Saturday, December 19, 2009

AVS (Automated Voting System)

The Automated Voting System is a computerized voting mechanism that enables user to vote for any candidate in an easier and more convenient way. This system will be implemented in a small scale environment more specifically Universities and Schools. AVS prevents multiple voting entries from same user via user identity scanning. A user presents a unique voter’s ID and is recorded in a database. Thus, all voters in the vicinity are recorded in one database as records of their existence. In a university/school in particular, a voter that is not recorded in the schools database is an invalid entry and AVS will not accept any point/s from unknown voter/s.
The database that is the back-end of AVS is impossible to have redundant entry of same ID or user information since the ID is the primary key of an individual and tracks any kind of entry that resembles that of another data. AVS is database dependent that it is functional with the correct record connected to its mechanism.
AVS provides a user-friendly user interface that enables users to have an easy voting process. It has buttons and dialogue boxes that prompt errors of progresses to ensure user stability and consistency. AVS is a distributive system, in cases the AVS is divided into two major sectors: the Administrator’s and the User’s. The Administrator is the main server of the AVS and it will be connected to two (2) or more nodes via LAN connection. All entry and result will be passed on to the server where the moderator is the only one to see the partial or the final result of the election. The user’s accessibility is limited such that the system installed to a node separated from the server offers voting functionality only and doesn’t have any viewing or advance way in, neither they can re-vote or re-edit any of their entry unless prompted by the system to do so. As a start, the candidate also has to fill up a form in the system, serves as a candidacy form for the program to initiate the proper student or candidate to receive a point.
In the Administrators part, the main functionality that is able in administration is the viewing of results, posting the final tally of votes and resetting the system for system reuse. The Moderator cannot modify any entry from the user nor change the existing result from the system. In cases such that the system will be used for another set of candidates, the moderator has a function in resetting the system to its default settings. Where everything is blanked, from candidates up to the points produced, and will need to re-enter another set of election candidates and in some cases another set of data or database to connect to the AVS.

Sunday, December 13, 2009

Understanding IP Addressing

Every computer that communicates over the Internet is assigned an IP address that uniquely identifies the device and distinguishes it from other computers on the Internet. An IP address consists of 32 bits, often shown as 4 octets of numbers from 0-255 represented in decimal form instead of binary form. For example, the IP address

168.212.226.204

in binary form is

10101000.11010100.11100010.11001100.

But it is easier for us to remember decimals than it is to remember binary numbers, so we use decimals to represent the IP addresses when describing them. However, the binary number is important because that will determine which class of network the IP address belongs to. An IP address consists of two parts, one identifying the network and one identifying the node, or host. The Class of the address determines which part belongs to the network address and which part belongs to the node address. All nodes on a given network share the same network prefix but must have a unique host number.

Class A Network -- binary address start with 0, therefore the decimal number can be anywhere from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102.168.212.226, where "102" identifies the network and "168.212.226" identifies the host on that network.

Class B Network -- binary addresses start with 10, therefore the decimal number can be anywhere from 128 to 191. (The number 127 is reserved for loopback and is used for internal testing on the local machine.) The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network. An example of a Class B IP address is 168.212.226.204 where "168.212" identifies the network and "226.204" identifies the host on that network.

Class C Network -- binary addresses start with 110, therefore the decimal number can be anywhere from 192 to 223. The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. An example of a Class C IP address is 200.168.212.226 where "200.168.212" identifies the network and "226" identifies the host on that network.

Class D Network -- binary addresses start with 1110, therefore the decimal number can be anywhere from 224 to 239. Class D networks are used to support multicasting.

Class E Network -- binary addresses start with 1111, therefore the decimal number can be anywhere from 240 to 255. Class E networks are used for experimentation. They have never been documented or utilized in a standard way.

Tuesday, December 1, 2009

Unshielded and shielded twisted pair cabling standards

Cat 1: Currently unrecognized by TIA/EIA. Previously used for POTS telephone communications, ISDN and doorbell wiring.
Cat 2: Currently unrecognized by TIA/EIA. Previously was frequently used on 4 Mbit/s token ring networks.
Cat 3: Currently defined in TIA/EIA-568-B, used for data networks using frequencies up to 16 MHz. Historically popular for 10 Mbit/s Ethernet networks.
Cat 4: Currently unrecognized by TIA/EIA. Defined up to 20 MHz, and was frequently used on 16 Mbit/s token ring networks.
Cat 5: Currently unrecognized by TIA/EIA. Defined up to 100 MHz, and was frequently used on 100 Mbit/s Ethernet networks. May be unsuitable for 1000BASE-T gigabit ethernet.
Cat 5e: Currently defined in TIA/EIA-568-B. Defined up to 100 MHz, and is frequently used for both 100 Mbit/s and 1000BASE-T Gigabit Ethernet networks.
Cat 6: Currently defined in TIA/EIA-568-B. Defined up to 250 MHz, more than double category 5 and 5e.
Cat 6a: Currently defined in ANSI/TIA/EIA-568-B.2-10. Defined up to 500 MHz, double that of category 6. Suitable for 10GBase-T.
Cat 7: An informal name applied to ISO/IEC 11801 Class F cabling. Defined up to 600 MHz. This standard specifies four individually-shielded pairs (STP) inside an overall shield.
Cat 7a: An informal name applied to Amendment 1 of ISO/IEC 11801 Class F cabling. Defined up to 1000 MHz.

Wednesday, November 25, 2009

Cisco



Cisco routers use an integrated systems approach to reduce operating costs and complexity and deliver exceptional performance and investment protection. ...

Juniper



Juniper is a leading provider of core routing, edge routing and network security solutions for IP-based enterprise and carrier-class networks. Network Hardware Resale was one of the first to offer pre-owned, refurbished and used Juniper equipment and maintains the capital and resources to carry the largest inventory of second-hand Juniper product available on the market. Popular items include the:

Juniper M5 Series Routers
Juniper M10 Series Routers
Juniper M20 Series Routers
Juniper M40 Series Routers
Juniper M160 Series Routers
Juniper T320 Series Routers

Canopy Antenna (Motorola)




Canopy Antenna is a wireless networking system designed for WISPs (wireless internet service providers) available in point-to-point and point-to-multipoint configurations.

Modular "Jack" Connector

Left to right, modular connectors: 8P8C plug, 6P6C plug, 6P4C plug, 4P4C plug, 6P6C jack.

An 8P8C modular plug. This is the common crimp type plug, of the same kind pictured above crimped onto a cable (with moulded sleeve)


Modular connector is the name given to a family of electrical connectors examples of which are pictured. These connectors were originally used in telephone wiring. Even though they are still used for that purpose they are used for a variety of other things as well. A modular connector's advantage over many other kinds include small size and ease of plugging and unplugging. However the plastic retaining spring clip tends to get broken off when cables are pulled from storage for use. If that happens, the plug can easily fall out of the wall jack. Many uses that originally used a bulkier connector have migrated to modular connectors. Probably the most well known applications of modular connectors is for telephone jacks and for Ethernet jacks, which are nearly always modular connectors.

Patch Panel




A patch panel or patch bay is a panel, typically rackmounted, that houses cable connections. One typically shorter patch cable will plug into the front side, whereas the back holds the connection of a much longer and more permanent cable. The assembly of hardware is arranged so that a number of circuits, usually of the same or similar type, appear on jacks for monitoring, interconnecting, and testing circuits in a convenient, flexible manner.


Patch panels offer the convenience of allowing technicians to quickly change the path of select signals, without the expense of dedicated switching equipment. This was first used by early telephone exchanges, where the telephone switchboard (a massive array of patch panels) and a large room full of telephone operators running it was ubiquitous.

Tuesday, November 24, 2009

Differentiate Routers from Switches

Switch



Router



A switch sorts and distributes the network packets sent between the devices on a local area network (LAN), while a router is a gateway that connects two or more networks, which can be any combination of LANs, wide area networks (WAN), or the Internet.

Conclusion:

What i have learned, a router uses tables to determine the best path to use to distribute the network packets it receives, and a protocol such as ICMP(Internet Computer Message Protocol) to communicate with other routers. A router is a significantly more complicated device than a switch--essentially a specialized computer--and more advanced models may use a reconfigurable operating system such as Linux, rather than firmware coded directly into the hardware. Both routers and switches operate on layers 2 and 3 of the OSI model. So, For me router is more intelligent than switch.

Adtran


Adtran offers a wide variety of solutions for converged voice/data services. Our new Total Access 916 SIP-based multiservice access gateway is the next generation of Adtran's industry-leading Integrated Access Device. This new product is designed for carrier VoIP networks and feature all of the same robust routing and voice features of the widely deployed Total Access IADs, along with a host of new features and functions that enable cost effective, reliable IP service delivery. This device use the Adtran Operating System (AOS) to simplify management and administration. Multiple models offer flexibility for varied applications from PRI delivery and trunking services to hosted IP PBX offerings.

Features

* Number of Ports: 19
* Standard Memory: 64MB
* Flash Memory: 16 MB
* Operating System: Adtran Operating System (AOS)
* Interfaces/Ports: 16 x RJ-11 FXS, 1 x RJ-21, 1 x RJ-48C DSX-1 WAN, 1 x RJ-48C T1/FT1 WAN, 1 x RJ-45 10/100Base-TX LAN, 1 x DB-9 Console Management

* Management: Command Line Interface (CLI), Web-based GUI, n-Command support, SNMP v2, Syslog, Telnet, Craft/Console Port, DHCP, IEEE 802.1p QoS

3Com


The 3Com Gigabit Switch 5 is designed for small offices and remote branch offices requiring high network performance to exchange large data files and images, and access real-time information or connect to high-speed servers or a high-speed network backbone. Featuring autosensing and auto MDI/MDIX on all ports, the Gigabit Switch 5 is delivered in a futuristic, compact and streamlined enclosure. With a high quality dark gun metal look these switches exude quality, the 3Com logos "light up" on power up and they feature illuminating blue LEDs.

Features

* Product Description: 3Com Gigabit Switch 5, switch, 5 ports
* Device Type: Switch
* Form Factor: External
* Dimensions (WxDxH): 4.6 in x 3.6 in x 1.1 in
* Weight: 7.8 oz
* Localization: United States
* Ports Qty: 5 x Ethernet 10Base-T, Ethernet 100Base-TX, Ethernet 1000Base-T
* Data Transfer Rate: 1 Gbps
* Data Link Protocol: Ethernet, Fast Ethernet, Gigabit Ethernet

* Communication Mode: Half-duplex, full-duplex
* Features: Flow control, full duplex capability, auto-sensing per device, auto-negotiation, auto-uplink (auto MDI/MDI-X), Quality of Service (QoS), Jumbo Frames support
* Compliant Standards: IEEE 802.3u, IEEE 802.3i, IEEE 802.3ab, IEEE 802.1p, IEEE 802.3x
* Power: AC 120/230 V ( 50/60 Hz )
* Manufacturer Warranty: 2 years warranty

LinkSys


Linksys by Cisco, commonly known as Linksys, is a major provider of home and small office network products and was founded in 1988 and acquired by Cisco Systems in 2003. Linksys also manufactures broadband and wireless routers, consumer and small business grade Ethernet switching, VoIP equipment, wireless internet video camera, AV products, network storage systems, and other products. Since 2008, all Linksys products sold are now packaged and branded as "Linksys by Cisco".