? ??????????????Black and White Love? ????? ?? ???Rating: 4.3 (160 Ratings)??2040 Grabs Today. 31260 Total
Grabs. ??????Preview?? | ??Get the Code?? ?? ???????????????????????????Red? ????? ?? ???Rating: 4.8 (40 Ratings)??1969 Grabs Today. 26078 Total Grabs. ??????Preview?? | ??Get the C BLOGGER TEMPLATES AND TWITTER BACKGROUNDS ?

Tuesday, June 29, 2010

HUMAN immuNOdeficiency vIrUs






Influenza A (H1N1) virus is a subtype of influenza A virus and was the most common cause of human influenza (flu) in 2009. Some strains of H1N1 are endemic in humans and cause a small fraction of all influenza-like illness and a small fraction of all seasonal influenza. H1N1 strains caused a few percent of all human flu infections in 2004–2005.[1] Other strains of H1N1 are endemic in pigs (swine influenza) and in birds (avian influenza).

In June 2009, the World Health Organization declared the new strain of swine-origin H1N1 as a pandemic. This strain is often called swine flu by the public media. This novel virus spread worldwide and had caused about 17,000 deaths by the start of 2010

Sunday, June 20, 2010

nEtwORk tOpoLogY

Network topology is defined as the interconnection of the various elements (links, nodes, etc.) of a computer network.[1][2] Network Topologies can be physical or logical. Physical Topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to the fact that how data actually transfers in a network as opposed to its physical design.

Topology can be considered as a virtual shape or structure of a network. This shape actually does not correspond to the actual physical design of the devices on the computer network. The computers on the home network can be arranged in a circle shape but it does not necessarily mean that it presents a ring topology.

Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical.

A Local Area Network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometrical shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular network.

nEtWorK aRcHItectURE

Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation.

In computing, the network architecture is a characteristics of a computer network. The most prominent architecture today is evident in the framework of the Internet, which is based on the Internet Protocol Suite.

In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.

In distinct usage in distributed computing, network architecture is also sometimes used as a synonym for the structure and classification of distributed application architecture, as the participating nodes in a distributed application are often referred to as a network. For example, the applications architecture of the public switched telephone network (PSTN) has been termed the Advanced Intelligent Network. There are any number of specific classifications but all lie on a continuum between the dumb network (e.g., Internet) and the intelligent computer network (e.g., the telephone network). Other networks contain various elements of these two classical types to make them suitable for various types of applications. Recently the context aware network, which is a synthesis of the two, has gained much interest with its ability to combine the best elements of both.

cOmpUTer nEtWoRK

Computer networK is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data.[1] Computer networking is sometimes considered a sub-discipline of telecommunications, computer science, information technology and/or computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines. The three types of networks are: the Internet, the intranet, and the extranet. Examples of different network methods are:

~Local area network (LAN), which is usually a small network constrained to a small geographic area. An example of a LAN would be a computer network within a building.
~Metropolitan area network (MAN), which is used for medium size area. examples for a city or a state.
~Wide area network (WAN) that is usually a larger network that covers a large geographic area.
~Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.
All networks are interconnected to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, power lines and various wireless technologies.[2] The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet[3]). Networking, routers, routing protocols, and networking over the public Internet have their specifications defined in documents called RFCs.[

Tuesday, April 20, 2010

color code






Ethernet Cable Instructions:

Pull the cable off the reel to the desired length and cut. If you are pulling cables through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for 10BASE-T.
Start on one end and strip the cable jacket off (about 1") using a stripper or a knife. Be extra careful not to nick the wires, otherwise you will need to start over.
Spread, untwist the pairs, and arrange the wires in the order of the desired cable end. Flatten the end between your thumb and forefinger. Trim the ends of the wires so they are even with one another, leaving only 1/2" in wire length. If it is longer than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there are no spaces between wires.
Hold the RJ-45 plug with the clip facing down or away from you. Push the wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check the order of the wires. Double check again. Check that the jacket is fitted right against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with the crimper.
Check the color orientation, check that the crimped connection is not about to come apart, and check to see if the wires are flat against the front of the plug. If even one of these are incorrect, you will have to start over. Test the Ethernet cable.
Ethernet Cable Tips:

A straight-thru cable has identical ends.
A crossover cable has different ends.
A straight-thru is used as a patch cord in Ethernet connections.
A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
A crossover has one end with the Orange set of wires switched with the Green set.
Odd numbered pins are always striped, even numbered pins are always solid colored.
Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and pin 1 is on the left.
No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to crosstalk.
Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power cables, and do not run Ethernet cables near noise inducing components


The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the TIA/EIA 568-B standard in 2002 and has been updated since. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-out specification appear to be related and interchangeable, but are not the same and should not be used interchangeably.

ethernet crossover cable



An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly where they would normally be connected via a network switch, hub or router, such as directly connecting two personal computers via their network adapters.


The information listed here is to assist Network Administrators in the color coding of Ethernet cables. Please be aware that modifying Ethernet cables improperly may cause loss of network connectivity. Use this information at your own risk, and insure all connectors and cables are modified in accordance with standards. The Internet Centre and its affiliates cannot be held liable for the use of this information in whole or in part.

Monday, March 22, 2010

In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs. If a user attempts to launch an infected program, the virus' code may be executed simultaneously. Viruses can be divided into two types based on their behavior when they are executed. Nonresident viruses immediately search for other hosts that can be infected, infect those targets, and finally transfer control to the application program they infected. Resident viruses do not search for hosts when they are started. Instead, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself.

In 1884, the French microbiologist Charles Chamberland invented a filter (known today as the Chamberland filter or Chamberland-Pasteur filter) with pores smaller than bacteria. Thus, he could pass a solution containing bacteria through the filter and completely remove them from the solution.[11] In 1892, the Russian biologist Dmitry Ivanovsky used this filter to study what is now known as the tobacco mosaic virus. His experiments showed that crushed leaf extracts from infected tobacco plants remain infectious after filtration. Ivanovsky suggested the infection might be caused by a toxin produced by bacteria, but did not pursue the idea.[12] At the time it was thought that all infectious agents could be retained by filters and grown on a nutrient medium—this was part of the germ theory of disease.[2] In 1898, the Dutch microbiologist Martinus Beijerinck repeated the experiments and became convinced that the filtered solution contained a new form of infectious agent.[13] He observed that the agent multiplied only in cells that were dividing, but as his experiments did not show that it was made of particles, he called it a contagium vivum fluidum (soluble living germ) and re-introduced the word virus.[12] Beijerinck maintained that viruses were liquid in nature, a theory later discredited by Wendell Stanley, who proved they were particulate.[12] In the same year, 1899, Friedrich Loeffler and Frosch passed the agent of foot-and-mouth disease (aphthovirus) through a similar filter and ruled out the possibility of a toxin because of the reduced concentration; they concluded that the agent could replicate.[12]
In the early 20th century, the English bacteriologist Frederick Twort discovered a group of viruses that infect bacteria, which are now called bacteriophages[14] (commonly called phages), and the French-Canadian microbiologist Félix d'Herelle described viruses that, when added to bacteria on agar, would produce areas of dead bacteria. He accurately diluted a suspension of these viruses and discovered that the highest dilutions (lowest virus concentrations), rather than killing all the bacteria, formed discrete areas of dead organisms. Counting these areas and multiplying by the dilution factor allowed him to calculate the number of viruses in the original suspension.[15]
By the end of the nineteenth century, viruses were defined in terms of their infectivity, their ability to be filtered, and their requirement for living hosts. Viruses had been grown only in plants and animals. In 1906, Harrison invented a method for growing tissue in lymph, and, in 1913, E. Steinhardt, C. Israeli, and R. A. Lambert used this method to grow vaccinia virus in fragments of guinea pig corneal tissue.[16] In 1928, H. B. Maitland and M. C. Maitland grew vaccinia virus in suspensions of minced hens' kidneys. Their method was not widely adopted until the 1950s, when poliovirus was grown on a large scale for vaccine production.[17]
Another breakthrough came in 1931, when the American pathologist Ernest William Goodpasture grew influenza and several other viruses in fertilised chickens' eggs.[18] In 1949, John F. Enders, Thomas Weller, and Frederick Robbins grew polio virus in cultured human embryo cells, the first virus to be grown without using solid animal tissue or eggs. This work enabled Jonas Salk to make an effective polio vaccine.[19]
The first images of viruses were obtained upon the invention of electron microscopy in 1931 by the German engineers Ernst Ruska and Max Knoll.[20] In 1935, American biochemist and virologist Wendell Stanley examined the tobacco mosaic virus and found it was mostly made of protein.[21] A short time later, this virus was separated into protein and RNA parts.[22] The tobacco mosaic virus was the first to be crystallised and its structure could therefore be elucidated in detail. The first X-ray diffraction pictures of the crystallised virus were obtained by Bernal and Fankuchen in 1941. On the basis of her pictures, Rosalind Franklin discovered the full DNA structure of the virus in 1955.[23] In the same year, Heinz Fraenkel-Conrat and Robley Williams showed that purified tobacco mosaic virus RNA and its coat protein can assemble by themselves to form functional viruses, suggesting that this simple mechanism was probably the means through which viruses were created within their host cells.[24]
The second half of the twentieth century was the golden age of virus discovery and most of the 2,000 recognised species of animal, plant, and bacterial viruses were discovered during these years.[25][26] In 1957, equine arterivirus and the cause of Bovine virus diarrhea (a pestivirus) were discovered. In 1963, the hepatitis B virus was discovered by Baruch Blumberg,[27] and in 1965, Howard Temin described the first retrovirus. Reverse transcriptase, the key enzyme that retroviruses use to translate their RNA into DNA, was first described in 1970, independently by Howard Temin and David Baltimore.[28] In 1983 Luc Montagnier's team at the Pasteur Institute in France, first isolated the retrovirus now called HIV.[29]

virus

A virus (from the Latin virus meaning toxin or poison) is a small infectious agent that can replicate only inside the cells of other organisms. Most viruses are too small to be seen directly with a light microscope. Viruses infect all types of organisms, from animals and plants to bacteria and archaea.[1] Since the initial discovery of tobacco mosaic virus by Martinus Beijerinck in 1898,[2] about 5,000 viruses have been described in detail,[3] although there are millions of different types.[4] Viruses are found in almost every ecosystem on Earth and these minute structures are the most abundant type of biological entity.[5][6] The study of viruses is known as virology, a sub-specialty of microbiology.
Unlike prions and viroids, viruses consist of two or three parts: all viruses have genes made from either DNA or RNA, long molecules that carry genetic information; all have a protein coat that protects these genes; and some have an envelope of fat that surrounds them when they are outside a cell. (Viroids do not have a protein coat and prions contain no RNA or DNA.) Viruses vary from simple helical and icosahedral shapes to more complex structures. Most viruses are about one hundred times smaller than an average bacterium. The origins of viruses in the evolutionary history of life are unclear: some may have evolved from plasmids—pieces of DNA that can move between cells—while others may have evolved from bacteria. In evolution, viruses are an important means of horizontal gene transfer, which increases genetic diversity.[7]
Viruses spread in many ways; plant viruses are often transmitted from plant to plant by insects that feed on sap, such as aphids, while animal viruses can be carried by blood-sucking insects. These disease-bearing organisms are known as vectors. Influenza viruses are spread by coughing and sneezing. The norovirus and rotavirus, common causes of viral gastroenteritis, are transmitted by the faecal-oral route and are passed from person to person by contact, entering the body in food or water. HIV is one of several viruses transmitted through sexual contact and by exposure to infected blood.
Viral infections in animals provoke an immune response that usually eliminates the infecting virus. Immune responses can also be produced by vaccines, which confer an artificially acquired immunity to the specific viral infection. However, some viruses including those causing HIV and viral hepatitis evade these immune responses and result in chronic infections. Microorganisms also have defences against viral infection, such as restriction modification systems which restrict the growth of viruses. Antibiotics have no effect on viruses, but several antiviral drugs have been developed.