of movie options . Browse the sections like Hindi , Malayalam , Tamil, Bengali , English and many other movies in this site. You can also check out the most popular movies according to years. Visit the site to satisfy your urge for movies.ApnaView :This site offers not only movies but also music videos in various languages. You can watch Hindi movies or Punjabi movies or any other movie online through this site . So just click in and take pleasure of the movies. |
IT Solution
Thursday, December 30, 2010
Most Popular site for Movie Download
Linux reset forgotten root password
You can reset forgotten root password under Linux by booting system into single user mode or emergency mode (also known as rescue mode)
Change the root password, enter:
Finally reboot system:
My boot loader is GRUB (see LILO boot loader below)
)Following is the procedure to reset root password if you are using GRUB as a boot loader:- Select the kernel
- Press the e key to edit the entry
- Select second line (the line starting with the word kernel)
- Press the e key to edit kernel entry so that you can append single user mode
- Append the letter S (or word Single) to the end of the (kernel) line
- Press ENTER key
- Now press the b key to boot the Linux kernel into single user mode
- At prompt type passwd command to reset password:
# mount -t proc proc /proc
# mount -o remount,rw /
Change the root password, enter:
# passwd
Finally reboot system:
# sync
# reboot
Most Toppest Free Software Downloading sites
Free Software downloading sites
Free Software Downloads and Software Reviews - Download.com
Freeware World Center - NONAGS -
SnapFiles - software reviews, download freeware and free trial programs
filehippo.com - Download Free Software
Download.com
The Linux Alternative Project - linuxalt.com
Windows and OS X Software Alternatives | Linux App Finder
Open Source Alternative - Find Open Source Alternatives to commercial software
Free Software Downloads and Software Reviews - Download.com
Freeware World Center - NONAGS -
SnapFiles - software reviews, download freeware and free trial programs
filehippo.com - Download Free Software
Download.com
The Linux Alternative Project - linuxalt.com
Windows and OS X Software Alternatives | Linux App Finder
Open Source Alternative - Find Open Source Alternatives to commercial software
Incoming Call Issue in Vtigercrm using Elastix(Solved )
General approach to fixing Vtiger CRM incoming calls pop-up is to compare Logs and AsteriskClient.php logic. It appears some values may not match or get lost due to Asterisk configuration or version. Not so importaint why - more importaint to make it working as it is.
A.Webserver
1. Have Vtiger installed
2. Setup php.ini value for 30 seconds or similiar value (but not 600 seconds) - this will save your time waiting for logs to appear on screen and enable you to make changes faster. Restart webserver to apply changes (if necessary).
Plan:
1. See how event logs looks like when you make no calls.
2. See how events logs looks like when you make calls.
3. Understand how AsteriskClient.php analyze this log and make pop-ups (not) pop-up.
Execution:
1. See how event logs looks like when you make no calls.
- Start AsteriskClient.php by putting in your web browser similiar address
like http://vt-test.xx/cron/modules/PBXManager/AsteriskClient.php
Browser will behave like it keep opening this address with empty screen but keep waiting till php-script AsteriskClient.php will be stopped by webserver (you remember we changed php.ini value max_execution_time to 30 seconds to make this happen faster).
- Make no calls
- See what events log looks like
This sceen must be something like this - this is how your log looks like when you make no calls:
So we need to achieve Right state - as described above. Only when you have Right state - it worth to continue.
2. See how events logs looks like when you make calls.
Now, after php-script is stopped and you have Right state on screen, make it run again (can just click refresh in browser) and make call to your Asterisk number. You must hear the ring, wait few seconds and denie call (hungup). Now wait till php-script AsteriskClient.php in your browser will stop and show Calling log. This may look something like this:
In this time I was calling from SIP-client 3898276589 to 008220773653 (associated with 8220773653). This is only one call done. When you have dozens of calls this turns to real mess. Now If you saw such log - you can continue to analize.
3. Understand how AsteriskClient.php analyze this log and make pop-ups (not) pop-up.
Actually popup not appear but 1 main reason - AsteriskClient.php "loose" some data necessary to generate window. This happens due to some Asterisk call manager syntax differences (i assume) from version to version. So to make it working - you need to change AsteriskClient.php the way not to "loose" this data.
For the moment I assume you don't see popup. So now is time to have a look at AsteriskClient.php and try to understand why popup not appeared. This quite non linear and intuitive process of working with log and with php-code. Result you saw in previour article regarding Vtiger popup. Now just some tips:
- Assume AsteriskClient.php "sees" the same log as you see on the screen Calling log. It analyzes only this data - not more not less.
- try to understand logic of AsteriskClient.php and check where it loose some data by putting php-command "echo" with some text info or variables like this.
- have a look at Log and this part of code:
Log
Similiar values marked by similiar color. So main task to analyze whole login of AsteriskClient.php and compare it to your Log - may be some values have different names or may be you don't have them at all, but wothout them AsteriskClient.php not pass your request further to so wanted pop-up.
Initial steps
A.Webserver
1. Have Vtiger installed
2. Setup php.ini value for 30 seconds or similiar value (but not 600 seconds) - this will save your time waiting for logs to appear on screen and enable you to make changes faster. Restart webserver to apply changes (if necessary).
Start catching:
Catching done mainly by analyzing logs. So in order to do it lets approach to logs.Plan:
1. See how event logs looks like when you make no calls.
2. See how events logs looks like when you make calls.
3. Understand how AsteriskClient.php analyze this log and make pop-ups (not) pop-up.
Execution:
1. See how event logs looks like when you make no calls.
- Start AsteriskClient.php by putting in your web browser similiar address
like http://vt-test.xx/cron/modules/PBXManager/AsteriskClient.php
Browser will behave like it keep opening this address with empty screen but keep waiting till php-script AsteriskClient.php will be stopped by webserver (you remember we changed php.ini value max_execution_time to 30 seconds to make this happen faster).
- Make no calls
- See what events log looks like
This sceen must be something like this - this is how your log looks like when you make no calls:
Right state
Wrong state
It means either you have manager.conf (in Asterisk) either Vtiger PBXManager configured wrong here:So we need to achieve Right state - as described above. Only when you have Right state - it worth to continue.
2. See how events logs looks like when you make calls.
Now, after php-script is stopped and you have Right state on screen, make it run again (can just click refresh in browser) and make call to your Asterisk number. You must hear the ring, wait few seconds and denie call (hungup). Now wait till php-script AsteriskClient.php in your browser will stop and show Calling log. This may look something like this:
In this time I was calling from SIP-client 3898276589 to 008220773653 (associated with 8220773653). This is only one call done. When you have dozens of calls this turns to real mess. Now If you saw such log - you can continue to analize.
3. Understand how AsteriskClient.php analyze this log and make pop-ups (not) pop-up.
Actually popup not appear but 1 main reason - AsteriskClient.php "loose" some data necessary to generate window. This happens due to some Asterisk call manager syntax differences (i assume) from version to version. So to make it working - you need to change AsteriskClient.php the way not to "loose" this data.
For the moment I assume you don't see popup. So now is time to have a look at AsteriskClient.php and try to understand why popup not appeared. This quite non linear and intuitive process of working with log and with php-code. Result you saw in previour article regarding Vtiger popup. Now just some tips:
- Assume AsteriskClient.php "sees" the same log as you see on the screen Calling log. It analyzes only this data - not more not less.
- try to understand logic of AsteriskClient.php and check where it loose some data by putting php-command "echo" with some text info or variables like this.
- have a look at Log and this part of code:
Log
Similiar values marked by similiar color. So main task to analyze whole login of AsteriskClient.php and compare it to your Log - may be some values have different names or may be you don't have them at all, but wothout them AsteriskClient.php not pass your request further to so wanted pop-up.
Wednesday, December 29, 2010
Basic Linux Commands
mkdir - make directories
Usage
mkdir [OPTION] DIRECTORY
Options
Create the DIRECTORY(ies), if they do not already exist.
Mandatory arguments to long options are mandatory for short options too.
-m, mode=MODE set permission mode (as in chmod), not rwxrwxrwx - umask
-p, parents no error if existing, make parent directories as needed
-v, verbose print a message for each created directory
-help display this help and exit
-version output version information and exit
cd - change directories
Use cd to change directories. Type cd followed by the name of a directory to access that directory.Keep in mind that you are always in a directory and can navigate to directories hierarchically above or below.
mv- change the name of a directory
Type mv followed by the current name of a directory and the new name of the directory.
Ex: mv testdir newnamedir
pwd - print working directory
will show you the full path to the directory you are currently in. This is very handy to use, especially when performing some of the other commands on this page
rmdir - Remove an existing directory
rm -r
Removes directories and files within the directories recursively.
chown - change file owner and group
Usage
chown [OPTION] OWNER[:[GROUP]] FILE
chown [OPTION] :GROUP FILE
chown [OPTION] --reference=RFILE FILE
Options
Change the owner and/or group of each FILE to OWNER and/or GROUP. With --reference, change the owner and group of each FILE to those of RFILE.
-c, changes like verbose but report only when a change is made
-dereference affect the referent of each symbolic link, rather than the symbolic link itself
-h, no-dereference affect each symbolic link instead of any referenced file (useful only on systems that can change the ownership of a symlink)
-from=CURRENT_OWNER:CURRENT_GROUP
change the owner and/or group of each file only if its current owner and/or group match those specified here. Either may be omitted, in which case a match is not required for the omitted attribute.
-no-preserve-root do not treat `/' specially (the default)
-preserve-root fail to operate recursively on `/'
-f, -silent, -quiet suppress most error messages
-reference=RFILE use RFILE's owner and group rather than the specifying OWNER:GROUP values
-R, -recursive operate on files and directories recursively
-v, -verbose output a diagnostic for every file processed
The following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one takes effect.
-H if a command line argument is a symbolic link to a directory, traverse it
-L traverse every symbolic link to a directory encountered
-P do not traverse any symbolic links (default)
chmod - change file access permissions
Usage
chmod [-r] permissions filenames
r Change the permission on files that are in the subdirectories of the directory that you are currently in. permission Specifies the rights that are being granted. Below is the different rights that you can grant in an alpha numeric format.filenames File or directory that you are associating the rights with Permissions
u - User who owns the file.
g - Group that owns the file.
o - Other.
a - All.
r - Read the file.
w - Write or edit the file.
x - Execute or run the file as a program.
Numeric Permissions:
CHMOD can also to attributed by using Numeric Permissions:
400 read by owner
040 read by group
004 read by anybody (other)
200 write by owner
020 write by group
002 write by anybody
100 execute by owner
010 execute by group
001 execute by anybody
ls - Short listing of directory contents
-a list hidden files
-d list the name of the current directory
-F show directories with a trailing '/'
executable files with a trailing '*'
-g show group ownership of file in long listing
-i print the inode number of each file
-l long listing giving details about files and directories
-R list all subdirectories encountered
-t sort by time modified instead of name
cp - Copy files
cp myfile yourfile
Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists.
cp -i myfile yourfile
With the "-i" option, if the file "yourfile" exists, you will be prompted before it is overwritten.
cp -i /data/myfile
Copy the file "/data/myfile" to the current working directory and name it "myfile". Prompt before overwriting the file.
cp -dpr srcdir destdir
Copy all files from the directory "srcdir" to the directory "destdir" preserving links (-poption), file attributes (-p option), and copy recursively (-r option). With these options, a directory and all it contents can be copied to another dir
ln - Creates a symbolic link to a file.
ln -s test symlink
Creates a symbolic link named symlink that points to the file test Typing "ls -i test symlink" will show the two files are different with different inodes. Typing "ls -l test symlink" will show that symlink points to the file test.
locate - A fast database driven file locator.
slocate -u
This command builds the slocate database. It will take several minutes to complete this command.This command must be used before searching for files, however cron runs this command periodically on most systems.locate whereis Lists all files whose names contain the string "whereis". directory.
more - Allows file contents or piped output to be sent to the screen one page at a time
less - Opposite of the more command
cat - Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.
whereis - Report all known instances of a command
wc - Print byte, word, and line counts
cal month year - Prints a calendar for the specified month of the specified year.
cat files - Prints the contents of the specified files.
clear - Clears the terminal screen.
cmp file1 file2 - Compares two files, reporting all discrepancies. Similar to the diff command, though the output format differs.
diff file1 file2 - Compares two files, reporting all discrepancies. Similar to the cmp command, though the output format differs.
dmesg - Prints the messages resulting from the most recent system boot.
fg jobs - Brings the current job (or the specified jobs) to the foreground.
file files - Determines and prints a description of the type of each specified file.
find path -name pattern -print
finger users - Prints descriptions of the specified users.
free - Displays the amount of used and free system memory.
ftp hostname
head files - Prints the first several lines of each specified file.
ispell files - Checks the spelling of the contents of the specified files.
kill process_ids
kill - signal process_ids
kill -l
killall - signal program
mail - Launches a simple mail client that permits sending and receiving email messages.
man title
ping host - Sends an echo request via TCP/IP to the specified host. A response confirms that the host is operational.
reboot - Reboots the system (requires root privileges).
shutdown minutes
shutdown -r minutes
sleep time - Causes the command interpreter to pause for the specified number of seconds.
sort files - Sorts the specified files. The command has many useful arguments; see the online documentation.
split file - Splits a file into several smaller files. The command has many arguments; see the online documentation
sync - Completes all pending input/output operations (requires root privileges).
telnet host - Opens a login session on the specified host.
top - Prints a display of system processes that's continually updated until the user presses the q key.
traceroute host - Uses echo requests to determine and print a network path to the host.
uptime - Prints the system uptime.
w - Prints the current system users.
wall - Prints a message to each user except those who've disabled message reception. Type Ctrl-D to end the message.
Usage
mkdir [OPTION] DIRECTORY
Options
Create the DIRECTORY(ies), if they do not already exist.
Mandatory arguments to long options are mandatory for short options too.
-m, mode=MODE set permission mode (as in chmod), not rwxrwxrwx - umask
-p, parents no error if existing, make parent directories as needed
-v, verbose print a message for each created directory
-help display this help and exit
-version output version information and exit
cd - change directories
Use cd to change directories. Type cd followed by the name of a directory to access that directory.Keep in mind that you are always in a directory and can navigate to directories hierarchically above or below.
mv- change the name of a directory
Type mv followed by the current name of a directory and the new name of the directory.
Ex: mv testdir newnamedir
pwd - print working directory
will show you the full path to the directory you are currently in. This is very handy to use, especially when performing some of the other commands on this page
rmdir - Remove an existing directory
rm -r
Removes directories and files within the directories recursively.
chown - change file owner and group
Usage
chown [OPTION] OWNER[:[GROUP]] FILE
chown [OPTION] :GROUP FILE
chown [OPTION] --reference=RFILE FILE
Options
Change the owner and/or group of each FILE to OWNER and/or GROUP. With --reference, change the owner and group of each FILE to those of RFILE.
-c, changes like verbose but report only when a change is made
-dereference affect the referent of each symbolic link, rather than the symbolic link itself
-h, no-dereference affect each symbolic link instead of any referenced file (useful only on systems that can change the ownership of a symlink)
-from=CURRENT_OWNER:CURRENT_GROUP
change the owner and/or group of each file only if its current owner and/or group match those specified here. Either may be omitted, in which case a match is not required for the omitted attribute.
-no-preserve-root do not treat `/' specially (the default)
-preserve-root fail to operate recursively on `/'
-f, -silent, -quiet suppress most error messages
-reference=RFILE use RFILE's owner and group rather than the specifying OWNER:GROUP values
-R, -recursive operate on files and directories recursively
-v, -verbose output a diagnostic for every file processed
The following options modify how a hierarchy is traversed when the -R option is also specified. If more than one is specified, only the final one takes effect.
-H if a command line argument is a symbolic link to a directory, traverse it
-L traverse every symbolic link to a directory encountered
-P do not traverse any symbolic links (default)
chmod - change file access permissions
Usage
chmod [-r] permissions filenames
r Change the permission on files that are in the subdirectories of the directory that you are currently in. permission Specifies the rights that are being granted. Below is the different rights that you can grant in an alpha numeric format.filenames File or directory that you are associating the rights with Permissions
u - User who owns the file.
g - Group that owns the file.
o - Other.
a - All.
r - Read the file.
w - Write or edit the file.
x - Execute or run the file as a program.
Numeric Permissions:
CHMOD can also to attributed by using Numeric Permissions:
400 read by owner
040 read by group
004 read by anybody (other)
200 write by owner
020 write by group
002 write by anybody
100 execute by owner
010 execute by group
001 execute by anybody
ls - Short listing of directory contents
-a list hidden files
-d list the name of the current directory
-F show directories with a trailing '/'
executable files with a trailing '*'
-g show group ownership of file in long listing
-i print the inode number of each file
-l long listing giving details about files and directories
-R list all subdirectories encountered
-t sort by time modified instead of name
cp - Copy files
cp myfile yourfile
Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists.
cp -i myfile yourfile
With the "-i" option, if the file "yourfile" exists, you will be prompted before it is overwritten.
cp -i /data/myfile
Copy the file "/data/myfile" to the current working directory and name it "myfile". Prompt before overwriting the file.
cp -dpr srcdir destdir
Copy all files from the directory "srcdir" to the directory "destdir" preserving links (-poption), file attributes (-p option), and copy recursively (-r option). With these options, a directory and all it contents can be copied to another dir
ln - Creates a symbolic link to a file.
ln -s test symlink
Creates a symbolic link named symlink that points to the file test Typing "ls -i test symlink" will show the two files are different with different inodes. Typing "ls -l test symlink" will show that symlink points to the file test.
locate - A fast database driven file locator.
slocate -u
This command builds the slocate database. It will take several minutes to complete this command.This command must be used before searching for files, however cron runs this command periodically on most systems.locate whereis Lists all files whose names contain the string "whereis". directory.
more - Allows file contents or piped output to be sent to the screen one page at a time
less - Opposite of the more command
cat - Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.
whereis - Report all known instances of a command
wc - Print byte, word, and line counts
bg
bg jobs Places the current job (or, by using the alternative form, the specified jobs) in the background, suspending its execution so that a new user prompt appears immediately. Use the jobs command to discover the identities of background jobs.
cal month year - Prints a calendar for the specified month of the specified year.
cat files - Prints the contents of the specified files.
clear - Clears the terminal screen.
cmp file1 file2 - Compares two files, reporting all discrepancies. Similar to the diff command, though the output format differs.
diff file1 file2 - Compares two files, reporting all discrepancies. Similar to the cmp command, though the output format differs.
dmesg - Prints the messages resulting from the most recent system boot.
fg
fg jobs - Brings the current job (or the specified jobs) to the foreground.
file files - Determines and prints a description of the type of each specified file.
find path -name pattern -print
Searches the specified path for files with names matching the specified pattern (usually enclosed in single quotes) and prints their names. The find command has many other arguments and functions; see the online documentation.
finger users - Prints descriptions of the specified users.
free - Displays the amount of used and free system memory.
ftp hostname
Opens an FTP connection to the specified host, allowing files to be transferred. The FTP program provides subcommands for accomplishing file transfers; see the online documentation.
head files - Prints the first several lines of each specified file.
ispell files - Checks the spelling of the contents of the specified files.
kill process_ids
kill - signal process_ids
kill -l
Kills the specified processes, sends the specified processes the specified signal (given as a number or name), or prints a list of available signals.
killall program
killall - signal program
Kills all processes that are instances of the specified program or sends the specified signal to all processes that are instances of the specified program.
mail - Launches a simple mail client that permits sending and receiving email messages.
man title
man section title - Prints the specified man page.
ping host - Sends an echo request via TCP/IP to the specified host. A response confirms that the host is operational.
reboot - Reboots the system (requires root privileges).
shutdown minutes
shutdown -r minutes
Shuts down the system after the specified number of minutes elapses (requires root privileges). The -r option causes the system to be rebooted once it has shut down.
sleep time - Causes the command interpreter to pause for the specified number of seconds.
sort files - Sorts the specified files. The command has many useful arguments; see the online documentation.
split file - Splits a file into several smaller files. The command has many arguments; see the online documentation
sync - Completes all pending input/output operations (requires root privileges).
telnet host - Opens a login session on the specified host.
top - Prints a display of system processes that's continually updated until the user presses the q key.
traceroute host - Uses echo requests to determine and print a network path to the host.
uptime - Prints the system uptime.
w - Prints the current system users.
wall - Prints a message to each user except those who've disabled message reception. Type Ctrl-D to end the message.
Tuesday, December 28, 2010
Network Topology
Computer network topologies can be categorized in the following categories.
• bus
• star
• ring
• mesh
• Tree.
Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies
Bus Topology
Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
Ethernet bus topologies are easy to install and don’t require much cabling and only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is not effect on the other computers in a network.
Ring Topology
In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.
Star Topology
In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
As compared to the bus topology, a star network requires more devices & cables to complete a network. The failure of each node or cable in a star network, won’t take down the entire network
as compared to the Bus topology.
However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.
Tree Topology
Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.
Mesh Topology
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.
Summary
Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfiguration network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So the basic understanding of the network topologies and network devices is a must to build a good network.
• bus
• star
• ring
• mesh
• Tree.
Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies
Bus Topology
Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
Ring Topology
In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any cable or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
FDDI, SONET or Token Ring Technology can be used to implement Ring Technology. Ring topologies can be found in office, school or small buildings.
Star Topology
In the computer networking world the most commonly used topology in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hub, switch or router. The functionality of all these devices is different. I have covered the detail of each networking devices in the separate portion of my website. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables.
As compared to the bus topology, a star network requires more devices & cables to complete a network. The failure of each node or cable in a star network, won’t take down the entire network
as compared to the Bus topology.
However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.
Tree Topology
Tree topologies are comprised of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.
Mesh Topology
Mesh topology work on the concept of routes. In Mesh topology, message sent to the destination can take any possible shortest, easiest route to reach its destination. In the previous topologies star and bus, messages are usually broadcasted to every computer, especially in bus topology. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise. Internet employs the Mesh topology and the message finds its route for its destination. Router works in find the routes for the messages and in reaching them to their destinations.The topology in which every devices connects to every other device is called a full Mesh topology unlike in the partial mesh in which every device is indirectly connected to the other devices.
Summary
Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology. Similarly you should have the knowledge of each network device so that you can properly use them according to your network needs. A misconfiguration network can result in a waste of time and energy as well as a lots of troubleshooting methods to resolve the issue. So the basic understanding of the network topologies and network devices is a must to build a good network.
How to Hide a shared folder in Windows XP
If you want to hide a shared folder from the network users, right click the folder and click sharing and security and give a shared name of a folder plus $ sign e.g. e books$. In this way network users will not be able to see the shared folder on the network. For you to see the hidden shared folder, map the drive and type in the path including the $ sign in the folder box.
Subscribe to:
Posts (Atom)