Creative Marketing Ideas For Hardware Stores

With large nationwide chains that dominate the market, small hardware stores sometimes have a difficult time being competitive. The key is to find a unique selling proposition for your business and to capitalize on it so customers see the value in choosing you over one of the larger stores. Here are some great ways to make your business stand out.

  1. Giveaways -When your store first opens (or even if you're just looking for an extra push), offer small giveaways to your customers with their purchase. These will be tools or products they can use that are branded with your store's information-hammers, tape measures, levels, etc. When a customer is using this product and runs out of something or determinates the need to visit a hardware store, they'll see your information and immediately head your way!
  2. In-Store Classes -Hardware stores often form a bit of a culture and social atmosphere, so find ways to play this up. One great choice is to sponsor training classes and educational seminars in your store. Work with your vendors to provide information that your customers will find valuable. Even your employees can instruct these classes-anything from minor home renovation products to full-scale remodeling. List the classes you're offering that month above your cash registers with a large, visible vinyl banner which clearly-informs customers of their opportunities to expand their skills.
  3. Charity Donations -Offer your products to charity groups and organizations in-town which build or repair homes for the less-fortunate. This is great PR for your business, it makes you look more-reliable, and in return you're often able to advertise at the home-site using a banner or yard sign. When customers see that you're giving back to your community, they are more-inclined to shop with you.
  4. Ladies Night -Most hardware stores predominately-market toward men. While the majority of your customers are probably male, do not neglect the ladies. Host a "Ladies Night" at your store that offers your educational classes and even a special discount on purchases made by women. Use removable window clings to give your store a slight feminine touch. There's a huge potential market here that is somewhat-untapped, and with the right approach, female customers can dramatically affect your business.
  5. Personal Shoppers -Some customers complain that hardware or home improvement stores are overwhelming. Counter this objection by providing customers with a personal shopping service. Your employees already help customers find products daily anyway, but creating a formal program provides a revenue opportunity. Customers can have one of your employees guide them around the store and help them find exactly what they need for their project, or for even-more convenience, your employee can preselect the products they need so that when the customer arrives, all they have to Do is check out.
Posted in general | Comments Off on Creative Marketing Ideas For Hardware Stores

Medical Coding History – From Paper to Medial Coding Software

If we define medical coding as the assignment of alphanumerical characters to diagnoses, diseases, and treatments, then medical coding has been traced back to the 1600s in England with the London Bills of Mortality. A more standardized system of coding was developed for classifying death at the tail end of the 19th century. In 1893, Jacque Bertillon, a statistician, created the Bertillon Classification of Causes of Death, a system which was eventually adopted by 26 countries at the beginning of the 20th century. Shortly after the Bertillon Classification system was implemented, people began discussing the possibility of expanding the system beyond mortality as a way of tracking diseases.

By the middle of the 20th century, the World Health Organization (WHO) adopted a goal of a single global classification system for disease and mortality, entitled the International Classification of Diseases, Injuries, and Causes of Death (ICD). This classification system is updated every 10 years. The latest revision, ICD-10, is scheduled for adoption in the United States in 2013.

What started out as a small set of medical codes has evolved into a complex system that was initially standardized by the American Medical Association back in 1966 with current procedure codes (CPT) codes that are updated annually.

In the late 1970s, the Healthcare Common Procedure Coding System (HCPCS) was developed based on CPT. HCPCS has three levels of codes: Level One is the original CPT system. Level Two codes are alphanumeric and include non-physician services such as ambulances and other transportation as well as patient devices such as prosthetic devices. Level Three codes were developed as local codes, and were discontinued in 2003 in order to keep all codes relevant worldwide.

Recently, medical coding systems have been expanded to include other medical specialties. For example, there are coding systems related to disabilities, the dental field, prescription drugs, and mental health.

As the coding systems have become more complex and diverse, the need for training of medical coders has grown exponentially. Private training schools and public colleges throughout the country have developed certification programs. In order to be awarded a certificate, students must obtain a two-year degree from an accredited medical coding school and pass an exam given by the AHIMA.

Over the past 20 years, many coding processes have shifted from a paper-based system to a computer-based system using medical coding software and medical billing software. Many companies sell complete medical software-based coding solutions and myriad of products for specific medical disciplines, such as products that are specifically tailored to skilled nursing facilities, physicians, hospitals, surgery, cardiology, and more.

As medical facilities and professionals begin preparing for the conversion to ICD-10 in 2013, the need for more sophisticated medical coding software solutions and qualified medical coders will continue to grow.

CPT is a registered trademark of the American Medical Association.

Posted in general | Comments Off on Medical Coding History – From Paper to Medial Coding Software

Best Windows 7 Optimizer That Can Stabilize and Improve Your Computer Performance

A system optimizer is a software designed to maintain the performance of your computer, fix software related problems and keep your computer stable and secure. The need of a system optimizer software in Microsoft Windows7 operating system is high. This is because Windows 7 itself is unable to maintain all the mentioned aspects without the help of third-party products.

We are going to learn what exactly Windows 7 optimizer software is.

The best Windows 7 optimizer software shall include all the following features:

1. Registry Cleaner to fix the registry related issues

2. System Cleaner to clean unnecessary stuff and free-up the disk space

3. Registry Defragmenter to defrag the system registry

4. Startup Manager to control the programs running when you turn on your computer

5. Backup & Restore feature to restore unfavourable registry changes

“Registry Cleaner” to Fix the Registry Related Issues

Windows Registry is a vital component in Microsoft Windows 7. It contains information stored by your operating system and installed software. For example, the default settings, changes you made to your computer, system information, runtime data, etc. are stored.

Registry Cleaner is a software that finds the junk entries in the registry, and repairs them as far as possible. Unfortunately, Windows 7 does not include a built-in registry cleaner. The registry cleaner software included in the best Windows 7 optimizer lets you scan the genuine registry problems and correct them. It thereby helps avoiding many runtime errors and problems, such as, File Not Found, etc.

“System Cleaner” to Clean Unnecessary Stuff and Free-Up the Disk Space

A System Cleaner software lets you find the files and stuff that have unnecessarily occupied the hard disk space.

The tasks, like installing a program, uninstalling, repairing or updating the existing programs, and even just running the installed programs many times create temporary files, log files that need not be kept after the corresponding operation is performed. Sadly, many programs do not itself delete such files and stuff and thus your hard disk space is used for such unproductive stuff. Using a system cleaner software included in best Windows 7 optimizer, you can easily and safely delete such temporary stuff.

“Registry Defragmenter” to Defrag the System Registry

You know the importance of the registry in Windows 7 operating system, as already discussed. The continuous access of a number of programs to the registry results in its fragmentation. It reduces the system performance and freezes your computer.

The best Windows 7 optimizer software includes a registry defragmenter that enables analyzing the registry fragmentation and afterwards defrags it. A reboot is required to perform this process and all other running programs and services must be terminated.

“Startup Manager” to Control the Programs when you Turn on your Computer

Running too many programs at the Windows startup, results in system freezing and slow performance. A Startup Manager, included in best Windows 7 optimizer, lets you monitor and control the programs that run each time your computer is started. It lets you disable or delete the unwanted program entries and enable only those who are necessary.

Backup & Restore Feature to Restore the Unfavourable Registry

While doing all the above steps, care must be taken that you have followed some precautionary measures first, so that any unfavourable registry change can be later restored and unwilling situations can be easily avoided. The best Windows 7 optimizer should include such a feature.

Best Windows 7 Optimizer Recommended by Worldwide Experts

Posted in general | Comments Off on Best Windows 7 Optimizer That Can Stabilize and Improve Your Computer Performance

Microsoft Access and Medical Private Practice

For physicians medical office software installation could be nerve-wracking, not because they want to avoid electronic medical records, but because the majority of the software packages are too complicated and very expensive for them.

The good news is, you can make your medical office software system uncomplicated and relatively easily maintained with one of the popular database software packages being used today, the Microsoft Access.

Microsoft Access is a relational database system developed by Microsoft. Microsoft Access is one of the easiest and most flexible database management solutions for the medical office and provides data validation and user-friendly features on data entry screens. It has been the dominant lightweight database system used for the last decade and has continued to grow with additional features. Access is a productive and very customizable solution for small medical practices and comes with MS Office (or standalone). However the next step up in a medical environment would be MS SQL Server but small medical offices usually only has need of a lightweight application and the added functionality with MS SQL Server, comes with a heavy price.

With this relational database system you can be up and running in one hour, which means that it is not necessary for your practice to spend lot of money to purchase, configure, update and maintain an SQL Server solution. Microsoft Access includes without any additional costs, points of integration with popular software packages including: Microsoft Word, Excel & Outlook and provides a free runtime version.

MS Access network setup is very easy. A medical office with 2-8 users is up and running within ten minutes, while installation and application maintenance is extremely simple. Virtually any user with a basic knowledge of Microsoft Access can handle all maintenance procedures without the assistance of IT personnel.

Keep also in mind that SQL Server is the flagship database system from Microsoft and it is suitable for use in environments with up to thousands of users. Microsoft Access can handle 2- 8 users and it is limited to 2 GB data storage.

We are convinced that the best way for private medical offices around the world to enter the world of electronic medical records is to purchase a professionally designed but inexpensive and affordable Microsoft Access based software solution.

Posted in general | Comments Off on Microsoft Access and Medical Private Practice

What Requirements Does a Dot Net Developer Need to Fulfill?

Microsoft Dot Net is a useful software development component. It provides tools and libraries to the software developers so that they can create Windows-based applications in a more efficient manner. A Dot Net developer is a software programmer who has specific skills using .Net to develop software and computer applications. For people who are in the midst of looking for developers for your projects, there are some areas you need to take note. You are advised to look for competent programmers who can really assist you to complete your tasks successfully.

First thing first, you need to be clear about the responsibilities of a .Net Developer before you start looking for suitable candidate. Seriously speaking, the programmer is required to:

• Work hand in hand with other software engineers and architects to develop a logical series of instructions referred to as programming code for the computer to communicate with the networks, applications and databases.

• Create new software applications to suit the business needs

• Modify, repair, test and enhance existing applications

After knowing what the developer is required to do, the next area we need to take into consideration is the academic qualification. In general, a programmer should have degree qualification in computer science, information technology or any related discipline. If the programmer is not a degree holder, you may take a look at his or her working experience. If the candidate has extensive experience dealing with .Net development tools, you can consider getting him or her in. Check with the candidate whether he or she is familiar with maintenance of ASP Applications, e-Commerce solution, online education and learning, social networking sites, corporate web applications, and so on.

At the same time, a good dot net developer must be competent in carrying out all the important tasks. It is a must for him or her to have the following skills in:

• Classic ASP

• Microsoft SQL 2000 / 2005

• MS Access

• JavaScript, XML, DHTML, AJAX and CSS

• VBScript and JScript

Frankly speaking, if the programmer does not have the above mentioned skills, most of the employers in the job market are not willing to hire him or her.

Besides the skills, we should also take serious consideration on the general qualities of the programmers. They should have qualities as follow:

• Good passion in work

Having great interest in work is important. The programmers should love and enjoy what they are doing.

• Good learning attitude

Learning is a continuous process. We can’t stop at certain stage. Good developers must have positive attitude in learning. They must always grab the opportunities to learn new technology so that good applications can be adapted.

• Some “intelligence”

Honestly speaking, intelligence is something very subjective. What I mean here is the “personality” of the person. Being a programmer, he or she must be smart and sensitive to respond to all changes. It is important for a programmer to be open-minded and willing to take new challenges from time to time.

Posted in general | Comments Off on What Requirements Does a Dot Net Developer Need to Fulfill?

Kitchen Design Ideas

Kitchens have so many design options that they are literally never ending. Kitchen design ideas include features such as cabinetry, tiles, counter tops, appliances, hardware and fixtures. Each feature on its own has a multitude of design options and the possible combinations are endless. Two identical kitchens with only one different feature can look like very different kitchens when finished. Because of the vast number of design options, thoroughly research what products are available on the market and get a fairly good idea what it is you are looking for.

The main feature in any kitchen is the cabinetry. It is more often than not the first thing that people notice in a kitchen. The layout of the cabinetry is unique to each kitchen. Measure the size of your kitchen and determine the types of cabinets and where you would like them placed. If you have a solid wall with no windows, doors or appliances opt for floor to ceiling cabinets full of drawers for storage. Include a broom or cleaning closet in these cupboards. Glass fronts in corner cabinets are a popular design feature. Cabinets have a wide variety of door styles. There are recessed, flat paneled and raised cabinet doors. Each of these options comes with several design choices. Once you have picked the design of your cabinets you need to decide on the stain that suits your kitchen space. Opt for lighter colored stains for smaller kitchens to keep them feeling open and spacious.

Counter tops are also an important feature in a kitchen. They too are highly visible. Counter tops should be chosen for durability as well as looks. Granite counter tops are the most popular choice today. You may also choose from engineered stone, ceramic tile, laminates, wood and stainless steel. The material and color of your counter tops should compliment your cabinetry, backslash and tiles. If your kitchen is a large room but does not have a lot of counter space you might want to consider adding an island for additional space. Not only does an island adds counter space but also storage space.

Flooring is an integral kitchen feature. Most kitchens are done with ceramic tile flooring but wood floors and laminates are growing in popularity. Many kitchens have tiled backslashes. Be sure that the tiles used in your backslash compliment the flooring. Besides the type of flooring you use, you must also pick a color of tile, wood or laminate as well as texture. Quite often a kitchen with light colored cabinetry will look best with a slightly darker floor and vice-versa. Contrast between the cabinetry and the flooring, no matter how small, creates the illusion of depth.

The kitchen design ideas listed above are just the tip of the iceberg. We have not even touched on cabinet hardware, lighting fixtures, sinks and taps, paint colors or appliances. Matching appliances are ideal in any kitchen. Stainless steel appliances are a favorite because they match just about any kitchen design. Families with small children may wish to consider black appliances since stainless steel shows fingerprints. Put as much thought into the small features as you do the larger ones. Something as simple as buying the wrong cabinet hardware can ruin the look of the completed project.

Posted in general | Comments Off on Kitchen Design Ideas

Examples Of Spyware And What They Are

Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you “pay” for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of Spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browsers home page or search page, or add additional components to your browser you don’t need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways Spyware or other unwanted software can get on your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with SpyWare. Once installed, the Spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers

Aside from the questions of ethics and privacy, SpyWare steals from the user by using the computer’s memory resources and also by eating bandwidth as it sends information back to the spy ware’s home base via the user’s Internet connection. Because SpyWare is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Because SpyWare exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other SpyWare programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the SpyWare author who will either use it for advertising/marketing purposes or sell the information to another party.

Licensing agreements that accompany software downloads sometimes warn the user that a SpyWare program will be installed along with the requested software, but the licensing agreements may not always be read completely because the notice of a SpyWare installation is often couched in obtuse, hard-to-read legal disclaimers.

Examples of SpyWare

These common SpyWare programs illustrate the diversity of behaviors found in these attacks. Note that as with computer viruses, researchers give names to SpyWare programs which may not be used by their creators. Programs may be grouped into “families” based not on shared program code, but on common behaviors, or by “following the money” of apparent financial or business connections. For instance, a number of the SpyWare programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same SpyWare package, even if they function separately.

o CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer’s hosts file to direct DNS lookups to these sites.

o Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

o Zango (formerly 180 Solutions) transmits detailed information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions Company. It opens pop-up ads that cover over the Web sites of competing companies.

o HuntBar, aka WinTools or Adware,WebSearch was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other SpyWare programs-an example of how SpyWare can install more SpyWare. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements.

oZlob Trojan or just Zlob, Downloads itself to your computer via ActiveX codec and reports information back to Control Server. Some information can be as your search history, the Websites you visited, and even Key Strokes.

Posted in general | Comments Off on Examples Of Spyware And What They Are

Computer Viruses Problems and Solutions

We all are now aware with the term Computer Viruses

Let’s understand this simple definition: Computer Viruses can be considered as small software application which tends to take control over computer operation. The computer virus may delete contents from the hard disk and even take a ride on e-mail programs to become pandemic. Computer viruses be in various formats like in form of images, audio or video files. They may spread while downloading files from the Internet. Sometimes they may be purchased along with the pirated software too.

Let’s concentrate on symptoms of Viruses

There can be difficulty in accessing any disk or drive. The system might be running slow. Sometimes it may freeze. You may see distorted menus and dialog boxes. Any program may disappear on its own without any action. Sometimes you may see some new icons on the desktop. Application will not be running smooth. You may get error of any system file missing. Your windows may restart automatically sometimes. If you see this kind of symptoms on your system, then install any latest version of anti virus which you think compatible with the Operating System you have. Scan your system for the Computer Viruses. Even in severe condition you may need to format your system completely.

Let’s see what we can do to remove a Virus

You need to apply a Computer Viruses removal tools for the purpose. Sometimes you may find specific problems which are associated with some unwanted software programs which carries Computer Viruses You may get those viruses again in your system after uninstalling those programs. So you should be very much smart while choosing for the Tools for Computer Viruses removal.

To remove virus, follow these steps

1. Visit the Microsoft website to get latest updates from Microsoft Updates.

2. Perform regular scanning of your system with any updated Anti- Virus.

3. Download, install, and then run the Microsoft Malicious Software Removal Tool to remove Computer Viruses the system.

Preventive measure for Computer Virus

Its highly recommended you to keep your Operating systems updated. If you are not online don’t forget to check for Windows updates frequently. This is important because the Virus creator always tries to make use of any void in your Operating System to install their software Computer Viruses. If you are online user then make sure that your web browser is also an updated one. Try to use the most compatible and latest of the Web browser may be from any one like IE, Firefox, Opera or anyone else, because the Virus writer always tries to find mistakes in your browser.

Posted in general | Comments Off on Computer Viruses Problems and Solutions

Turn Your Basement Into a Virtual Shooting Gallery

An indoor shooting simulator is easy to add on to most projection based home theater systems, and in most cases is an inexpensive way to add hours of entertainment for the whole family. People of all ages enjoy playing the wide range of games that are available for the system, everything from “Baseball Challenge” to “Elephant Hunter” will keep your family and friends entertained. Utilizing a shooting simulator is not only a great way to add excitement to your home theater room; it is also a get way to keep your shooting skills sharp.

System Basics:

There are a few basic requirements for adding a shooting simulator to an existing home theater. The simulator runs on a normal Windows based computer, software is compatible with Windows XP, Windows Vista and Windows 7. The image is broadcast through a projector to a screen, which most projectors and home theater screens will be suitable for use with this simulator. Now all you need to add is a basic simulator package, which includes a rifle, case, camera and five games. Installation of the simulator will only take about thirty minutes to setup and install the new software and hardware. Now you are ready to start enjoying the very best of simulated shooting. To recap the items you need: computer, projector, screen and a simulator package.

Benefits of Indoor Shooting:

There are many advantages to adding an indoor shooting simulator to you home theater room, these are just a few.

Convenience- having the ability to practice your shooting skills from within your own house, cuts down on drive time to the range and you can fire up your system anytime you want.

Cost Savings- ammunition is expensive! You will save a lot of money practicing your skills using a true to life replica laser firearm verses using live ammo.

Safety- using a laser firearm is a much safer weapon to practice will and it’s a lot better for your hearing.

Shooting Variety- with a shooting simulator you have the ability to practice your skills on a wide range of software titles. You can practice shooting skeet and with just a touch of a button you can switch over to another game and practice your marksmanship on simulated popup targets.

Entertainment- Gather you friends and family, challenge them for the highest score or for bragging rights.

Packages and Software:

With this system, there are many packages of both hardware and software available. Looking for a portable package or maybe a complete package if you don’t have a projector, computer and screen? Those packages and more are available. There are over 35 software titles currently available, which can be purchased separately or in 15 game packages. Software titles are being added, so you will always have the option to buy the latest games on the market. Do you have the best Halloween party on your block? There is a Halloween software package that will insure your party is unforgettable. Do you have a young hunter or marksman that could benefit from “Hunter’s Education” software? It is an option on this simulator. Teach them everything from ethical shooting to animal anatomy, with the hunter’s Ed package. Looking to hone your archery skills? This simulator has packages available for you bow enthusiasts. There are several optional firearms which can be added to the system, to maximize the skill development and enjoyment of the simulator.

Adding a shooting simulator to your theater room is easy and a cost effective way of increasing the entertainment value of your room as well as improve shooting skills. If you would like some more information on the shooting simulators or have any questions please contact me through the website.

Posted in general | Comments Off on Turn Your Basement Into a Virtual Shooting Gallery

Wide Area Network (WAN)

Types and Characteristics of WANs

What is a WAN?

There are two prevailing definitions of a Wide Area Network (WAN). The book definition of a WAN is a network that spans large geographical locations, typically to interconnect multiple Local Area Networks (LANs). The practical definition of a WAN is a network that traverses a public network or commercial carrier, using one of several WAN technologies

What are its Main Components?

The main components for a WAN are routers, switches and modems. These components are described below in the hardware section.

CPE – Devices on the subscriber contracts are called customer premises equipment (CPE).
The subscriber owns the CPE or leases the CPE from the service provider. A copper or fiber cable connects the CPE to the service provider's nearest exchange or central office. This cabling is often called the local loop, or "last-mile".

DTE / DCE – Devices that put data on the local loop are called data circuit-terminating equipment, or data communications equipment (DCE). The customer devices that pass the data to the DCE are called data terminal equipment (DTE). The DCE primarily provides an interface for the DTE into the communication link on the WAN cloud.

Hardware

In a WAN you will need various types of hardware components for it to function. The typical items of hardware that you will need in a WAN are:

Router – An electronic device that connects a local area network (LAN) to a wide area network (WAN) and handles the task of routing messages between the two networks. Operates at layer 3, and makes decisions using IP addresses.

Switch – A switch is a network device that selects a path or circuit for sending a unit of data to its next destination. Operates at layer 2, and uses MAC addresses to send data to correct destination.

Modem – Short for modulator / demodulator, a modem that enables a computer to communicate with other computers over telephone lines. Operates at layer 1, where signals are converted from digital to analogue and vice versa for transmission and receiving.

Wan Standards

WANs operate within the OSI model using layer 1 and layer 2 levels. The data link layer and the physical layer. The physical layer protocols describe how to provide electrical, mechanical and functional connections to the services provided by the ISP. The data link layer defines how data is encapsulated for transmission to remote sites.

Encapsulation

Encapsulation is the wrapping of data in a particular protocol header. Remember that WANs operate at the physical layer and the data link layer of the osi model and that higher layer protocols such as IP are encapsulated when sent across the WAN link. Serial interfaces support a wide range of WAN encapsulation types, which must be manually specified. These types include SDLC, PPP, Frame delay etc. Regardless of WAN encapsulation used it must be identical on both sides of the point to point link.

Packet and Circuit Switching

Circuit switching and packet switching are both used in high-capacity networks.
The majority of switched networks today get data across the network
Through packet switching.

Circuit-switching is more reliable than packet-switching. Circuit switching is old and expensive, packet switching is more modern.

General Routing Issues

What is a Routing Protocol?

A routing protocol is a protocol that specifies how routers communicate and exchange information on a network. Each router has prior knowledge of its immediate neighbors and knows the structure of the network topology. The routers know this because the routing protocol shares this information.

Protocol

RIP (Routing Information Protocol) was one of the most commonly used protocols on internal networks. Routers use RIP to dynamically adapt changes to the network connections and communicate information about which networks routers can reach and the distance between them. RIP is sometimes said to stand for Rest in Pieces in reference to the reputation that RIP has for breaking unexpectedly and rendering a network unable to function.

Routing Algorithms

Distance Vector

This type of routing protocol requires that each router simply inform its neighbors of its routing table. The distance vector protocol is also known as the bellman-ford algorithm.

Link State

This type of routing protocol requires that each router maintain a partial map of the network. The link state algorithm is also know as Dijkstra's algorithm.

IGRP

IGRP is a type of distance vector routing protocol invented by cisco used to exchange routing data in a autonomous system. Distance vector protocols measure distances and compare routes. Routers that use distance vector must send all or a portion of their routing table in a routing update message at regular intervals to each neighbor router.

Addressing and Routing

What does routing mean?

Routing is the process of deciding how to move packets from one network to another.
The directions also known as routes can be learned by a router using a routing protocol then the information is passed from router to router along the route of the destination.

IP Address's

Every machine connected to the internet is assigned an IP address. An example of an IP address would be 192.168.0.1. IP addresses are displayed in decimal format to make it easier for humans to understand but computers communicate in binary form. The four numbers that separate an IP address are called Octets. Each position consists of eight bits. When added to together you get 32 ​​bit address. The purpose of each octet in an IP address is to create classes of IP addresses that can be assigned within a network. There are three main classes that we deal with Class A, B and C. The octets of an IP address are split into two parts Network and Host. In a class A address the first octet is the network portion, this determinates which network the computer belongs to, the last octets of the address are the hosts that belong to the network.

Sub netting

Sub netting allows you to create multiple networks within a class A, B or C address. The subnet address is the address used by your LAN. In a Class C network address you would have a subnet mask of 255.255.255.0. A subnet mask identifies which portion is network and which is host. For example 192.168.6.15 the first octet three octets are the Network address and the last octet being the host (Workstation). It is important to subnet a network because gateways need to forward packets to other LANS. By giving each NIC on the gateway an IP address and a Subnet mask it allows the gateways to route packets from LAN to LAN. Once the packet arrives at its destination, the gateway then uses the bits of the subnet portion of the IP address to decide which LAN to send the packets.

Circuit Switched Leased Lines

A circuit switched network is one that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Here are some terminologies associated with a Circuit switched network.

Frame relay is a telecommunication service designed for cost-efficient data transmission between local area networks (LANs)

Basic rate interference is a service used by small business for internet connectivity. An ISDN BRI provides two 64 Kbps digital channels to the user.
Primary rate interface (PRI) is a telecommunications standard for carrying voice and data transmissions between two locations
All data and voice channels are ISDN and operate at 64kbit / s

Packet Switching

Http://www.raduniversity.com/networks/2004/PacketSwitching/main.htm – _Toc80455261

Packet switching refers to protocols in which messages are broken up into small packets before they are sent. Each packet is then transmitted over the Internet. At the destination the packages are reassembled into the original message. Packet switching main difference from Circuit Switching is that that the communication lines are not dedicated to passing messages from the source to the destination. In Packet Switching, different messages can use the same network resources within the same time period.

Http://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode

Asynchronous Transfer Mode (ATM) is a cell relay, packet switching network and protocolwhich encodes data into small fixed-sized cells.

ISDN is used to carry voice, data, video and images across a telephone network. ISDN stands for integrated services Digital Network. Isdn also provides users with a 128kbps bandwidth. This is done through frame relay. Frame relay complements and provides a service between ISDN, which offers bandwidth at 128 Kbps and Asynchronous Transfer Mode which operates in somewhat similar fashion to frame relay but at speeds from 155.520 Mbps or 622.080 Mbps. Frame relay is based on the older X.25 packet switching technology and is used to transmit analogue signals such as telephone conversations.

PSDN stands for packet switched data network and is a data communication network. Packet switched networks do not establish a physical communication signal like the public telephone circuit (circuit switched network) Packets are sent on a fixed length basis and assigned with a source and a destination address. The packages then explicitly on the routers to read the address and route the packets through the network.

Mobile and Broadband Services

Digital Subscriber Line (DSL) is mainly used to bring high bandwidth connections to homes and small business's over a copper wire telephone line. This is can only be achieved if you stay within the range of the telephone exchange. DSL offers download rates of up to 6mbps allowing continuous transmission of video, audio and 3D effects. DSL is set to replace ISDN and compete with the cable modem in providing multimedia to homes. DSL works by connecting your telephone line to the telephone office over copper wires that are twisted together.

Asymmetric Digital Subscribers Line is most commonly used for home users. It provides a high download speed but a lower upload speed. Using ADSL, up to 6.1 megabits per second of data can be sent downstream and up to 640 Kbps upstream.

Http://en.wikipedia.org/wiki/Symmetric_Digital_Subscriber_Line

Symmetric Digital Subscriber Line is a digital subcriber line which runs over one pair of copper wires. The main difference between ADSL and SDSL is the difference in upload and download speeds. SDSL allows the same upstream data rate and downstream data rate as ADSL upstream can be very slow.

[Http://searchnetworking.techtarget.com/sDefinition/0],,sid7_gci558545,00.html

HDSL High bit-rate Digital Subscriber Line, one of the earliest forms of DSL, is used for wideband digital transmission within a corporate site and between the telephone company and a customer. The main characteristic of HDSL is that that provides equal bandwidth in both directions.

IDSL is a system in which data is transmitted at 128 Kbps on a regular copper telephone line from a user to a destination using digital transmission.

The Local Loop enables operators to connect directly to the consumer via copper local loops and then add their own equipment to offer broadband and other services. This process involves operators accessing local exchange buildings to connect to a network of copper lines which connect them to homes and businesses. BT is an Example of a Local Exchange. The local loop connecting the telephone exchange to most subscribers is capable of carrying frequencies well beyond the 3.4 kHz upper limit.

Benefits of using DSL

DSL can provide a virtual instantaneous transmission of voice, data and video over ordinary copper phone lines. A DSL connection can eliminate delays while waiting to download information and graphics from the Internet. It provides users with a cost effective high speed Internet connection. Another benefit is that a DSL connection is always on-line (like a LAN connection) with no waiting time for dialing or connecting.

There are now more than 10 million broadband connections in the UK. By December 2005 there were 9.792 million broadband connections in the UK and the average broadband take up rate during the three months to December was more than 70,000 per week.

Posted in general | Comments Off on Wide Area Network (WAN)