Blog Archive

Latest Games to Movies Releases

Diposkan oleh : ghetux On 4:13 PM 0 komentar

Roaming around in IMDB I decided to pick up a few names of movies into games releases which should come out on screens this year 2009. There is a list with short description.

The Legend of Spyro (2009) by Daniel and Steven Altiere– I’ll start from this one – one of my favorite game and favorite actors (Gary Oldman as Ignitus and Elijah Wood as Spyro) and it is obviously the best one from this list. Looking forward to see this animation.

Another movie which I can’t pass through is Kane & Lynch (2009) – based on Eidos video game. Last we heard is Simon Crane (an assistant director on Hancock, Troy) is attached to direct and Bruce Willis was actually in negotiations to play the part as Kane.

Spy Hunter (2009) written by Michael Brandt (2 Fast 2 Furious, Wanted) and Stuart Beattie (Australia, 30 Days of Night, Pirates of the Caribbean: Dead Man’s Chest and At World’s End, directed by Paul W.S. Anderson (Resident Evil, Mortal Combat) – action/adventure movie as James Bond.

Tekken (2009) – waiting for release of this action movie. Screen writers of Lara Croft suppose to present us something special with Luke Goss (Hellboy II, Blade II) in leading role. We hope that our expectation will come true.

Street Fighter: The Legend of Chun-Li (2009) - directed by Andrzej Bartkowiak (Doom, Cradle 2 the Grave, Romeo Must Die) and stars Kristen Kreuk (Lana Lang on Smallville) as Chun Li. Based on a famous and loved by many video game: many spectacle fights and beautiful legend.

Clock Tower (2009) – all fans of horrors are welcome! This film is based on famous survival horror game from Capcom. The screen play has elements from the game though it has it’s original story which is rejoicing. Brittany Snow (The Pacifier, Prom Night) is staring. Directed by Martin Weisz (The Hills Have Eyes II, 60 Seconds). As for me – I probably would watch it… once.

Sabotage 1943 (2009) – again Uwe Boll is on the stage! The movie is based on the video game Velvet Assassin (actually, it is coming out only this year!), tells about a British spy in the time of World War II. What to say? Have you seen movies of Uwe Boll? Are you going to do it again? Still, I couldn’t pass through :)

Finally action/horror movie Castlevania (2009) – written by Paul W.S. Anderson (see above) and Ian Jeffers, directed by Sylvain White (Stomp the Yard, Trois 3: the Escort). Cast is unknown till now and the date of release is moved on 2011. I guess the name should be different for this movie, for example, “Dracula Begins” – it would increase a popularity, don’t you think?

Category : | Read More......

Download Free Computer Games

Diposkan oleh : ghetux On 4:09 PM 0 komentar

What are computer games

?

Basically it is what people love to do or play in their free time. Some people have their hobbies as playing games. I would say that some games are very beneficial whereas some are just played to kill time. At the same time, it can be very addictive.

In this modern society, many people cannot live without it. It has a huge impact on the majority of people whether young or old. I would say that yes it has and people are willing to spend so much money on buying games. Why spend so much money to purchase a game? When you can actually download the games? Some people are able to afford to buy continuously but some are not able to do so. I used to be a person that spent at least $200 a month on all kinds of games.

Believe it or not computer games can actually activate your brain and at the same time increase your knowledge. So do not go and get games just to have fun with but do try getting a few that is beneficial. I can be called as one of those computer freaks you see out there but if not for the games I would not have widen my knowledge by a couple of yards. Some of you might not see that as being possible but trust me there are games that can help you increase your knowledge and at the same time you can have a whole lot of fun playing, such as Word Games.

Games in general are very wide. From adventurous to action, to drama and so on. There are a few things I learnt along the way when I purchased the games and played. I love games and like I said I spent a lot buying them but it just started to cost too much. After awhile my friends and I started to go to sites that allowed us to download games for free as we spent too much just buying them from stores. Some sites turned out as pure scam sites where they took your so called subscription fee and never gave proper access to the site and on the other hand some of the sites were actually legitimate. Today, I would like to share those sites with you. Websites that have the best game download programs that have been tested to ensure the quality. The review of each program is also well stated. I did this because I know it will help those people who I call 'gamer freaks' just like me to download and enjoy games for free. It took me awhile to get it done but I hope it will be able to help those who love games.

If you are free, do visit my blog and read more about computer games. I find the information helpful and I hope it does help you too. Through my blog, you can be directed to the website required to download the legitimate programs which will enable you to download free games.
Blog site: http://computer-games.blogspot.com/

Category : | Read More......

Records Management

Natural disasters, litigation, and computer failure are a few of the reasons to have records storage procedures done professionally to prevent mistakes. A records management service organizes, classifies, archives, preserves, and purges physical files and electronic information. A records management service stores documents and data safely, allows for their access, provides specialized storage, and can destroy them properly when they are no longer needed.

If a company stores and manages their records in house, it is expensive and not secure for information, and mistakes can be made. Paper records, including highly confidential documents, need to be managed, organized, and stored securely off site. Some businesses choose a self storage facility for off site storage. This is not a secure place for company history! A records management service uses alarm systems to safely keep records in a facility that also protects from fire, rodents, and other risks.

Keep Records Accessible

Information sometimes needs to be retrieved by companies immediately, and it needs to be accessible. Not only does a records management service get the physical files off site to avoid taking up valuable space, but their system allows for access to specific information when needed. Having access to needed information helps protect a company legally, helps meet compliance with regulatory obligations, and increases efficiency.

Data Backup

The amount of data that needs to be digitally stored is overwhelming for a business. This data needs to be backed up and stored consistently while also allowing for easy access. A records management service can facilitate the data back up and safely store it, and allow for easy recovery.

A records management service offers off site and highly secure storage of media. Sometimes specialized storage of items is needed for things such as tapes, discs and CD ROMs, and a records management company has the facilities to store them appropriately. The information is not only safeguarded, but it is easily recovered.

Privacy, data protection, and identity theft are important current issues for records management, so paper shredding and document destruction are crucial for protecting your company from making mistakes. Not only criminals could be looking through trash or unsecured storage for confidential information, but competitors and the news media. The information should be destroyed thoroughly so confidentiality is not compromised.

Category : | Read More......

If you are making database applications for end users, you have probably received requests from your users to add yet another type of query more than once. When developing a database, one can never foresee all possible types of queries in advance. In real life, something important - or rarely used - can easily be omitted from the code. For example, your users may want to locate all female customers born after 1969. Or all patients with certain diagnosis who are given particular treatments or certain drugs. Or all passengers who travelled to certain destinations at certain dates last year. Or all customers who've spent more than X dollars during the last holiday season. Dealing with this type of customer requests require additional support efforts and extra time on modifying existing code, which is hardly exciting.

Fortunately, there is a solution. If you are in a position to choose which database components to pick for your next project, get one that allows your users to submit custom queries as easy as possible. Ideally, the component would be completely transparent to the user, involving no calls to your technical support department.

EasyQuery http://devtools.korzh.com/eq/ is not just another one of the many developer-oriented database components. Offering unique user-friendly approach, EasyQuery is the first user-oriented database query solution on the market. Relieve your technical support department of requests asking to implement additional types of queries - your users will be able to do it on their own without you having to modify the application! Hard to believe? Try an online implementation of the system at http://ajax.easyquerydemo.com/ and design a few queries to see how easy it is!

EasyQuery helps your users to run any queries on a database they can imagine - without contacting your support team and without having to write a single line of code. They build their queries by simply pointing and clicking and without using cryptic internal field names such as CustNo, LName, or OrdDate. Instead, they would pick "Customer Number", "Last Name" and "Order Date" as the names of the columns, and use human language instead of database language. For example, they would use "begins with" instead of LIKE 'A%', "greater than" instead of ">", and so on. In case there's a limited selection of values, such as the name of a country, they'll be able to pick a value from a drop-down box instead of typing it.

>From the developer standpoint, EasyQuery is truly universal. Supporting many different databases, it can be used with MS SQL Server, Oracle, MySQL, Microsoft Access, and many other databases. EasyQuery is as easy to implement as it is to use, only requiring 20-30 minutes of your time to get started. The library offers unlimited expansion possibilities with a set of flexible APIs. The solution supports a multitude of development environment, and is supplied in the form of Delphi components, ActiveX controls, .NET Windows Forms components, or ASP.NET controls (with AJAX support) depending on your needs.

Extend your database application with unlimited, user-driven queries! Visit http://ajax.easyquerydemo.com/ to use an on-line demo, or browse directly to http://devtools.korzh.com/eq/ to learn more about EasyQuery and to download a free evaluation copy.

Category : | Read More......

Kaspersky Lab successfully detect the new malware which is capable to take over the use of mobile phones.

Last week, the experts at Kaspersky Lab detecting a new malware that attacks the Symbian operating system. The target of the attack is the user’s of a mobile phone operator in Indonesia. This trojan malware is a script written with the Python programming. Trojan send a short message containing instructions to transfer money to account number belonging to the criminal acts.

There are 5 variants of Trojan called as Trojan-SMS.Python.Flocker from ab to af. The ranges of money amount to be transferred are between USD0.45 to USD0.90. Although the amount is not big, if the perpetrator behind the Trojan successful infecting many mobile phones, the amount that can be obtaining is big enough.

“It is obvious that the Trojan target is money. It looks like the fraud to obtain money using malware for mobile devices increasingly overt. Until now, many people think that malware which send SMS messages without user’s know only happened in Russia. Now, we can see if the problem is not only happened in Russia, but also becoming international problems “, said Denis Maslennikov, senior analyst at Kaspersky Lab, through Kaspersky official news, Friday (23/01/2009).

Kaspersky Mobile Security users are protected from this new Trojan. Kaspersky products will block the malware so the malware will not work. Kaspersky Lab recommends that users must be careful when using a smart phone for surfing the internet. Kaspersky Lab also recommends that the mobile phone antivirus are up to date.

Digeus Duplicate Files Finder 8.2

Diposkan oleh : ghetux On 4:06 PM 0 komentar

Digeus Duplicate Files Finder 8.2 is a tool to assist anyone in cleaning up the contents of their personal hard drive or corporate network. You'd be surprised just how many redundant or duplicate files you could find forgotten in an obscure documents folder. Duplicate photos, music, word documents, PowerPoint presentations, videos, etc. If it appears twice on your computer then Duplicate Cleaner will find and eliminate the duplicate files that clutter your hard drive and slow your computer down. The duplicate file search is multi-threaded and very fast. Find duplicate files based on same name, size, CRC or comparing byte by byte. Found duplicates can moved to recycle bin, permanently deleted, zipped, or moved to a specified location. If you download a lot and don't know if there are a lot clone files with different names, this is the tool for you.

Key Benefits:
* Regain wasted disk space by cleaning up hard disks
* Organize files and manage files better
* Make your computer run faster
* More free disk space
* Prevent the problem "Insufficient disk space"
* Faster spyware scans
* Reduce backup time and media used for backups.
* Less confusion!

Key Features:
* Award Winning tool
* Convenient user interface
* Incredible simple 1-click solution;
* IMPROVED! Fast Scan & Clean duplicate documents, songs, photos, video, outlook emails, mp3, etc...
* Searching your hard drives, CDs, DVDs, network drives.
* Search files even file size larger than 4GB
* Highly customize search
* NEW! Predefined file masks sets
* Support for files with Chinese, Japanese, Arabian etc names
* Two powerful search engines (byte by byte and CRC32).
* Accurate results are displayed in a grid
* Show file properties
* Move files to Recycle Bin or delete duplicate files permanently or move to specified folder
* Designed with safety in mind
* Windows XP/Vista compatible

Cleaning Internet History

Diposkan oleh : ghetux On 4:05 PM 0 komentar

Cleaning Internet history

Your browser saves all the actions taken by you during surfing the Internet. So, each program that you ran, every single website where you landed, data submitted by you on various websites, every search string that you typed in search engines like Google, Yahoo or MSN to find specific information and even more are saved and stored. Perhaps this explains the importance of cleaning Internet history so that you are able to protect your privacy.

The storage of Internet history in your PC can improve the loading speed of a webpage, thereby making web surfing easier. However, if you are not the only person using that particular computer

, this could spell trouble. In case you share the computer with your spouse, other family members or roommates, people could see the whole thing that you have done while being online. Not erasing the Internet history may be a danger to your privacy and can even land you in an uncomfortable situation. So, cleaning Internet history should figure high on your to-do list.

You can clean the Internet history of your PC either through some special software or manually. However, as your computer stores the Internet history at diverse locations, merely cleaning browser history, cache and cookies won’t be sufficient. Even if you click the “Delete” button to erase Internet history files files and utilize the “Empty Recycle Bin” alternative, it may not erase the Internet history perpetually. Nevertheless, you can take these simple steps to clean your Internet browser history:

For Firefox:


  1. Go to “Tools” from the menu bar.

  2. Click on “Clear Private Data” from the drop down box which will delete every single bit of saved passwords and personal data from your computer.

  3. Do away with third-party “extensions” and “toolbars” separately, if you have any.

For Internet Explorer 7:


  1. Click on “Tools” and choose “Internet Options”.

  2. Next, choose the “General” tab.

  3. After that, in browsing history, click the “Delete” button.

  4. From the “Delete Browsing History” window that opens, choose “Delete All” for cleaning Internet history.

  5. The computer will ask for your final confirmation.

  6. Check the box stating: “Also Delete files and settings stored by add-ons.” After doing this, click the button that has “Yes” written on it.

  7. Lastly, in “Internet Options” window, click the OK button.

  8. Just like you have done in Firefox, wipe out the third-party “extensions” and “toolbars”.

For AOL (America Online):


  1. Try to find the “settings” button at the top of your browser window.

  2. After clicking this button, opt for “preferences”.

  3. Select “toolbar and sounds" and subsequently click on the “clear history trail now” button.

Though these are the basic steps for cleaning Internet history, you may find out that minor differences exist as you move from one browser to another. So, examine the browser that you use to know what exact steps need to be followed for cleaning Internet history. Remember that you should wipe out your browsing history from the computer so that your privacy remains unharmed and you can have an enjoyable surfing experience.

Flash Communication Server

Diposkan oleh : ghetux On 4:03 PM 0 komentar

Flash communication server is an interactive tool that is used widely by people around the world. This server-based platform has helped to create, and organize different interactive audio video web applications. This includes live events, web cameras, chatting, and broadcast of events. If you would have seen any of the news sites then easily you can make out the relevance of this server.

Let us discuss different interactive applications:

* Web camera with chat facility: Now without the help of a professional, one can capture and provide space for multi way streaming of audio visuals. You can add chat and video messaging to your existing site with this feature.

* Real time collaboration: Now the multiple users can easily share videos, data and text to provide the required platform for collaboration applications.

* Video on demand platform helps in streaming the media for quick delivering and efficient buffering of videos.

* Live broadcast: On our personal computers

now one can watch the live concert, games telecast, or any live broadcast. Even one has the facility to capture video, text chat or make use of real time stream control.

Some of the advantages of using a flash communication server

* Easy to use. One does not need to switch to and fro from current server to another. Easily you can host the website with the existing server.

* All servers are hosted at the main server of the company whom you have hired.

* For any kind of support, (including hosting of the website) you can take the help of certified developers.

To know more about flash communication server Visit: Flash communication server Web Applications Development

Category : | Read More......

Flash E-learning Solutions

Diposkan oleh : ghetux On 4:01 PM 0 komentar

E learning solutions have enabled students to develop a better understanding of the subjects. Some people have been able to enjoy the subject contents properly. The flash e learning solutions available these days are quite interactive and made keeping in mind the needs of person who is completely unfamiliar or very new to the subject matter. Flash e learning solutions help in developing curiosity in the mind of people and compel them to unfold the mysteries of any subjects.

These days many teachers use flash e-learning solutions to ensure that users learn and retain information. Further, they rapidly create high impact training. The e-learning modules have not only made teaching experience better but also made learning experience better. For your information, these days there are many companies offering with e learning solutions,but it is wiser to go in for a company that offers you with synchronous and asynchronous learning solutions.

Synchronous learning solutions are those where instructors and students interact with each other. They use real time through chat rooms and video streaming for developing the better understanding of the subject and having a healthy discussions. They can submit and get the assignments assessed in quality time.

Asynchronous Solutions makes the student independent and they get access prepackaged training modules, which can be used at their convenience.

They have the option to communicate with instructors via e-mail. Some of the advantages of e learning solutions are:

* Hold the student’s attention better and longer.

* Self directed and self paced training programs that enables ones to understand things on their own.

* Flash sites are developed with high impact animation. This helps in brining the concept to reality. So if you are preparing a science project, then these e learning modules are of great use.

* Convenient and increase ability to learn.

* Strong reference material that can be read repeatedly. If they have some specific question, then they contact the help desk.

* Mostly importantly, they are easy to use, even a child in primary school can use it.

For more information about e learning solutions including (CBT and WBT), visit icreonglobal.com


Category : | Read More......

Multimedia has caught the attention of many. It is a combination of text, audio- visuals, images, animation and other interactive content variety. For catching the attraction of people across the globe, many web developers and designers are looking forward to develop sites that are interactive and give a personalized touch to the viewers/ visitors. Particularly for the sites developed for corporate houses, educational institutions and for awareness campaigns, multimedia presentations are widely used. The growing competition among the business houses, has led to an increase in demand of something new every time. Seeing this many multi media professionals come up with new ideas and see that every project undertaken by them has something “unique”.

For different sites the professional needs too vary. For example, if an educational site is it to be made then instructional designing method is followed by them. Here very effectively audio visuals and graphics are blended to attract the attention of learner. Further pictorial representation helps in remembering the things better. At times they also prepare games, which help the user to know how things seen by them can be helpful in real life. If in the website video is used then easily audio elements can be incorporated that helps in grabbing the clients / visitors attention.

Similarly for corporate sites, multimedia catalogs can be developed. In addition to this one can use 3D pictures successfully for demo presentation. In addition to these multimedia presentations are used for making eye catching & information based business portfolios, catalogs, sales presentations, marketing material, tutorials, electronic brochures, annual reports, reseller education, sales presentation, interactive brochure, direct mail piece, etc. These are considered a valuable tool for creating an attractive multimedia site.

Hence, what we have seen is that various multimedia presentations have led new way to web development.

Best Software Outsourcing to India based firm offer Multimedia Solutions, web multimedia service like graphics design for website.

Category : | Read More......

Samsung M40 Inkjet Cartridges

Diposkan oleh : ghetux On 3:55 PM 0 komentar

PC Friend know that there are 3 elements needed to produce excellent printing results, good quality paper, ink and of course a decent printer. When looking for ink to fill your Samsung M40 printer we believe that you needn’t pay the earth for the results you need. We have found an alternative to expensive branded ink cartridges putting you in the driving seat as to how much you spend on ink.

The best kept secret once only known by a select few is now out and the benefits are available to anyone with a debit or credit card! Using a special formulation of chemicals tried and tested by our manufacturers, PC Friend have found a way to get you good quality ink specially designed for your Samsung M40 printer without paying the extortionate prices that genuine ink cartridges cost. We feel it is our responsibility to keep your money in your wallet and not in their bank accounts! Don’t pay for those marketing campaigns and expensive packaging and buy the ink inside for a fraction of the price.

Our Samsung M40 ink cartridges are sealed and in original packaging so you can feel rest assured that what comes to your door, whether at home or in the office, is 100% new and not tampered with. PC Friend do not ask you to compromise on printing quality but urge you to try a cheaper alternative that can save you up to 75% on original M40 ink cartridges. If you’re not happy with your Samsung M40 ink cartridges we offer a guarantee that protects our customers against faulty products and dissatisfaction. We will refund or exchange your M40 ink cartridges if you send them back.

Choose PC Friend for your cheap Samsung M40 ink cartridges and start saving money today. 90% of our orders are despatched the same working day using our next delivery service so that you don’t have to wait for your purchased items. PC Friend appreciate that sometimes keeping track of the toner in our printer is the last thing on your mind yet when you run out you realise how urgently you need it! PC Friend therefore makes it their priority to get you the products you need as quickly as possible.

Category : | Read More......

Hp 363 Inkjet Cartridges

Diposkan oleh : ghetux On 3:53 PM 0 komentar

PC Friend understands the importance of good quality ink and the results it produces on your paper. We also appreciate that genuine ink is expensive and needn’t be. We have found a cheaper alternative to branded ink and come up with a solution that is sure to have your printer working beautifully without your wallet feeling empty.

The secret’s out……ink cartridges that don’t cost the earth! These ink cartridges have been specially formulated to work in unison with your HP 363 printer to help you achieve professional long lasting results. We believe your money should stay in your wallet and not in the manufacturers’ bank account. We welcome you to a new era in which you take control and buy the ink, not the expensive packaging.

Our HP 363 inkjet cartridges compatible with your HP 363 printer are delivered to your door, whether at home or in the office in its sealed original packaging so you can be sure that nobody has tampered with it. PC Friend offers you the opportunity to save up to 75% on your normal ink cartridges whilst maintaining the quality in printing output that your documents and photos require.

To help ease any concerns we offer a no quibble money back guarantee should you not be happy with your product. We are confident however that you will never go back to branded ink cartridges again. Why pay more for the same results?

PC Friend has sourced the best quality ink from manufacturers using the latest technology in order to offer you ink cartridges sure to have your HP 363 printer working like a dream.

Choose PC Friend for your cheap HP 363 ink cartridges and start saving money today. 90% of our orders are despatched the same working day using our next delivery service so that you don’t have to wait for your purchased items. PC Friend appreciate that sometimes keeping track of the ink in your printer is the last thing on your mind yet when you run out you realise how urgently you need it! PC Friend therefore makes it their priority to get you the products you need as quickly as possible.

Category : | Read More......

Epson Inkjet Cartridges

Diposkan oleh : ghetux On 3:50 PM 0 komentar

Buying inkjet cartridges can be expensive, very expensive if you do a lot of printing. Before you know it you have run out of ink and you have to dig deep in your pocket again for that all important Epson inkjet cartridge! Don’t despair however as Epson compatible inkjet cartridges are now even better equipped to match the quality of OEM cartridges whilst saving you money….and lots of it!

Just because you have bought a genuine Epson printer does not mean that you have to sign up for a lifetime of purchasing expensive inkjet cartridges! There is an alternative that can offer you brilliant results at a fraction of the price!

Without a doubt the ink you buy is important to the quality in printing results that you achieve. Therefore it is not always best to go for the cheapest product when looking for professional printing results. Our products at PC Friend have been rigorously tried and tested to achieve optimum printing quality increasing the longevity of your printer and the documents and photos you print. Our ink does not run nor fade and offers you the opportunity to achieve a crisp sharp finish to your photos and documents time after time.

By buying Epson compatible inkjet cartridges at PC Friend you are guaranteed to receive 100% new and not recycled inkjet cartridges that WILL work with your Epson printer. PC Friend doesn’t think you should have to pay for expensive marketing campaigns and glossy packaging that goes in the bin. We have taken out all the middle men to find you a product that offers you quality without a hefty price tag.

Our range of Epson compatible inkjet cartridges is vast and our stock is plentiful so you are sure to receive the inkjet cartridges you need quickly and efficiently. All our inkjet cartridges are sent with free delivery so all you have to pay for is the items you want. PC Friend offers you an honest, helpful and straightforward service, with a no-quibble guarantee (being PC friendly!) so you can feel confident that the products you buy will work with your printer.

Ads by Google

Category : | Read More......

Hcl Mileap X Series

Diposkan oleh : ghetux On 3:48 PM 0 komentar

At a glance

'Leap tops', not laptops, is what the HCL's latest Mileap X series are being called. Why? Well, because they are sure a leap ahead from the previous laptop in not one but many terms. They are the world's cheapest notebooks with a range of primary features and are going to make your dream of owning a laptop a reality!

Key Features

The first thing you need to remember while comparing these notebooks with others is that they are aimed at people on a shoestring budget for a laptop and just want a basic portable machine. The MiLeap X series are powered by Intel Celeron M processor with a decent speed and an adequate standard RAM. Though the display screen is small, it does give a good picture quality and is also supported by an integrated video display card.

Other Features

The Mileap X series is no less on features considering that it provides you with a Wi-Fi card, an in built VIA Vinyl AC 97 sound card, microphone and speakers. Not only that, it also gives you an option of two USB ports and a 2 in one Digital Media Card Reader. The Operating System that it uses is Linux. The star attraction of this notebook is its battery life which is of an impressive four hours.

Design and Looks

The HCL Mileap X Series is one of those machines that you dreamt of as children. It looks chic, compact and attractive. It also comes in a range of three colors- blue, black and pink to choose from and weighs just around a kilogram. Its unique feature is that it is not only ultra light but is also completely shockproof.

Verdict

This is just the notebook you were waiting for to gift to your kid on his upcoming birthday. It is also useful to you if you just need a basic computing swanky looking gadget with no complications. The attractive colors give more interesting options to all the pretty damsels out there! Though it does lack a lot of features of a basic laptop and its small size can give you problems in usage, the price tag that it comes with will not have you ask for more.

Category : | Read More......

A Notebook PC consists of similar functionalities that a computer is comprised of. It is equipped with a LCD display, a keyboard and a touchpad which is equivalent of mouse. Its display primarily ranges from 13 inches to 17 inches, weighs between 1.4 to 5.4 kilograms and thickness ranges between 18-38mm . The laptop comes in folding design. Unlike desktop computers, it comprises of rechargeable battery and these devices have the advantage of removable memory facility which ensures large storage of data.

The modern-day laptops are portable, cheap priced and come with supremely stylish looks. Different companies manufacture various types of notebooks with different configuration and specifications. Sony Vaio, Dell, Fujitsu, Lenovo, Apple are some of the most recognized companies in dealing with laptops. The price varies on the Laptop configuration as notebooks with higher configuration and extra specifications are bit expensive while laptops with general features and lesser configuration are available at cheaper rates. A laptop's configuration mainly comprises of processor which may be Intel Dual Core, it may be enabled with windows or vista premium operating system.

The data speed varies from one notebook PC to the other. The RAM's capacity varies too, depending on the configuration. It may range from 1GB to 4GB or may be available with higher memory. Some laptops are enabled with TV tuner and built-in cameras for extra usage. The hard drive's capacity also varies, starting from 64GB to 320GB. The hard disk and RAM have smaller sizes as compared to desktops. The laptop's Central Processing Unit have better advantage than computer as they produce less heat and also save power. They may be of Intel Core, Core 2 Duo, Premium M, VIA Technologies etc. Many ports are available on the sides of the keyboard for USB connectivities and for other functions. Expandable memory cards such as MiniPCI are present in these devices for a large storage of data.

Thus both a laptop and notebook have more advantages as they are ultra-portable, durable and they can be used while travelling easily. We can have immediate access and can have our work done instantly and these are always up-to-date, as all files can be saved in a single location. With the help of wireless networks like Wi-Fi and cellular modems, we can access Internet even while on the go.

Category : | Read More......

A Great Example of Spyware – Ie Antivirus

Diposkan oleh : ghetux On 10:10 PM 0 komentar

If you have a laptop or desktop, the chances are that you have personal and necessary information stored on it. Every time you go online, protect yourself from spyware like IE Antivirus. The Internet has put the world at your fingertips. Computer technology makes possible the things we only dreamed of. At the same time, rogue anti-spyware programs like IE Antivirus manipulate tools that are created for ease and convenience to rob and steal from the end user.

Whether you are looking for a local Mom & Pop restaurant or need to shop the catalog of your favorite megastore, you don't have to go any further than your computer to find what you are looking for. Many of these programs claim that they can better serve you by tracking your surfing habits. From your favorite automobile pages to plainly obvious adult-content sites (don't forget peer to peer (P2P) or warez), stealth installs happen. As innocent as a tracking cookie or as hostile as a homepage hijack, adware, malware, and spyware can be found on just about any site. The trick is knowing how to stay away from harmful spyware like IE Antivirus.

Many rogue anti-spyware programs operate under previous names for as long as possible, but once unmasked, they change names and keep the same tactics. This family of spyware first originated from IE Defender. Then came AntiSpy-Pro, followed by Files-Secure. The newest addition includes IE Antivirus and Malware Bell.

IE Antivirus infects by way of Trojan Zlob or Vondu. Common signs of this infection include taking over your search engine queries to show several results leading to the spyware's website before you can find the actual information that you are seeking. The other more common mode of infection is to show security risks. This spyware authenticates its fake alerts by finding out what you named your computer and displaying it in the security risk warning.

If you inquire further, you will automatically be scanned without the program asking your permission. The results show a multitude of fake and exaggerated files intended to scare you into a purchase. Everything about the scan looks legitimate. The only thing questionable is the huge amount of spyware that it reports. If you decide to purchase, you will be directed to a website that includes everything you might want to know about an anti-spyware program. It includes a newsletter and a money-back guarantee. The only problem with that is the missing contact information...

Removal of IE Antivirus appears to be simple at first. Be very careful, because these files can be tricky—both tricky to find and tricky to remove. Many files will not be removable once you find them. You will have to set your computer to delete them the next time you start it up. One wrong move could mean permanent damage to your registry, leading to a complete wipe of your hard drive and a reinstallation of Windows.

For this reason, your best bet is to find a reputable anti-spyware program that will remove it and protect you in the future.

Category : | Read More......

Are you looking into setting up your own Craigslist proxy server and considering using a free provider? You may not know, but free proxies do not work on Craigslist. The main reason they do not work lies in their lack of anonymity, which makes it easy to detect.

The most common type of proxy is a free proxy. There is a common belief held by many that a free proxy is suitable to be used as a Craigslist proxy. Sadly, this is not the case. One of the biggest problems with free proxies is that they are not anonymous. If you want to be able to post advertisements on Craigslist with as little trouble as possible then this is something you need to pay attention to. As mentioned, free proxies are not anonymous and they do not hide the fact that they are a proxy. This being the case, Craigslist simply needs to first query an IP and check for any signs that it is a proxy and if this is the case all ads are blocked. There are some people who make the mistake of assuming that all proxies are created equally and they try to use them to post on Craigslist. This obviously doesn't work and they quickly become frustrated. Even though free is good, free proxies and other similar proxy solutions simply do not work with Craigslist and the only real solution is to spend a few dollars on setting up and creating your own Craigslist proxy.

Due to their lack of anonymity, free proxy servers are not a suitable Craigslist proxy solution. The best alternative is to invest in your own proxy server which will be 100% anonymous. Doing so will save you a lot of time and energy.

Category : | Read More......

Barbie on Vacation at Paris!

Diposkan oleh : ghetux On 10:01 PM 0 komentar

Are you getting stressed? Why don’t you accompany Barbie on vacation to Paris? Paris would be a very ideal vacation place where you learn to appreciate art and fashion! Yet before you buy the plane tickets and pack your luggage, you have to prepare the necessary things that Barbie needs. Have a luxurious vacation and de-stress. Enjoy the exclusive flats and luxury vacation homes that you will surely enjoy and don’t miss the Eiffel Tower, the Arc de Triomphe, Versailles and the Louvre!

Dress up Barbie on a red, plaited skirt matched with ladies black neck tops. Its enticing design and stylish cut makes the outfit superb modern and gives the unmatched sophistication in a simplified fashion. Barbie will surely catch the glances of many with her classy look at the airport.

After arriving at the hotel, make sure that both of you have already planned how to spend the vacation together. Paris is such a beautiful place and it would be gratifying to maximize the time that you have to visit the world –known places. Why don’t you start over the Louvre Museum and get amazed with the stunning Renaissance art. Get the brown long sleeve knitted turtle neck tops and pair it with a black skinny flare pair of trousers. A fashion fur coat in white with silver accents would perfectly fit with the contrasting effect to the trousers. A matching pair of brown pumps would give the sexy and trendy effect that creates the expensive look of Barbie!

A simple tank top in blue gives the casual outfit that you can dress up for the strolling at the long Champ du Mars, the Tower grows bigger and even more impressive as you approach! Have a relaxing walk and forgive yourself from buying ice cream and cotton candies. Paired with a miniskirt accentuated by a brooch and flats, an additional neck scarf would get that creative style which distinct Barbie on vacation from the crowd.

A modish neckline and bottoms convey intriguing fashion. Same as with a fashion jacket matched with a boot cut pair of jeans and a pashima shawl! The scarf speaks an overwhelming poise despite of the rugged outfit, making it a casual and yet staple fashion makeover of Barbie on vacation. This will be best to wear on for simple dressing up while on the streets of Paris!

Look retro with a three-fourths pants matched with a long sleeve tops in yellow. A laced sports shoes and a stripped bag would set that groovy look for the retro party with Barbie on vacation. Get the fun with the late party at night with Barbie on vacation. You should have all the fun and excitement while away from the stressful work at the office. Meet friends and acquaintances from different places and share your unique stories to each other.

To have a meaningful Barbie on vacation, enjoy each moment and forget the bunch of work you left at the office. After all, you are here to enjoy and have fun!

Category : | Read More......

Today free online adventure and action games can now be easily downloaded from different websites. Game lovers are preferring and love to play online adventure games today. For this, they register themselves on different gaming websites. Computers games are gaining popularity among the masses of different age group these days. Computer gaming has gained a wide popularity among the masses of all age groups. Now there is wide variety of adventure and action games available online. Even many of the gaming sites offer various types of games which can be download 'free of cost' to PC or laptops.


The adventure games are more popular among the masses than video games. Action and adventure games involve exotic games like wrestling, fighting, space travels, star wars, fictional adventures and situational games. Often this type of games come with rich graphics and animation. The adventure games involve issues like puzzle-solving etc, where the players have lot of opportunities to take active participation. Action games are more interactive. Action and adventure games consist of single-player game and multi-players games. In single-player mode, narration is used to be the main focus of the game. Many of the gaming sites, offer free adventure games which can be easily downloaded to the PC.

Computer games are important means of entertainment for kids, teenagers and to all age group people. Today masses spend most of their time playing online adventure games. With the coming up of various websites, it is easy to download games, free of cost. Now you can play exciting online games, as users would be getting it free. Games like shooting, billiards, war, puzzle, poker and lots more are there and users can choose from many options.

These interactive games are a good source to ensure maximum fun. The games could be automatically installed without any specific software. Games have changed the entertainment scenario completely in many perspective. They not only entertain the users, but also soothe the user's mind. There are different options to choose from amongst the fun games. This include action and adventure, arcade, driving and racing, role playing, etc. Users can also buy games online at low cost or download free games on their computers following easy steps. Online games are available 24 hours without a single minute break. Games include various types and categories like adventures, action etc. But adventure games are most attracted by all ages. These games are easy to play and easily down-loadable. The games are loaded with sophisticated gaming features, these advanced technology games ensure interactive and thrilling gaming experience to the players.

But many people have to face problems finding the best free online games. Though it is not tough for those who regularly play games they don't have a problem finding suitable games. There are free online games available on every second game website. If you are looking for a specific game, you can search the Internet, type the name of the game in the search box, and then you will have it right in front of you. There are games available for all age group whether a child, a teenager or an adult. Everyone can find many suitable games according to their likes and preferences.

Category : | Read More......

Following is the full syntax used for creating database in Sql Server 2005.

-------------------------------------------------------------------------------------------------------------------------------------------

CREATE DATABASE database_name

[ ON [ PRIMARY ] [ <>] ]

{ LOG ON [ <> ] ]

<> : : =

( [ NAME = logical_file_name , ]

FILENAME = 'os_file_name'

[ , SIZE = size ]

[ , MAXSIZE = { max_size | UNLIMITED } ]

[ , FILEGROWTH = growth_increment ] ) [ ,.... n ]


Description ::-

ON specifies the disk file used to store the data portion of the database.

LOG ON specifies the disk files used to store log files.

FILENAME=os_file_name specifies the operating-system file name for the file.

PRIMARY specifies the associated list that defines files in the primary filegroup.

NAME=logical_file_name specifies the logical name for the file.

MAXSIZE=max_size specifies the maxium size to which the file defined in the list can grow.

FILEGROWTH=growth_increment specifies the growth increment of the file defined in the list.

Remember - " FILEGROWTH setting for a file cannot exceed the MAXSIZE setting"

NOTE : Everything written between [ ] is optional .

But remeber that to create a database you must be a member of the dbcreator server role.

After a database is created, to check details of the database use following command :

sp_helpdb [ database_name ]

To drop a user defined database use following command:

DROP DATABASE database_name

Note: you cannot delete a system-defined database.

To rename a user-defined database use :

sp_renamedb old_database_name , new_database_name

Fortunately you can also create a database by a right click on the object explorer, Thanks to SQL SERVER Management studio 2005.

SQL SERVER 2005 contains the following system database :


  1. master

  2. tempdb

  3. model

  4. msdb

  5. Resource

Category : | Read More......

You can share a folder with advanced permissions. You use these permissions to decide who has access to the folder and what those users can do with the folder. You can also apply advanced permissions to entire security groups rather than individual users. For example, if you apply permissions to the Administrators group, those permissions automatically apply to each member of that group.

Before continuing, make sure you have a user account set up for each person who will access the share. Follow these steps to share a folder with advanced permissions:

1. Select Start, and then click your username to open your user profile folder.

2. Click the folder you want to share. If you want to share a subfolder or file, instead, open its folder and then click the subfolder or file.

3. Click the Share button in the task pane. Windows Vista displays the object’s Properties sheet with the Sharing tab selected.

4. Click Advanced Sharing. The User Account Control dialog box appears.

5. Enter your UAC credentials to continue. The Advanced Sharing dialog box appears.

6. Activate the Share This Folder check box.

7. By default, Vista uses the folder name as the share name. If you prefer to use a different name, edit the Share Name text box.

8. In a small network, it’s unlikely you’ll need to restrict the number of users who can access this resource, so you’re probably safe to leave the Limit the Number of Simultaneous Users To spin box value at 10.

9. Click Permissions to display the Permissions for Share dialog box, where Share is the share name you specified in step 7.

10. Select the Everyone group in the Group or User Names list, and then click Remove.

For Complete Story please visit: http://techanand.com/?p=18

Correcting Network Time

Diposkan oleh : ghetux On 9:46 PM 0 komentar

Distributed networks rely completely on the correct time. Computers need timestamps to order events and when a collection of machines are working together it is imperative they run the same time.

Unfortunately modern PC’s are not designed to be perfect timekeepers. Their system clocks are simple electronic oscillators and are prone to drift. This is not normally a problem when the machines are working independently but when they are communicating across a network all sorts of problems can occur.

From emails arriving before they have been sent to entire system crashes, lack of synchronisation can causes untold problems across a network and it is for this reason that network time servers are used to ensure the entire network is synchronised together.

Network time servers come in two forms – The GPS time server and the radio referenced time server. GPS NTP servers use the time signal broadcast from GPS satellites. This is extremely accurate as it is generated by an atomic clock on board the GPS satellite. Radio referenced NTP servers use a long wave transmission broadcast by several national physics laboratories.

Both these methods are a good source of Coordinated Universal Time (UTC) the world’s global timescale. UTC is used by networks across the globe and synchronising to it allows computer networks to communicate confidently and partake of time sensitive transactions without error.

Some administrators use the Internet to receive a UTC time source. Whilst a dedicated network time server is not required to do this it does have security drawbacks in that a port is needed to be left open in the firewall for the computer to communicate with the NTP server, this can leave a system vulnerable and open to attack. Furthermore, Internet time sources are notoriously unreliable with many either too inaccurate or too far away to serve any useful purpose.

Category : | Read More......

Abstract

This paper investigates into the routing protocols in ad hoc wireless networks. Performance, quality-of-service, security, and power management failure cause the packet losses, delay variation and illegal authorization in ad hoc wireless networks. To handle these issues, different protocols have been proposed such as: battery-aware routing protocol, cooperative anomaly detection protocols, and a list of available protocol proficient to detect and trim down congestions.

Key words: routing protocols, security, power management, QoS

Introduction

Ad hoc wireless network is very sensitive network as it has no fixed infrastructure; there fore vulnerable possessions routing protocols must be evaluated escalating the number of nodes in network. Nodes are free to move independently and this movement should be settled down quickly. Routing is the processes of moving information in the form of packets across a network from a node-to-node. Routing protocols use metrics to evaluate the best promising path for the packet to reach on destination. Routers are the devices that route the packet on the network. They also maintain route information that helps in influencing the best path to various destinations. They are responsible to change information and to find a feasible path to destination with the help of hop length, power required (minimum or maximum), life time of wireless link, and utilize bandwidth type of information. Routing protocols must be durable to terrorization and vulnerabilities such as; resource consumption, denial-of-service, delay, packet delivery ratio and similar attacks possible against an ad hoc wireless network. Performance, security, quality-of-service, power management, reliability, and scalability are the major areas to provide good service. This paper discusses to widen curiosity in getting new concepts of routing protocols in ad hoc wireless networks. It is categorized in four classes with issues and their approaches: performance and methodologies, security and quality-of-service, and power management.

Issues and Problems

Routing protocol should be able to provide a certain level of quality-of-service in ad hoc wireless network as demanded by the nodes such as the parameters of quality-of-service can be throughput, packet delivery ratio, jitter, and supporting differentiated class of service. Node mobility, multicasting consumes high energy [1, 2]; large synchronization and multi-path forwarding increases the probability of duplication of messages [5] at large-scale replication.

Resource consumption, denial-of-service, information discloser, buffer overflow, interference and lake of central co-ordination make wireless network more vulnerable. Due to no central infrastructure, attackers attempt to break security and get authentication /authorization. Security can be weakened from lopsided target detection. Irregularity and non-secure protocols that based on On-demand Distance vector over IP V6 in wireless network cause the overcrowding and increase malicious nodes, attackers achieve their target.

Real time applications require a high energy to maintain performance where source and destination keep changing at every time. Major issues are power management, packet losses, security attacks and similarities in applications that decrease the performance. By the interruption of some selfish nodes, the establishment of a routing process to sends packets from source to destination, and during communication in ad hoc wireless network multicasting of addresses decreases total packet delivery.

Power management can be controlled significantly by utilizing the intelligent devices. Management designed routing protocol should be energy-efficient having good comprehension of network topologies. Some or all of the mobile nodes operate on batteries, for transmission communication applications need high energy [16]. Irregularity of message sequence of high density, like “hello packets”, consumes high energy due to short life of nodes. Forwarding of query based message end-to-end delay also consumes high energy in ad hoc wireless networks.

Approaches and Methodologies

Different routing protocols are active in wireless network pasture with intelligence properties. These abilities make network protected against attackers. As discussed above each application has different requirements to negotiate between host and network. It’s important to maintain quality-of-service on a per node level, per link, per flow of data in network, thus it is essential to have better coordination between source and destination to achieve quality-of-service. A Local Broad Clustering (LBC) and Call Hash Table routing protocol reduce the high-energy consumption from nodes and increase the communication range of nodes, also enhance the network life [4]. In other routing protocols, Multi-cost, Multiple description mechanism, Quality-of-service aware and Quality-of-service framework is active to achieve quality-of-service in ad hoc wireless networks.

Wireless network has been continued source of security breaches/flaws due to the nature of radio frequency transmission where everyone can receive the broadcast message. Protocols have been proven to be inadequate to today’s security. In proposed protocols, Random walk-based On-demand routing protocol handles the issues of distributed authentication.

To provide and maintain a high performance, different architecture and protocols have been implemented. The proposed architecture of swarm intelligent multi-path routing protocol reduces congestion and increases performance by taking action against packet loss, transmission delay, delay variation, and different intrusions [11]. Best route discovery and data transmission can be achieved with COMMIT protocol, which is based on the Visualization tool for Compiler Graph (VCG) and can, read a textual and readable specification of a graph and visualize the graph. It is the best protocol for the rout discovery. Other protocols, namely Periodic Hello Protocol (PHP), Adaptive Hello Protocol (AHP) and Reactive Protocol (RP) reduce congestion in network to increase performance in ad hoc wireless network.

Each node in wireless network participates in two kinds of activities, sending and receiving messages. Especially, hello messages consumes large amount of power. Requests can be set on priorities by using Prioritized Battery Aware routing protocol, allowing some routing connections having high priority and assigning power according to their rations. Another max-min routing protocol also performs same functions by reducing the irregularity of message sequence. It uses the distributed sensors to monitors large geographical areas as grid of computation. The most commonly used batteries in wireless devices are nickel-cadmium and lithium-ion batteries, which are widely used in laptops, cellular phones, PDAs, tablet PCs and other portable computing and communication devices. In the figure a complete processes of battery usage have been illustrated [16]. In figure (a) battery is showing a full charged state as well as the load increasing or node moving from source to destination battery starting to discharge (b).Battery voltage drops, it starts recovery (c). After recovering it gets stable again (d). In final session (e), (f) stage of battery dies with discharging loss and battery dies without discharging loss are shown. Other routing protocols such as: energy aware, ad hoc On-demand Distance Vector (AODV), Directional Local Recovery (DLR), and Dynamic Power Management (DPM) are also able to diminish power consumption.

Future work

As a future work security related factors and fragile scenarios will be considered and tested on the subject of the system effectiveness. A resource-efficient detection model will be investigated to improve performance in ad hoc wireless network.

Conclusion

In ad hoc wireless networks, quality of service, security, performance and power management are achieved by routing protocols. Actually, it is very sensitive service. That’s way it is difficult to maintain routing protocols. Outlay of data is more then a billons there fore, it need more sanctuary and solitude. Security attacks form intruders who try to attempt authentication, authorization, and damage the data which leads to poor quality of service, pitiable performance, and extra utilization of power management. Routing protocols provides best solutions by using efficient routing mechanism.

References

  1. 2. Energy-Aware Routing in Wireless Ad-Hoc Networks
    Found in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), By Panagiotis C. Kokkinos, Christos A. Papageorgiou , Emmanouel A. Varvarigos. Issue Date: June 2005, pp. 306-311

  2. 11. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks Found in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05), By Saida Ziane , Abdelhamid Melouk, Issue Date: October 2005, pp. 620-626

  3. 12. COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes Found in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12, By Stephan Eidenbenz , Giovanni Resta , Paolo Santi Issue Date: April 2005, pp. 239b

  4. A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks
    Found in: International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, By Li Layuan , Li Chunlin, Issue Date: April 2005, pp. 609-614

  5. Energy Aware Routing Protocol for Mobile and Wireless Ad hoc Networks
    Found in: 28th Annual IEEE International Conference on Local Computer Networks (LCN'03), By Azzedine Boukerche, Harold Owens II, Issue Date: October 2003 pp. 768

  6. 19. Power Management in Wireless Ad Hoc Networks Using AODV
    Found in: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), By Liang Cheng , Anu G. Bourgeois , Bo Hyun Yu, Issue Date: May 2005, pp. 436-443

Category : | Read More......

Abstract

This paper investigates into the routing protocols in ad hoc wireless networks. Performance, quality-of-service, security, and power management failure cause the packet losses, delay variation and illegal authorization in ad hoc wireless networks. To handle these issues, different protocols have been proposed such as: battery-aware routing protocol, cooperative anomaly detection protocols, and a list of available protocol proficient to detect and trim down congestions.

Key words: routing protocols, security, power management, QoS

Introduction

Ad hoc wireless network is very sensitive network as it has no fixed infrastructure; there fore vulnerable possessions routing protocols must be evaluated escalating the number of nodes in network. Nodes are free to move independently and this movement should be settled down quickly. Routing is the processes of moving information in the form of packets across a network from a node-to-node. Routing protocols use metrics to evaluate the best promising path for the packet to reach on destination. Routers are the devices that route the packet on the network. They also maintain route information that helps in influencing the best path to various destinations. They are responsible to change information and to find a feasible path to destination with the help of hop length, power required (minimum or maximum), life time of wireless link, and utilize bandwidth type of information. Routing protocols must be durable to terrorization and vulnerabilities such as; resource consumption, denial-of-service, delay, packet delivery ratio and similar attacks possible against an ad hoc wireless network. Performance, security, quality-of-service, power management, reliability, and scalability are the major areas to provide good service. This paper discusses to widen curiosity in getting new concepts of routing protocols in ad hoc wireless networks. It is categorized in four classes with issues and their approaches: performance and methodologies, security and quality-of-service, and power management.

Issues and Problems

Routing protocol should be able to provide a certain level of quality-of-service in ad hoc wireless network as demanded by the nodes such as the parameters of quality-of-service can be throughput, packet delivery ratio, jitter, and supporting differentiated class of service. Node mobility, multicasting consumes high energy [1, 2]; large synchronization and multi-path forwarding increases the probability of duplication of messages [5] at large-scale replication.

Resource consumption, denial-of-service, information discloser, buffer overflow, interference and lake of central co-ordination make wireless network more vulnerable. Due to no central infrastructure, attackers attempt to break security and get authentication /authorization. Security can be weakened from lopsided target detection. Irregularity and non-secure protocols that based on On-demand Distance vector over IP V6 in wireless network cause the overcrowding and increase malicious nodes, attackers achieve their target.

Real time applications require a high energy to maintain performance where source and destination keep changing at every time. Major issues are power management, packet losses, security attacks and similarities in applications that decrease the performance. By the interruption of some selfish nodes, the establishment of a routing process to sends packets from source to destination, and during communication in ad hoc wireless network multicasting of addresses decreases total packet delivery.

Power management can be controlled significantly by utilizing the intelligent devices. Management designed routing protocol should be energy-efficient having good comprehension of network topologies. Some or all of the mobile nodes operate on batteries, for transmission communication applications need high energy [16]. Irregularity of message sequence of high density, like “hello packets”, consumes high energy due to short life of nodes. Forwarding of query based message end-to-end delay also consumes high energy in ad hoc wireless networks.

Approaches and Methodologies

Different routing protocols are active in wireless network pasture with intelligence properties. These abilities make network protected against attackers. As discussed above each application has different requirements to negotiate between host and network. It’s important to maintain quality-of-service on a per node level, per link, per flow of data in network, thus it is essential to have better coordination between source and destination to achieve quality-of-service. A Local Broad Clustering (LBC) and Call Hash Table routing protocol reduce the high-energy consumption from nodes and increase the communication range of nodes, also enhance the network life [4]. In other routing protocols, Multi-cost, Multiple description mechanism, Quality-of-service aware and Quality-of-service framework is active to achieve quality-of-service in ad hoc wireless networks.

Wireless network has been continued source of security breaches/flaws due to the nature of radio frequency transmission where everyone can receive the broadcast message. Protocols have been proven to be inadequate to today’s security. In proposed protocols, Random walk-based On-demand routing protocol handles the issues of distributed authentication.

To provide and maintain a high performance, different architecture and protocols have been implemented. The proposed architecture of swarm intelligent multi-path routing protocol reduces congestion and increases performance by taking action against packet loss, transmission delay, delay variation, and different intrusions [11]. Best route discovery and data transmission can be achieved with COMMIT protocol, which is based on the Visualization tool for Compiler Graph (VCG) and can, read a textual and readable specification of a graph and visualize the graph. It is the best protocol for the rout discovery. Other protocols, namely Periodic Hello Protocol (PHP), Adaptive Hello Protocol (AHP) and Reactive Protocol (RP) reduce congestion in network to increase performance in ad hoc wireless network.

Each node in wireless network participates in two kinds of activities, sending and receiving messages. Especially, hello messages consumes large amount of power. Requests can be set on priorities by using Prioritized Battery Aware routing protocol, allowing some routing connections having high priority and assigning power according to their rations. Another max-min routing protocol also performs same functions by reducing the irregularity of message sequence. It uses the distributed sensors to monitors large geographical areas as grid of computation. The most commonly used batteries in wireless devices are nickel-cadmium and lithium-ion batteries, which are widely used in laptops, cellular phones, PDAs, tablet PCs and other portable computing and communication devices. In the figure a complete processes of battery usage have been illustrated [16]. In figure (a) battery is showing a full charged state as well as the load increasing or node moving from source to destination battery starting to discharge (b).Battery voltage drops, it starts recovery (c). After recovering it gets stable again (d). In final session (e), (f) stage of battery dies with discharging loss and battery dies without discharging loss are shown. Other routing protocols such as: energy aware, ad hoc On-demand Distance Vector (AODV), Directional Local Recovery (DLR), and Dynamic Power Management (DPM) are also able to diminish power consumption.

Future work

As a future work security related factors and fragile scenarios will be considered and tested on the subject of the system effectiveness. A resource-efficient detection model will be investigated to improve performance in ad hoc wireless network.

Conclusion

In ad hoc wireless networks, quality of service, security, performance and power management are achieved by routing protocols. Actually, it is very sensitive service. That’s way it is difficult to maintain routing protocols. Outlay of data is more then a billons there fore, it need more sanctuary and solitude. Security attacks form intruders who try to attempt authentication, authorization, and damage the data which leads to poor quality of service, pitiable performance, and extra utilization of power management. Routing protocols provides best solutions by using efficient routing mechanism.

References

  1. 2. Energy-Aware Routing in Wireless Ad-Hoc Networks
    Found in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), By Panagiotis C. Kokkinos, Christos A. Papageorgiou , Emmanouel A. Varvarigos. Issue Date: June 2005, pp. 306-311

  2. 11. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks Found in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05), By Saida Ziane , Abdelhamid Melouk, Issue Date: October 2005, pp. 620-626

  3. 12. COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes Found in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12, By Stephan Eidenbenz , Giovanni Resta , Paolo Santi Issue Date: April 2005, pp. 239b

  4. A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks
    Found in: International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, By Li Layuan , Li Chunlin, Issue Date: April 2005, pp. 609-614

  5. Energy Aware Routing Protocol for Mobile and Wireless Ad hoc Networks
    Found in: 28th Annual IEEE International Conference on Local Computer Networks (LCN'03), By Azzedine Boukerche, Harold Owens II, Issue Date: October 2003 pp. 768

  6. 19. Power Management in Wireless Ad Hoc Networks Using AODV
    Found in: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), By Liang Cheng , Anu G. Bourgeois , Bo Hyun Yu, Issue Date: May 2005, pp. 436-443

Category : | Read More......

About Me

My photo
"im the man not superman"

SPONSOR


Masukkan Code ini K1-YA6F17-2
untuk berbelanja di KutuKutuBuku.com

Followers