Friday 19 October 2012

N/W ( Tutorials II )

What Is Network

A network is a group of computers or nodes connected together. They are connected with each other by communication paths.

Types of Networks:

LAN – Local Area Network connects a group of nodes covering a small physical area. LAN’s are most commonly seen in offices, building etc. LAN’s enable higher transfer rate of data, smaller coverage of area and hence less wiring.


WAN – Wide Area Network connects a group of nodes covering a wide area. WAN typically connects and allow communication between regions or national boundaries. The most common example of WAN is internet.



VPN – Virtual Private Network connects or links nodes in some larger area by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. It is used for secure communication through the public internet. VPN alone may not support explicit security features, such as authentication or content encryption.



Intranet – It is a set of networks under the control of a single administrative person. It can be considered as an internal network of an organization. If it is large, web servers are used to provide information to the users.



Extranet – It is a network that restricts itself within a single organization. It can be categorized as WAN, MAN etc. however; it cannot have a single LAN. It must have a connection (at least one) with external network.


IP, TCP and UDP In Networking

Explain IP, TCP and UDP

TCP – Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent. Hence it is most commonly used in all applications that require guaranteed delivery of data. It can handle both timeouts (if packets were delayed) and retransmission (if packets were lost). The stream of data is transmitted in segments. The segment header is 32 bit. it is a connectionless communication protocol at the third level (network) of the OSI model.

IP – Internet protocol is used for transmission of data over the internet. IP uses IP addresses to identity each machine uniquely. Message is sent using small packets. The packet contains both the sender and receivers address. IP does not guarantee the delivery in the same order as sent. This is because the packets are sent via different routes. It is a connectionless communication protocol at the third level (network) of the OSI model.

UDP – User Data Protocol is a communication protocol. It is normally used as an alternative for TCP/IP. However there are a number of differences between them. UDP does not divide data into packets. Also, UDP does not send data packets in sequence. Hence, the application program must ensure the sequencing. UDP uses port numbers to distinguish user requests. It also has a checksum capability to verify the data

7 Layers Of OSI

Explain the 7 Layers of OSI


Layer 1: Physical layer
It represents all the electrical and physical specifications for devices. 


Layer 2: Data link layer
It provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the Physical layer.

Layer 3: Network layer
The Network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks.

Layer 4: Transport layer
It provides transparent transfer of data between end users.

Layer 5: Session layer
It controls the sessions between computers. It connects, manages and terminates the connections between the local and remote application.

Layer 6: Presentation layer
It transforms data to provide a standard interface for the Application layer.

Layer 7: Application layer
It provides a means for the user to access information on the network through an application.  

N/W ( Tutorials I )

What Is LAN

LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions.

Term Protocol

Protocol is a standard way of communicating across a network. A protocol is the "language" of the network. It is a method by which two dissimilar systems can communicate. TCP is a protocol which runs over a network.

FTP (File Transfer Protocol)

FTP is File Transfer Protocol. It used to exchange files on the internet. To enable the data transfer FTP uses TCP/IP, FTP is most commonly used to upload and download files from the internet. FTP can be invoked from the command prompt or some graphical user interface. FTP also allows to update (delete, rename, move, and copy) files at a server. It uses a reserved port no 21.

What is multicasting

Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting. It uses the network infrastructure and standards to send messages.

Functionality Of PING

Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address. The output returns the data packets information. The number of packets sent, received and lost is returned by PING.

MAC Address

A Media Access Control address is a unique identifier that is assigned to the network adapters or NICs by the manufacturers for the purpose of identification and used in the Media Access Control protocol sub layer. It is a 12 digit hexadecimal number. A MAC address usually encodes the registered identification of the manufacturer, if the address is assigned by the manufacturer. It some times also called as Ethernet Hardware Address / physical address/ adapter address.

Spanning-Tree protocols

Spanning Trees are a standard technique implemented in LAN connections. On a mesh topology, a set of spanning tree algorithms were developed for prevention of redundant transmission of data along intermediate hops between a source and a destination host. In the absence of spanning trees, a mesh network is flooded and rendered unusable by messages by circulating within a loop that is infinite, between hosts. An algorithm used in transparent bridges which determines the best path from source to destination to avoid bridge loops.

At the time of STP initialization in a network, its first action is to utilize the Spanning Tree Algorithm for selection of a root bridge and a root port. The root bridge is the network which has lowest-value bridge identifier. All the switches on the network use Bridge Protocol Data Units to broadcast the bridge IDs to the other switches in that network. Soon after selection of the root bridge, determination of the root ports on all other bridges is done.

PHP ( Tutorials V )


Type Of Juggle In PHP

Type Juggling means dealing with a variable type. In PHP a variables type is determined by the context in which it is used. If an integer value is assigned to a variable, it becomes an integer.

E.g. $var3= $var1 + $var2

Here, if $var1 is an integer. $var2 and $var3 will also be treated as integers.  

Difference Between Include And Require

Require () and include () are the same with respect to handling failures. However, require () results in a fatal error and does not allow the processing of the page. i.e. include will allow the script to continue. 

How To Submit Form Without A Submit Button

A form data can be posted or submitted without the button in the following ways:

1. On OnClick event of a label in the form, a JavaScript function can be called to submit the form.

E.g. document.form_name.submit()

2. Using a Hyperlink: On clicking the link, JavaScript function can be called.

E.g <a.href=” javascript:document.MyForm.submit();">

Urlencode And Urldecode

Urlencode can be used to encode a string that can be used in a url. It encodes the same way posted data from web page is encoded. It returns the encoded string.

Syntax: urlencode (string $str )

Urldecode can be used to decode a string. Decodes any %## encoding in the given string (Inserted by urlencode)

Syntax: urldecode (string $str )

Differences Between Require And Include, Include_Once

Include () will include the file specified.

Include_once () will include the file only once even if the code of the file has been included before.

Require () and include () are the same with respect to handling failures. However, require () results in a fatal error and does not allow the processing of the page.







PHP ( TutorialsIV )


How can we increase the execution time of a php script

Default time allowed for the PHP scripts to execute is 30s defined in the php.ini file. The function used is set_time_limit(int seconds). If the value passed is ‘0’, it takes unlimited time. It should be noted that if the default timer is set to 30 sec and 20 sec is specified in set_time_limit(), the script will run for 45 secs.

How to set cookies in PHP 

Cookies are often used to track user information.

Cookies can be set in PHP using the setcookie() function.

Parameters are : name of the cookie, Value of cookie, time for expiry of cookie, path of the cookies location on server, domain, secure (TRUE or FALSE) indication whether the cookie is passed over a secure HTTPS, http only (TRUE) which will make the cookie accessible only through HTTP.

Returns TRUE or FALSE depending on whether the cookie was executed or not.


Functions For IMAP In PHP


IMAP is used for communicate with mail servers. It has a number of functions. Few of them are listed below:

Imap_alerts – Returns all the imap errors occurred

Imap_body – Reads the message body

Imap_check – Reads the current mail box

Imap_clearflag_full – Clears all flags

Imap_close – close and IMAP stream

Imap_delete – Delete message from current mailbox

Imap_delete_mailbox – Deletes a mailbox

Imap_fetchbody – Fetches body of message

Imap_fetchheader – Fetches header of message

Imap_headers – Returns headers for ALL messages

Imap_mail : send a mail

Imap_sort- Sorts imap messages

Different types of errors in PHP


Different types of Errors are:

E_ERROR: A fatal error that causes script termination

E_WARNING: Run-time warning that does not cause script termination


E_PARSE: Compile time parse error.


E_NOTICE: Run time notice caused due to error in code


E_CORE_ERROR: Fatal errors that occur during PHP's initial startup (installation)


E_CORE_WARNING: Warnings that occur during PHP's initial startup 


E_COMPILE_ERROR: Fatal compile-time errors indication problem with script.


E_USER_ERROR: User-generated error message. 


E_USER_WARNING: User-generated warning message. 

E_USER_NOTICE: User-generated notice message. 
 
E_STRICT: Run-time notices.
 
E_RECOVERABLE_ERROR: Catchable fatal error indicating a dangerous error
 
E_ALL: Catches all errors and warnings 

Difference Between $message and $$message In PHP


Explain the difference between $message and $$message.

$message is used to store variable data. $$message can be used to store variable of a variable. Data stored in $message is fixed while data stored in $$message can be changed dynamically.
E.g. $var1 = ‘Variable 1’
$$var1= ‘variable2’
This can be interpreted as $ Variable 1=‘variable2’;
For me to print value of both variables, I will write
$var1 $($var1)

Persistent Cookie

Cookies are used to remember the users. Content of a Persistent cookie remains unchanged even when the browser is closed. ‘Remember me’ generally used for login is the best example for Persistent Cookie.

How To Make A Snake Game In HTML5

Today i am posting a new tutorial on HTML5.We all like playing games.What you say if i teach you how to make a game.

So what we have to do copy and paste the below code in notepad or another editor you used and save as .html and enjoyy the game.In this gaame you can also control the speed of snake by editing the set_game_speed function.and this game also gives you scores.Which depends upon the length of the snake.

Download Code

Thursday 18 October 2012

Download Adobe Flash Player for 64 bit Windows 7

Users with 64 bit version of Operating system has been eagerly waiting for Adobe Flash Player 64 bit release. Well, wait is over as Adobe Flash Player 11 beta is available for download for 32 bit and 64 bit operating system users. Though Adobe Flash Player 11 is still in beta, one can expect to have 64 bit version support as and when stable version is released. This is good news for users with 64 bit operating system on their computer and wanting Flash support.

Adobe Flash Player for 64 bit operating system users

Adobe Flash Player 11 (beta) adds native support for 64-bit operating systems and 64-bit web browsers on Linux, Mac OS, and Windows. So, if you are using 64 bit Windows 7 operating system and 64 bit web browser (preferably Internet Explorer) – grab the 64 bit Adobe Flash Player Download for adding Flash support.


While this is a leap forward for 64 bit operating system users, 32 bit OS users can wait till stable release of Adobe Flash Player 11 is available for download. Check download links for installers and uninstaller for Adobe Flash Player 11 (beta) 32bit and 64 bit version for MAC, Windows and Linux.

Other new features of Adobe Flash Player 11 beta

1. Stage3D APIs for creating highly interactive visuals to improve collaboration on 3-dimensional models.
2. G.711 audio compression for telephony for integration of voice/telephony into business apps using G.711 codec.
3. H.264/AVC SW Encoding to encode higher quality video locally using H.264 video.
4. Socket Progress Events to build advanced file sharing apps like FTP clients that send large amounts of data.
5. HD surround sound to deliver full HD Vedios with 7.1 channel surround sound directly to AIR powered TVs.

Download Flash Player

5 Ways To Learn PHP Online For Beginners

PHP is the most widelly used scripting language now a day. It allows developers to generate the dynamic content easly. It is a server side scripting language that means its code is executed on server And Result in HTML form is shown to our browser And the result is in the form of HTML. One of the reason behind its success is that its support to different databases and there are many more reasons behind its success So if you are a beginner and you want ot start learning PHP and Don't know where to start we have 5 ways to learn PHP online.

1. PHP.NET official PHP website.
This is the Offical website of The php. It contains each an every thing about the php and One good thing about php.net is that users also give their contribution to make users comfortable in learning through comments.



2. LYNDA.COM
This contains a video tutorial list from beginner level to master level  so now you can learn by watching videos online.



3. W3SCHOOLS
W3schools its the easiest way to start learning because it provides the php example and it is a perfect platform for beginner to start learning.



4. THENEWBOSTAN
It contains over 200 video tutorials in php which covers each and every part of php step by step that makes it easy to learn. THENEWBOSTAN also have a Official Youtube channel which contains its all Videos.. 

5. Tizag.Com – PHP Tutorial Learn PHP
Tizag.com is also a good learning platform for beginners and provides the tutorials in the awesome way.

These above are the different ways to learn php online. Hope this will help you....
Thank you!!!

Convert Window PC Into Ipad

you wanna enjoy iPad, then no need to buy. You can change look of your windows into iPad. Here is a Free Tool to Get iPad look in Windows Vista, 7 and 8. The best thing of the app is that it’s a portable app, no need to install the app on your Windows PC. Just download the app and start the app on your windows PC. The app is designed for all 32-bit and 64-bit editions of Windows.
With this app you can create your own theme, change the look of launchpad, wallpapers and you can also get the iOS group folders like feature.

The app is one of the best way to customize your windows look into iPad and the app is totally free and available for Windows7, 8 and vista. You can download Win Launch using following link:

Download Software

Easy and Fast Method of Copy

Copying File is so boring and slow process. Windows File Transfer System is so Slow, It takes lots of time. Sometimes it give us pain. But now you can supercharge the simple act of copying and pasting.
Today i have 3 apps to make this process super fast. These include transfer resuming, copy speed computation and control, improved copy progress display, copy list editable while copying, copy list saving/loading, and an error log. So Here is the Apps:

1.)Tera Copy:-

 I is very much beneficial in Atom Processor. TeraCopy enables you to copy and move files faster and easier. Unlike the standard Windows copy/move options, TeraCopy can resume broken file transfers, skip and report bad files (without terminating the transfer) and calculate CRC checksums . 

2. SuperCopier:-



SuperCopier replaces Windows Explorer file copy and adds many features. This one is amazing, i love it also. These include transfer resuming, copy speed computation and control, improved copy progress display, copy list editable while copying, copy list saving/loading, and an error log.



FastCopy is the Fastest Copy/Delete Software on Windows. It can copy/delete unicode and over MAX_PATH(260byte) pathname files.

Wednesday 17 October 2012

How to Convert bytes into kilobytes, megabytes, gigabytes

Computer Storage is measured in terms of bytes, kilobytes, megabytes and gigabytes. We use different units of storage depending on actual size range of the storage medium. Sometimes, we need to convert data figure among different Storage Unit  format. For example: conversion of data in bytes to kilobytes or to megabytes and gigabytes units. We can easily make such conversion using quick online and offline tools.

Online conversion of bytes, kilobytes, megabytes, gigabytes

1. Use Google Search for quick conversion of figures among bytes, kilobytes, megabytes, gigabytes. For example: type convert 1024 bytes in kilobytes in search box and press the Enter key to get answer in the search results 1024 bytes = 1 kilobytes

Similarly, you can perform conversion of bytes into megabytes and gigabytee units online using Google Search Website.
2. Online tools for conversion between bytes, kilobytes, megabytes and gigabytes are also available. Use Online Conversion tools like on Calculate Me website for quick conversion between different type of units of storage in few simple clicks.

Free portable bytes unit conversion tool

If you are not connected to internet all time, you can use offline alternative in the form of Bytes Converter tool. It is a free portable program for quick conversion between bytes, kilobytes, megabytes, gigabytes units.


Once you Download This program, double click to launch it. Enter number figure in any text box with specific units format and click Convert button to get required figure in respective Storage Unit formats.

How to Small Blog Become Good Income Generator


Hello friends welcome to my today's post.Story is that i always thinks about the great blogs and websites on the internet. I always think how they got success in blogging and earn more and more from their blogs.

And today when i was travelling via train at that time i was thinking about my today's post. Then the idea comes in mind that today i make a collection of great bloggers and their blogs and survey on their success. And also think how to became like them.I hope you like my post and take advantage from this post. 

Mashable: Mashable is one of my favorite blog.I everyday read great articles from Mashable.And i never bored from the Mashable Articles.In 2004, when he was only 19 years old, Pete Cashmore started blogging from his parents’ home in Aberdeen, Scotland.

Pete had an interest in new technologies and how social media was increasingly changing the way people related to one another. he was particularly amazed by how certain government and police websites were combining their in-house data with Google maps to learn information on certain areas and citizens.

Nice little story, right? Pete Cashmore never went to college; instead, he founded Mashable in 2005.

How did he do it? He decided to explore a subject that was changing the world in a time when it was at its peak. Social media exploded in the early 2000s and Pete was there to ride the wave. Not only was he a great writer, he was passionate about what he wrote.

How can you do it? When you start a blog, you do it because you love what you do, because it’s a hobby you like to spend your time on. Don’t lose sight of this just because you’re looking to make a buck. Be passionate through every word you write on your blog. Write about what you like and what you know. And remember that today’s news is what will happen tomorrow.

Pete Cashmore tapped social media networking at a time when it was making its world debut. See what your era has to offer—there are new discoveries and trends springing up every day. It’s all a matter of being here now, being passionate, and writing about it.

Coolhunting:-Interactive designer Josh Rubin was always looking for creative inspiration and a better understanding of how people functioned. Ever heard of coolhunting? It’s one of the biggest blogs on new designer trends, technology, art and culture. It was founded by Rubin.

Originally launched in 2003 as a designer’s reference site, CoolHunting has become an award-winning blog with a huge international audience that’s growing every day.

How did he do it? He combined creativity, beauty, and a great idea.

For those bloggers who think content is everything, think again. Yes, interesting and fresh content is super-important, but knowing how to present it is just as important.

When visiting Coolhunting, users are greeted by a colorful, visually attractive and engaging home page, full of great photography and designer breakthroughs.

How can you do it? Be visual. No matter what the topic, don’t neglect your blog’s design and aesthetic factor. Yes, write about what you know. Yes, write about a subject that fascinates you. But present it in a way that can’t be ignored, a way that won’t make visitors move their mouse to the upper right corner of their browsers and press on that “x” to close your page.

Let’s say you decide to open a blog on recipes that you have picked up on your worldly travels. Take professional photos and post them on your homepage. Make people go “Wait… What is that? Is that food?!” Include pictures, and step by step instructions with interactive ingredients lists.

Think of new blog visitors as being like yourself the first time you went to your favorite restaurant. Regardless of how you got there, I’m sure the first thing you noticed wasn’t the ingredients written on the menu, but the way the plate looked when they put it on your table.

HuffingtonPost:Once upon a time there was a woman called Arianna Huffington. She decided to start a small website called Resignation.com. The website was a call for President Bill Clinton’s resignation and a place for conservatives to mesh together.

Needless to say, you need to be a very opinionated person and have quite a strong voice in order to even think of starting such a website. I’m sure she received her fair share of criticism but carried on nonetheless.

Ever heard of The Huffington Post. It was founded in 2005 by the same person.

How did she do it? By having a voice and not being afraid to shout it.

This is a blog with a very particular tone and a voice of its own. Though sometimes seen as being a bit too aggressive, The Huffington Post presents news in a different light. And people love it.

How can you do it? People like to hear opinionated minds, and they like well-written news with a handful of criticism on the side. They like sassy writing and bold ideas.

Find your blogger voice and shout it out. Don’t be afraid to get criticized. Learn to take in the bad, and spin it your way.