Sunday, September 11, 2011

How can we get Ubuntu in Nepal?

How can we get Ubuntu in Nepal?


Ubuntu is an Open Source Operating System that provides you a lots of applications absolutely genuine. It offers wide range of open source applications including internet, desktop application, platform for users and developers. It runs on every systems so don't worry just :) :) .

    Canonical Ltd. Is committed to the development, distribution and promotion of Open Source software products. It sends CDs completely free of charge through a mail to users who request them. Canonical Ltd. Absorbs shipping cost i.e. 0.13 Euro (these CDs are free promotional materials).
So lets start making some efforts towards Open Source.

you can also download it through Ubuntu Supports:
Download Now! directly from Ubuntu official Website.
Click here for Download.

remember sharing is the best way of learning cause bandwidth is the great resource.
Continue Reading...

What is Open Source?

Open Source Direct Definition from www.opensource.org:













Version 1.9

The indented, italicized sections below appear as annotations to the Open Source Definition (OSD) and are not a part of the OSD. A plain version of the OSD without annotations can be found here.

Introduction

Open source doesn't just mean access to the source code. The distribution terms of open-source software must comply with the following criteria:

1. Free Redistribution

The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale.
Rationale: By constraining the license to require free redistribution, we eliminate the temptation to throw away many long-term gains in order to make a few short-term sales dollars. If we didn't do this, there would be lots of pressure for cooperators to defect.

2. Source Code

The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed.
Rationale: We require access to un-obfuscated source code because you can't evolve programs without modifying them. Since our purpose is to make evolution easy, we require that modification be made easy.
Continue Reading...

Saturday, September 10, 2011

The OSI (Open System Interconnection) Reference Model

The OSI (Open System Interconnection) Model
The most popular packet-based structure of layers, or protocol stack, is called the OSI model (Open System Interconnection) which was created, oddly enough by the reverse acronymn, the ISO (International Organization for Standardization). It defines 7 layers. The user interface (Application Layer) is the top layer, since users work directly with applications. As you work your way down toward the lower layers, the protocols become more detailed toward the nuts and bolts of the operation. They define the details of actually preparing and moving data.

Although there is officially no layer 0 or 8 - conceptually they exist as the physical link (the cable) and the User, as shown below. Note how the packets get larger as each successive layer adds it's own header to the packet that was handed down to it from the layer above.

Application
(Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

Presentation
(Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

Session
(Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

Transport
(Layer 4)
Usually TCP (the top half of TCP/IP). This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Network
(Layer 3)
Typically IP (the bottom half of TCP/IP). This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.

Data Link
(Layer 2)
Ethernet, ATM, Frame Relay, etc. At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

Physical
(Layer 1)
 This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
Continue Reading...

Introduction to Computer Networks



Computer is an information tool. Networks enhance the computer's ability
to exchange, preserve and protect information. Network makes it easier to
share expensive hardware and software.


THE NETWORK

Computers connected over a network can make the information exchange easier and faster. The information moves directly from computer to computer rather than through a human intermediary. A group of computer and other devices connected together is called a NETWORK and the concept of connected computers sharing resources is called NETWORKING.

LAN   Local Area Network

LANs are perfect fro sharing resources within a small geographical area
Approxiamtaly 500 M.


WAN  Wide Area Network
The links WAN can made are as follows:
Over the telephone lines
Using satellite links
Packet Radio Networks
Microwave transceivers


Most WANs are private and are owned by the business that operates with them.
Forming private WANs are usually called VPN i.e. Virtual Private Networks.
As WAN suffers from limited bandwidth, a typical T1 line is considered as fast WAN link.

NETWORK STRUCTURES
A collection of machines running for the users is called HOST.
The hosts are interconnected through the communication subnets or just a subnets.

WAN consists of two distinct components:
Transmission line:
            Are also commonly known as Circuits, Channels and trunks which moves bits between the machines / hosts.

Switching elements:
            They are specialized for connection between two or more transmission lines.
It is commonly known as the Interface Message Processors i.e. IMPs.

Designs implemented through WAN
  1. point to point channels
when a message in the form of a packet is send from one IMP to another IMP via one or more  intermediate IMPs, the packet is received at each intermediate IMP is in entirely, stored there until the required output line is free, and then forwarded.
A subnet using this principle is called point to point, store and forward or packet-switched subnet.

  1. broadcast channels
Broadcast Systems have a single communication channel shared by all other machines on the network. Packets sent by any machine are received by all the others.


NETWORK ARCHITECTURE

Protocol Hierarchies is design to reduce complexity.

The set of layers and protocol is called the Network Architecture.
Layer n on one Machine carries on a conversation with layer n on another machine. The rules and conventions used in this conversation are collectively known as Layer n Protocol.

Design Issues for Layers
  1. Every layer must have a mechanism for connection establishment.
  2. mechanisms for terminating when no longer connection required.
  3. Data Transfer Rules:
    1. Simplex Communication
    2. Half-duplex Communication
    3. Full duplex Communication
  4. Error control mechanisms
  5. Message Ordering

OSI REFERNCE MODEL An Overview
            Open Systems Interconnection OSI, the layered model that dominated data communications and networking literature before 1990.
It was established in 1947, ISO International Standards Organization

Open Systems:
            A set of protocols that allows any two different systems to communicate regardless of their underlying architecture.

Purpose of OSI model:
            To facilitate communication between different systems without requiring changes to the logic of underlying hardware and software.


            As the OSI model is not a protocol. It is model for understanding and designing a network architecture that is flexible, robust and interoperable.
 Layered Architecture:
            The OSI Model is composed of seven ordered Layers:
Layer 1            The Physical Layer
Layer 2            The Data Link Layer
Layer 3            The Network Layer
Layer 4            The Transport Layer
Layer 5            The Session Layer
Layer 6            The Presentation Layer
Layer 7            The Application Layer
Continue Reading...
 

Blogroll

Site Info

Text

IT Academic Training Copyright © 2009 WoodMag is Designed by Ipietoon for Free Blogger Template