All Stories

Friday 17 October 2014

Before You Begin: Your device should have at least 60% of battery life left so it doesn’t get turned OFF while the process is going on.

=============================================================
I. ROOTING STEPS
=============================================================
1. Download SuperOneClick from the link below and save it on your desktop.

http://www.mediafire.com/download/73gt35e79h2oa4x/Superoneclick+2.1.rar

2. Connect your phone to the computer. Note that after connecting the phone, you must not mount SD card.(choosing 'none' or 'charge only' in the USB connection window on the Defy should ensure the SD card is not mounted).

3. Extract the .rar file using winrar or similar, and launch SuperOneClick.exe on your PC.

4. Simply click on Root tab. The process will begin. Once you see "waiting for device", in your phone go to Settings > Applications > Development and enable USB Debugging.

5. During the rooting process, the program will ask you whether to install busybox. Select yes.

6. Wait for the rooting process to finish. It will take some time so hang in there.

There you go! You now have a rooted Motorola Defy ready to accept a custom ROM.

=====================================================================
II. Installing ClockworkMod Recovery and Custom ROM on the Motorola Defy:
=====================================================================
1. GO TO SETTINGS > APPLICATIONS > ENABLE UNKNOWN SOURCES

2. Download following files from the below link to your desktop

http://www.mediafire.com/download/5f1i2rsokfug1hk/SndInitDefy_2.3.apk

http://download.cyanogenmod.org/get/jenkins/2922/cm-7.2.0-jordan.zip 

http://goo-inside.me/gapps/gapps-gb-20110828-signed.zip

3. Transfer the downloaded files to the root of your MicroSD Card in the phone.

4. On the phone install "ES FILE EXPLORER FILE MANAGER" from android markets

5. open ES File Explorer and click on  SndInitDefy_2.3.apk to install it.

6. open Defy2ndInit app and then click on "Install 2ndInit Bootmenu" (The led light at the top left will change from red to green and word success will be displayed on the screen).

7. Turn the phone off.

8. Switch on the phone and once the blue LED is ON immediately press vol-down button.

9. Go into Recovery =>Select Custom Recovery  (press Volume Up and Down keys to Navigate and press the Power button to Select)

Wipe Data/Factory Reset 
Wipe Cache Partition
Go into Advance => Wipe Dalvik Cache
+++++Go Back+++++

10. Select "Install Zip from the SD Card"

11. Select and install - cm-7.2.0-jordan.zip

12. Select and install - gapps-gb-20110828-signed.zip

Wait for installation to complete then select Reboot from the menu. 

Please Note:- Phone may take a while to reboot. Do not try to switch off or remove the battery.

Installing Custom ROM on Motorola Defy MB525

Before You Begin: Your device should have at least 60% of battery life left so it doesn’t get turned OFF while the process is going on.

=============================================================
I. ROOTING STEPS
=============================================================
1. Download SuperOneClick from the link below and save it on your desktop.

http://www.mediafire.com/download/73gt35e79h2oa4x/Superoneclick+2.1.rar

2. Connect your phone to the computer. Note that after connecting the phone, you must not mount SD card.(choosing 'none' or 'charge only' in the USB connection window on the Defy should ensure the SD card is not mounted).

3. Extract the .rar file using winrar or similar, and launch SuperOneClick.exe on your PC.

4. Simply click on Root tab. The process will begin. Once you see "waiting for device", in your phone go to Settings > Applications > Development and enable USB Debugging.

5. During the rooting process, the program will ask you whether to install busybox. Select yes.

6. Wait for the rooting process to finish. It will take some time so hang in there.

There you go! You now have a rooted Motorola Defy ready to accept a custom ROM.

=====================================================================
II. Installing ClockworkMod Recovery and Custom ROM on the Motorola Defy:
=====================================================================
1. GO TO SETTINGS > APPLICATIONS > ENABLE UNKNOWN SOURCES

2. Download following files from the below link to your desktop

http://www.mediafire.com/download/5f1i2rsokfug1hk/SndInitDefy_2.3.apk

http://download.cyanogenmod.org/get/jenkins/2922/cm-7.2.0-jordan.zip 

http://goo-inside.me/gapps/gapps-gb-20110828-signed.zip

3. Transfer the downloaded files to the root of your MicroSD Card in the phone.

4. On the phone install "ES FILE EXPLORER FILE MANAGER" from android markets

5. open ES File Explorer and click on  SndInitDefy_2.3.apk to install it.

6. open Defy2ndInit app and then click on "Install 2ndInit Bootmenu" (The led light at the top left will change from red to green and word success will be displayed on the screen).

7. Turn the phone off.

8. Switch on the phone and once the blue LED is ON immediately press vol-down button.

9. Go into Recovery =>Select Custom Recovery  (press Volume Up and Down keys to Navigate and press the Power button to Select)

Wipe Data/Factory Reset 
Wipe Cache Partition
Go into Advance => Wipe Dalvik Cache
+++++Go Back+++++

10. Select "Install Zip from the SD Card"

11. Select and install - cm-7.2.0-jordan.zip

12. Select and install - gapps-gb-20110828-signed.zip

Wait for installation to complete then select Reboot from the menu. 

Please Note:- Phone may take a while to reboot. Do not try to switch off or remove the battery.

Posted at 08:58 |  by viralnom

0 comments:

Saturday 17 May 2014

MICROSOFT OFFICE 2010 PRODUCT KEY:

VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB for Project 2010 Professional
BFR7Q-BJJ7T-FB2RC-RQP9G-J78GC for Project 2010 Professional
22HGX-728MX-BBWX9-7BB8X-J96B4 for Project 2010 Professional
CQYRY-3KBR3-JW34C-VGH7M-MQM49 for Visio Premium uses
PQCFB-YGXGC-TXB66-DH3VW-GCGYQ for Visio Premium uses

Office 2010 Professional Plus       
VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB  
3W3MQ-H7M6X-3WYP7-TPCH6-8G8T2  
MKCGC-FBXRX-BMJX6-F3Q8C-2QC6P 
2KKDC-67TT9-4XT2F-2MG99-B9HB6  
MSDN Retail     YMBQG-KH9Y8-HJJFP-FJK8J-QGFGK  
MSDN Retail     2J47K-J32XK-4F3BP-QGPF6-G3P6D  
MSDN Retail     BDD3G-XM7FB-BD2HM-YK63V-VQFDK  
MSDN Retail     6QFDX-PYH2G-PPYFD-C7RJM-BBKQ8 
MSDN Retail     MD6VB-X9MVK-K94YP-JXBPJ-C2HGK  
MSDN Retail     6TX3V-WRDJ6-JC34X-BDDPV-6F3PB

Office 2010 Standard       
V7QKV-4XVVR-XYV4D-F7DFM-8R6BM 
6HJT3-2FGBC-DHKVV-672GY-VCJHK  
MSDN Retail     7TF8R-933DG-MCBQR-TXPM7-G4JRM  
MSDN Retail     6R7J3-K4CB9-PG7BR-TVDBG-YPGBD  
MSDN Retail     HXJQ4-VT6T8-7YPRK-R2HQG-CYPPY  
MSDN Retail     6DJK7-G8G3F-FXB42-8V7CW-3R22X  
MSDN Retail     YWFQQ-72JGG-BX6G8-7YWWP-QHQ29 
MSDN Retail     33VGV-WJWK8-X3RFF-JDTXG-9BDG9  
MSDN Retail     GF8X2-9XRHD-FM2W9-WVRTC-7B3PG  
MSDN Retail     GFVR6-3B64G-BWB8P-QDV62-XFV2R


windows 8 product key

Microsoft Office 2010 Product Key

MICROSOFT OFFICE 2010 PRODUCT KEY:

VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB for Project 2010 Professional
BFR7Q-BJJ7T-FB2RC-RQP9G-J78GC for Project 2010 Professional
22HGX-728MX-BBWX9-7BB8X-J96B4 for Project 2010 Professional
CQYRY-3KBR3-JW34C-VGH7M-MQM49 for Visio Premium uses
PQCFB-YGXGC-TXB66-DH3VW-GCGYQ for Visio Premium uses

Office 2010 Professional Plus       
VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB  
3W3MQ-H7M6X-3WYP7-TPCH6-8G8T2  
MKCGC-FBXRX-BMJX6-F3Q8C-2QC6P 
2KKDC-67TT9-4XT2F-2MG99-B9HB6  
MSDN Retail     YMBQG-KH9Y8-HJJFP-FJK8J-QGFGK  
MSDN Retail     2J47K-J32XK-4F3BP-QGPF6-G3P6D  
MSDN Retail     BDD3G-XM7FB-BD2HM-YK63V-VQFDK  
MSDN Retail     6QFDX-PYH2G-PPYFD-C7RJM-BBKQ8 
MSDN Retail     MD6VB-X9MVK-K94YP-JXBPJ-C2HGK  
MSDN Retail     6TX3V-WRDJ6-JC34X-BDDPV-6F3PB

Office 2010 Standard       
V7QKV-4XVVR-XYV4D-F7DFM-8R6BM 
6HJT3-2FGBC-DHKVV-672GY-VCJHK  
MSDN Retail     7TF8R-933DG-MCBQR-TXPM7-G4JRM  
MSDN Retail     6R7J3-K4CB9-PG7BR-TVDBG-YPGBD  
MSDN Retail     HXJQ4-VT6T8-7YPRK-R2HQG-CYPPY  
MSDN Retail     6DJK7-G8G3F-FXB42-8V7CW-3R22X  
MSDN Retail     YWFQQ-72JGG-BX6G8-7YWWP-QHQ29 
MSDN Retail     33VGV-WJWK8-X3RFF-JDTXG-9BDG9  
MSDN Retail     GF8X2-9XRHD-FM2W9-WVRTC-7B3PG  
MSDN Retail     GFVR6-3B64G-BWB8P-QDV62-XFV2R


windows 8 product key

Posted at 13:58 |  by viralnom

0 comments:

Saturday 19 April 2014

There are for Only Windows 8 copy and paste it and activate it please don't forget to like, subscribe, comment and share my YouTube video Thanks.  

Click On the ADS which appears on the right side and bottom of the page please thanks.


327NW-9KQ84-P47T8-D8GGY-CWCK7
XKY4K-29RWR-8F6P2-448RF-CRYQH

NG4HW-VH26C-733KW-K6F98-J8CK4


Windows 8 Release Preview Universal Product key:
TK8TP-9JN6P-7X7WW-RFFTV-B7QPF
If you want to enable Windows 8 Media Center use the below product key:
MBFBV-W3DP2-2MVKN-PJCQD-KKTF7 

Some more product keys:




Windows 8 Professional Edition Key :XKY4K-2NRWR-8F6P2-448RF-CRYQH
Windows 8 Release Preview Key:TK8TP-9JN6P-7X7WW-RFFTV-B7QPF
Windows 8 Consumer Preview Key:DNJXJ-7XBW8-2378T-X22TX-BKG7J 
Windows 8 Developers Preview Product key:6RH4V-HNTWC-JQKG8-RFR3R-36498
Windows Server 8 Developers Version Key:4Y8N3-H7MMW-C76VJ-YD3XV-MBDKV
6RH4V-HNTWC-JQKG8-RFR3R-36498
4Y8N3-H7MMW-C76VJ-YD3XV-MBDKV
MBFBV-W3DP2-2MVKN-PJCQD-KKTF7
28VNV-HF42G-K2WM9-JXRJQ-2WBQW
NF32V-Q9P3W-7DR7Y-JGWRW-JFCK8
English: DNJXJ-7XBW8-2378T-X22TX-BKG7J
Chienese: DNJXJ-7XBW8-2378T-X22TX-BKG7J
French: DNJXJ-7XBW8-2378T-X22TX-BKG7J
German: DNJXJ-7XBW8-2378T-X22TX-BKG7J
Japanese: DNJXJ-7XBW8-2378T-X22TX-BKG7J

Windows8 Activation Keys

There are for Only Windows 8 copy and paste it and activate it please don't forget to like, subscribe, comment and share my YouTube video Thanks.  

Click On the ADS which appears on the right side and bottom of the page please thanks.


327NW-9KQ84-P47T8-D8GGY-CWCK7
XKY4K-29RWR-8F6P2-448RF-CRYQH

NG4HW-VH26C-733KW-K6F98-J8CK4


Windows 8 Release Preview Universal Product key:
TK8TP-9JN6P-7X7WW-RFFTV-B7QPF
If you want to enable Windows 8 Media Center use the below product key:
MBFBV-W3DP2-2MVKN-PJCQD-KKTF7 

Some more product keys:




Windows 8 Professional Edition Key :XKY4K-2NRWR-8F6P2-448RF-CRYQH
Windows 8 Release Preview Key:TK8TP-9JN6P-7X7WW-RFFTV-B7QPF
Windows 8 Consumer Preview Key:DNJXJ-7XBW8-2378T-X22TX-BKG7J 
Windows 8 Developers Preview Product key:6RH4V-HNTWC-JQKG8-RFR3R-36498
Windows Server 8 Developers Version Key:4Y8N3-H7MMW-C76VJ-YD3XV-MBDKV
6RH4V-HNTWC-JQKG8-RFR3R-36498
4Y8N3-H7MMW-C76VJ-YD3XV-MBDKV
MBFBV-W3DP2-2MVKN-PJCQD-KKTF7
28VNV-HF42G-K2WM9-JXRJQ-2WBQW
NF32V-Q9P3W-7DR7Y-JGWRW-JFCK8
English: DNJXJ-7XBW8-2378T-X22TX-BKG7J
Chienese: DNJXJ-7XBW8-2378T-X22TX-BKG7J
French: DNJXJ-7XBW8-2378T-X22TX-BKG7J
German: DNJXJ-7XBW8-2378T-X22TX-BKG7J
Japanese: DNJXJ-7XBW8-2378T-X22TX-BKG7J

Posted at 08:52 |  by viralnom

1 comments:

Friday 18 April 2014

                  Tool Name: BambooRM
Company Name: Bamboo Solutions
BambooRM allows project managers and teams to collaborate on projects more easily with one repository of project requirements.
BambooRM simplifies requirements management by integrating use cases, business and functional requirements. Managers, business analysts, consultants, and team leaders can view, manage and trace project requirements online in their browsers, including:
  • Creating business requirements for any product or service.
  • Defining and associating sub-level business requirements.
  • Associating use cases with multiple associated business requirements.
  • Associating functional requirements with each business requirement.
  • Prioritizing business and functional requirements.
  • Tracing the project requirements.
  • Creating and printing requirements with easy-to-read summaries.

BambooRM features include:

  1. Task Management
  2. Versioning
  3. Outline View
  4. Shared Documents
  5. Traceability
  6. Move Release to Release
  7. Download Pdf/Word documentation  
  8. Workflow       

Requirement Engineering Tool BambooRM

                  Tool Name: BambooRM
Company Name: Bamboo Solutions
BambooRM allows project managers and teams to collaborate on projects more easily with one repository of project requirements.
BambooRM simplifies requirements management by integrating use cases, business and functional requirements. Managers, business analysts, consultants, and team leaders can view, manage and trace project requirements online in their browsers, including:
  • Creating business requirements for any product or service.
  • Defining and associating sub-level business requirements.
  • Associating use cases with multiple associated business requirements.
  • Associating functional requirements with each business requirement.
  • Prioritizing business and functional requirements.
  • Tracing the project requirements.
  • Creating and printing requirements with easy-to-read summaries.

BambooRM features include:

  1. Task Management
  2. Versioning
  3. Outline View
  4. Shared Documents
  5. Traceability
  6. Move Release to Release
  7. Download Pdf/Word documentation  
  8. Workflow       

Posted at 12:49 |  by viralnom

0 comments:

Sunday 23 March 2014

Sony and Panasonic Announce 1TB Optical Discs 

Sony and Panasonic recently announced from Tokyo, Japan, that 

they have formulated “Archival Discs” that will hold up to 1 TB of 

data. This news may leave Blu-Ray discs in fear of being tossed 

away so soon. The new discs will allow inter-generational 

compatibility between different formats, to ensure that data can be 

read as formats evolve.

1TB Optical Discs

Sony and Panasonic Announce 1TB Optical Discs 

Sony and Panasonic recently announced from Tokyo, Japan, that 

they have formulated “Archival Discs” that will hold up to 1 TB of 

data. This news may leave Blu-Ray discs in fear of being tossed 

away so soon. The new discs will allow inter-generational 

compatibility between different formats, to ensure that data can be 

read as formats evolve.

Posted at 05:29 |  by viralnom

0 comments:

When it comes to purifying water we have been making great strides, however all of this isn’t any good as for 

the majority of time the tech is far out of reach in the parts of the globe where it is needed the most. Many 

people today have water purifiers in their homes and even in their fridges, but filters such as these are not viable 

in some parts of the world as they are not affordable or readily available. However it is in these places that filters 

such as this could improve the quality of many lives and in some cases save lives. Now it seems that a team of 

scientists at MIT could have created just the solution that is needed in developing countries.


Water filter from trees created by scientists

When it comes to purifying water we have been making great strides, however all of this isn’t any good as for 

the majority of time the tech is far out of reach in the parts of the globe where it is needed the most. Many 

people today have water purifiers in their homes and even in their fridges, but filters such as these are not viable 

in some parts of the world as they are not affordable or readily available. However it is in these places that filters 

such as this could improve the quality of many lives and in some cases save lives. Now it seems that a team of 

scientists at MIT could have created just the solution that is needed in developing countries.


Posted at 05:19 |  by viralnom

0 comments:

Wednesday 26 February 2014


Sin Cos Values In Easy Way


Posted at 12:31 |  by viralnom

0 comments:

Saturday 8 February 2014

  1. #include<iostream.h>
  2. #include<conio.h>
  3. void main()
  4. {
  5. int a,b;
  6. clrscr();
  7. cout<<"\n\nEnter the two no=:";
  8. cin>>a>>b;
  9. cout<<"\na"<<a<<"\nb"<<b;
  10. a=a+b;
  11. b=a-b;
  12. a=a-b;
  13. cout<<"\n\na="<<a<<"\nb="<<b;
  14. getch();
  15. }
Learn Easy way of calculating sin-cos-tan values.

Swapping using two variables in C++

  1. #include<iostream.h>
  2. #include<conio.h>
  3. void main()
  4. {
  5. int a,b;
  6. clrscr();
  7. cout<<"\n\nEnter the two no=:";
  8. cin>>a>>b;
  9. cout<<"\na"<<a<<"\nb"<<b;
  10. a=a+b;
  11. b=a-b;
  12. a=a-b;
  13. cout<<"\n\na="<<a<<"\nb="<<b;
  14. getch();
  15. }
Learn Easy way of calculating sin-cos-tan values.

Posted at 02:42 |  by viralnom

0 comments:

Thursday 6 February 2014


Ethernet Standardization

Notwithstanding its technical merits, timely standardization was instrumental to the success of Ethernet. It 

required well-coordinated and partly competitive activities in several standardization bodies such as the 

IEEE, ECMA, IEC, and finally ISO.

The "DIX-group" with Gary Robinson (DEC), Phil Arst (Intel), and Bob Printis (Xerox) submitted the so-

called "Blue Book" CSMA/CD specification as a candidate for the LAN specification. Since IEEE 

membership is open to all professionals, including students, the group received countless comments on this 

technology.

Networks

Simple switched Ethernet networks, while a great improvement over repeater-based Ethernet, suffer from 

single points of failure, attacks that trick switches or hosts into sending data to a machine even if it is not 

intended for it, scalability and security issues with regard to broadcast radiation and multicast traffic, and 

bandwidth choke points where a lot of traffic is forced down a single link.

Advanced networking features in switches and routers combat these issues through a number of means 

including spanning-tree protocol to maintain the active links of the network as a tree while allowing physical 

loops for redundancy, port security and protection features such as MAC lock down and broadcast 

radiation filtering, virtual LANs to keep different classes of users separate while using the same physical 

infrastructure, multi-layer switching to route between different classes and link aggregation to add bandwidth 

to overloaded links and to provide some measure of redundancy.

Standards

The vast majority of customer has LAN's that employ Ethernet as the network protocol - a few uses Token 

Ring.  At least 90% of these networks are 10 BASE-T.  The LAN sits behind the router and hub or high-

speed Ethernet switch, and the workstations are connected in a star topology.  Actually, most networks 

have replaced the Cat 3 cables with Cat 5.  Both Cat 3 and 5 cables have 4 un-shielded, twisted pairs of 

copper wires and use the RJ-45 connector, as shown below:

Comparison

Often referred to as Thick net, 10Base5 was the first incarnation of Ethernet technology. The industry used 

thick net in the 1980s until 10Base2 Thin net appeared. Compared to thick net, thin net offered the 

advantage of thinner (5 millimeters vs. 10 millimeters) and more flexible cabling, making it easier to wire 

office buildings for Ethernet.


The most common form of traditional Ethernet, however, is 10Base-T. 10Base-T offers better electrical 
properties than thick net or Thin net, because 10Base-T cables utilize unshielded twisted pair (UTP) wiring 
rather than coaxial. 10Base-T also proved more cost effective than alternatives like fiber optic cabling.
The table below details these traditional Ethernet technologies. Besides the type of cable involved, another 
important aspect of Ethernet networking is the segment length. A segment is a network connection made by 
a single unbroken network cable. Ethernet cables and segments can only span a limited physical distance, 
after which transmissions will likely fail due to line noise, reduced signal strength and other degradation. Per 
the Ethernet specifications, manufacturers of Ethernet equipment must meet the below minimum 
specifications for segment length.
Numerous other lesser-known Ethernet standards exist, including 10Base-FL, 10Base-FB, and 10Base-
FP for fiber optic networks and 10Broad36 for broadband (cable television) cabling.


Gigabit Ethernet

Whereas Fast Ethernet improved traditional Ethernet from 10 Megabit to 100 Megabit speed, Gigabit 

Ethernet boasts the same order-of-magnitude improvement over Fast Ethernet by offering speeds of 1000 

Megabits (1 Gigabit). Gigabit Ethernet was first made to travel over optical and copper cabling, but the 

1000Base-T standard successfully supports it as well. 1000Base-T uses Category 5 cabling similar to 100 

Mbps Ethernet, although achieving gigabit speed requires the use of additional wire pairs.

100BASE-FX:

100BASE-FX is a version of Fast Ethernet over optical fiber. It uses a 1300 nm near-infrared (NIR) light 

wavelength transmitted via two strands of optical fiber, one for receive (RX) and the other for transmit (TX). 

Maximum length is 400 meters (1,310 ft.) for half-duplex connections (to ensure collisions are detected), 

and 2 kilometres (6,600 ft) for full-duplex over multi-mode optical fiber. 100BASE-FX uses the same 

4B5B encoding and NRZI line code that 100BASE-TX does. 100BASE-FX should use SC, ST, LC, 

MTRJ or MIC connectors with SC being the preferred option.

100BASE-FX is not compatible with 10BASE-FL, the 10 MBit/s versions over optical fiber.

100BASE-SX:

100BASE-SX is a version of Fast Ethernet over optical fiber. It uses two strands of multi-mode optical 

fiber for receive and transmit. It is a lower cost alternative to using 100BASE-FX, because it uses short 

wavelength optics which are significantly less expensive than the long wavelength optics used in 100BASE-

FX. 100BASE-SX can operate at distances up to 550 meters (1,800 ft.).

100BASE-SX uses the same wavelength as 10BASE-FL, the 10 Mbit/s versions over optical fiber. Unlike 

100BASE-FX, this allows 100BASE-SX to be backwards-compatible with 10BASE-FL.

Because of the shorter wavelength used (850 nm) and the shorter distance it can support, 100BASE-SX 

uses less expensive optical components (LEDs instead of lasers) which makes it an attractive option for 

those upgrading from 10BASE-FL and those who do not require long distances.





Ethernet Standardization


Ethernet Standardization

Notwithstanding its technical merits, timely standardization was instrumental to the success of Ethernet. It 

required well-coordinated and partly competitive activities in several standardization bodies such as the 

IEEE, ECMA, IEC, and finally ISO.

The "DIX-group" with Gary Robinson (DEC), Phil Arst (Intel), and Bob Printis (Xerox) submitted the so-

called "Blue Book" CSMA/CD specification as a candidate for the LAN specification. Since IEEE 

membership is open to all professionals, including students, the group received countless comments on this 

technology.

Networks

Simple switched Ethernet networks, while a great improvement over repeater-based Ethernet, suffer from 

single points of failure, attacks that trick switches or hosts into sending data to a machine even if it is not 

intended for it, scalability and security issues with regard to broadcast radiation and multicast traffic, and 

bandwidth choke points where a lot of traffic is forced down a single link.

Advanced networking features in switches and routers combat these issues through a number of means 

including spanning-tree protocol to maintain the active links of the network as a tree while allowing physical 

loops for redundancy, port security and protection features such as MAC lock down and broadcast 

radiation filtering, virtual LANs to keep different classes of users separate while using the same physical 

infrastructure, multi-layer switching to route between different classes and link aggregation to add bandwidth 

to overloaded links and to provide some measure of redundancy.

Standards

The vast majority of customer has LAN's that employ Ethernet as the network protocol - a few uses Token 

Ring.  At least 90% of these networks are 10 BASE-T.  The LAN sits behind the router and hub or high-

speed Ethernet switch, and the workstations are connected in a star topology.  Actually, most networks 

have replaced the Cat 3 cables with Cat 5.  Both Cat 3 and 5 cables have 4 un-shielded, twisted pairs of 

copper wires and use the RJ-45 connector, as shown below:

Comparison

Often referred to as Thick net, 10Base5 was the first incarnation of Ethernet technology. The industry used 

thick net in the 1980s until 10Base2 Thin net appeared. Compared to thick net, thin net offered the 

advantage of thinner (5 millimeters vs. 10 millimeters) and more flexible cabling, making it easier to wire 

office buildings for Ethernet.


The most common form of traditional Ethernet, however, is 10Base-T. 10Base-T offers better electrical 
properties than thick net or Thin net, because 10Base-T cables utilize unshielded twisted pair (UTP) wiring 
rather than coaxial. 10Base-T also proved more cost effective than alternatives like fiber optic cabling.
The table below details these traditional Ethernet technologies. Besides the type of cable involved, another 
important aspect of Ethernet networking is the segment length. A segment is a network connection made by 
a single unbroken network cable. Ethernet cables and segments can only span a limited physical distance, 
after which transmissions will likely fail due to line noise, reduced signal strength and other degradation. Per 
the Ethernet specifications, manufacturers of Ethernet equipment must meet the below minimum 
specifications for segment length.
Numerous other lesser-known Ethernet standards exist, including 10Base-FL, 10Base-FB, and 10Base-
FP for fiber optic networks and 10Broad36 for broadband (cable television) cabling.


Gigabit Ethernet

Whereas Fast Ethernet improved traditional Ethernet from 10 Megabit to 100 Megabit speed, Gigabit 

Ethernet boasts the same order-of-magnitude improvement over Fast Ethernet by offering speeds of 1000 

Megabits (1 Gigabit). Gigabit Ethernet was first made to travel over optical and copper cabling, but the 

1000Base-T standard successfully supports it as well. 1000Base-T uses Category 5 cabling similar to 100 

Mbps Ethernet, although achieving gigabit speed requires the use of additional wire pairs.

100BASE-FX:

100BASE-FX is a version of Fast Ethernet over optical fiber. It uses a 1300 nm near-infrared (NIR) light 

wavelength transmitted via two strands of optical fiber, one for receive (RX) and the other for transmit (TX). 

Maximum length is 400 meters (1,310 ft.) for half-duplex connections (to ensure collisions are detected), 

and 2 kilometres (6,600 ft) for full-duplex over multi-mode optical fiber. 100BASE-FX uses the same 

4B5B encoding and NRZI line code that 100BASE-TX does. 100BASE-FX should use SC, ST, LC, 

MTRJ or MIC connectors with SC being the preferred option.

100BASE-FX is not compatible with 10BASE-FL, the 10 MBit/s versions over optical fiber.

100BASE-SX:

100BASE-SX is a version of Fast Ethernet over optical fiber. It uses two strands of multi-mode optical 

fiber for receive and transmit. It is a lower cost alternative to using 100BASE-FX, because it uses short 

wavelength optics which are significantly less expensive than the long wavelength optics used in 100BASE-

FX. 100BASE-SX can operate at distances up to 550 meters (1,800 ft.).

100BASE-SX uses the same wavelength as 10BASE-FL, the 10 Mbit/s versions over optical fiber. Unlike 

100BASE-FX, this allows 100BASE-SX to be backwards-compatible with 10BASE-FL.

Because of the shorter wavelength used (850 nm) and the shorter distance it can support, 100BASE-SX 

uses less expensive optical components (LEDs instead of lasers) which makes it an attractive option for 

those upgrading from 10BASE-FL and those who do not require long distances.





Posted at 12:49 |  by viralnom

1 comments:

Sunday 2 February 2014




TYPES OF REQUIREMENTS:

  1. User requirements
      The software must provide a means of representing and accessing external files created by other tools.Statements in natural language plus diagrams of the services the system provides and its operational 
constraints.

  1. System requirements
             To be used efficiently, all computer software needs certain hardware components or other software resources to be present on a computer. It is a structured document setting out detailed descriptions of the system services and written as a contract between client and contractor.  These pre-requisites are known as (computer) system requirements and are often used as a guideline as opposed to an absolute rule.

  1. Functional requirements
           What a system should be able to do, the functions it should perform.Statements of services the system should provide how the system should react to particular inputs and how the system should behave in particular situations.
  1. Non-functional requirements
          Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc.
An example of a non-functional requirement is an initialization sequence incorporated into the software that is specific to a given customer.

  1. Domain requirements
              Requirements that come from the application domain of the system and that reflect characteristics of that domain. For example: Library system etc.

  1. Customer Requirements 
             The customers are those that perform the eight primary functions of systems engineering, with special emphasis on the operator as the key customer.

  1. Operational requirements
             Operational requirements will define the basic need and, at a minimum, answer the questions posed.

  1. Architectural Requirements
         An architectural requirement is any requirement that is architecturally significant, whether this significance be implicit or explicit. Implicit architectural requirements are those requirements that have particular attributes. For example, any high-risk, high-priority, or low-stability requirement could be considered to be architecturally significant. The product will be localized.

  1. Behavioral Requirements
         Behavior which is abides by the Law, Responsibility for the Image of Infineon, Work-Related Standards and Principles.

  1. Performance Requirements
          Performance requirements (PR) are necessary for system design and development. If there is no written performance requirements, it just means that they exists in heads of stakeholders, but nobody bothered to write them down and made sure that everybody agrees with them.

  1. Design Requirements
         These Design Requirements apply to all plans, processes, and procedures required for compliance with the Design Process.

  1. Derived Requirements
          A derived requirement is one that was not explicitly stated by a stakeholder but has been derived as part of the requirements analysis process. A derived requirement is therefore not directly stated by a primary source but is derived by systems engineers from an explicit statement of requirement

  1. Product requirements
          Requirements which specify that the delivered product must behave in a particular way, e.g. execution speed, reliability etc.

  1. Organizational requirements
       Requirements which are a consequence of organizational policies and procedures, e.g. process standards used, implementation requirements
etc.
  1. External requirements

          Requirements which arise from factors which are external to the system and its development process, e.g. interoperability requirements, legislative requirements etc.



TYPES OF REQUIREMENTS




TYPES OF REQUIREMENTS:

  1. User requirements
      The software must provide a means of representing and accessing external files created by other tools.Statements in natural language plus diagrams of the services the system provides and its operational 
constraints.

  1. System requirements
             To be used efficiently, all computer software needs certain hardware components or other software resources to be present on a computer. It is a structured document setting out detailed descriptions of the system services and written as a contract between client and contractor.  These pre-requisites are known as (computer) system requirements and are often used as a guideline as opposed to an absolute rule.

  1. Functional requirements
           What a system should be able to do, the functions it should perform.Statements of services the system should provide how the system should react to particular inputs and how the system should behave in particular situations.
  1. Non-functional requirements
          Constraints on the services or functions offered by the system such as timing constraints, constraints on the development process, standards, etc.
An example of a non-functional requirement is an initialization sequence incorporated into the software that is specific to a given customer.

  1. Domain requirements
              Requirements that come from the application domain of the system and that reflect characteristics of that domain. For example: Library system etc.

  1. Customer Requirements 
             The customers are those that perform the eight primary functions of systems engineering, with special emphasis on the operator as the key customer.

  1. Operational requirements
             Operational requirements will define the basic need and, at a minimum, answer the questions posed.

  1. Architectural Requirements
         An architectural requirement is any requirement that is architecturally significant, whether this significance be implicit or explicit. Implicit architectural requirements are those requirements that have particular attributes. For example, any high-risk, high-priority, or low-stability requirement could be considered to be architecturally significant. The product will be localized.

  1. Behavioral Requirements
         Behavior which is abides by the Law, Responsibility for the Image of Infineon, Work-Related Standards and Principles.

  1. Performance Requirements
          Performance requirements (PR) are necessary for system design and development. If there is no written performance requirements, it just means that they exists in heads of stakeholders, but nobody bothered to write them down and made sure that everybody agrees with them.

  1. Design Requirements
         These Design Requirements apply to all plans, processes, and procedures required for compliance with the Design Process.

  1. Derived Requirements
          A derived requirement is one that was not explicitly stated by a stakeholder but has been derived as part of the requirements analysis process. A derived requirement is therefore not directly stated by a primary source but is derived by systems engineers from an explicit statement of requirement

  1. Product requirements
          Requirements which specify that the delivered product must behave in a particular way, e.g. execution speed, reliability etc.

  1. Organizational requirements
       Requirements which are a consequence of organizational policies and procedures, e.g. process standards used, implementation requirements
etc.
  1. External requirements

          Requirements which arise from factors which are external to the system and its development process, e.g. interoperability requirements, legislative requirements etc.



Posted at 11:22 |  by viralnom

0 comments:

ExactSeek Approved !!

Blogger templates. Proudly Powered by Blogger.
back to top