+44(0) 1234 567 890 info@domainname.com
Showing posts with label Concept. Show all posts
Showing posts with label Concept. Show all posts

Thursday, 31 January 2013

What is Electronic Cigarette




What is Electronic Cigarette
The electronic cigarette is microelectronic vaporizing tool, which uses an advanced atomization system. Basically the device creates vapors which taste like nicotine (or other interesting flavors) by atomizing the liquid in the cartridge.
Having 3 parts:


  • A battery, which cleverly enough, activates automatic when you inhale. It is responsible with the supplying energy for the atomizer and the LED.
  • A Atomizer, which vaporizes the liquid in the cartridge.
  • A cartridge which is soaked in the e-liquid. You are advised to lean the cigar down, 30 degrees in order for the liquid to reach the atomizer.
Taking care of your electronic cigar:


  • Cartridges can be refilled approximately 10 times, after these uses the cotton in them will become smaller and less efficient and as a result the taste will change. Although there are some non-conventional ways of reconditioning your cartridge, you might end up destroying your device.
  • The atomizer also requires some maintenance. If you truly want to experience the electronic cigar at its best you should clean the atomizer at least a week. To clean it you have to unscrew the battery, take the cartridge out and insert a piece of cotton or a napkin. The next step is to blow from the opposite side. If you do not clean your atomizer for more than 5 weeks, you will have to immerse it in refined alcohol for 12 hours in order to eliminate the dry residues. However this method may irreparably deteriorate it, and should be used only in cases of extreme need.
  • The battery doesn’t usually require any cleaning, but there are cases when the liquid might come in contact with it, so it is advisable to clean it once a week.
If you are worried about the lifespan or quality of your e-cigar, you should take a look at the great BluCigs deals and offers. Some cigarettes are so dependable that they offer warranties. However good they are, it is however possible for the nichelin filament in the atomizer to weaken due to excessive use, and no matter how much we try to clean it, it will never function the same. Like the filament in the light bulb, the atomizer filament is bound to become worn out in time. All in all it is very easy to take care of your electronic cigar, it only takes a few minutes every week to clean it, and it is totally worth it.



And this tooo




No comments

Monday, 12 March 2012

TCP And UDP Ports


 Introduction
Concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.
The devices and comptuers connected to the Internet use a protocol called TCP/IP to communicate with each other. When a computer in India wants to send a piece of data to a computer in England, it must know the destination IP address that it woud like to send the information to. That information is sent most often via two methods, UDP and TCP.

The two Internet workhorses: UDP and TCP

UDP? TCP?  Getting confused, but I promise I will explain this in very basic terms so that you can understand this concept.

TCP stands for Transmission Control Protocol. Using this method,
The computer sending the data connects directly to the computer it is sending the data it to, and stays connected for the duration of the transfer. With this method, the two computers can guarantee that the data has arrived safely and correctly, and then they disconnect the connection. This method of transferring data tends to be quicker and more reliable, but puts a higher load on the computer as it has to monitor the connection and the data going across it. A real life comparison to this method would be to pick up the phone and call a friend. You have a conversation and when it is over, you both hang up, releasing the connection.

UDP stands for User Datagram Protocol.
Using this method, the computer sending the data packages the information into a nice little package and releases it into the network with the hopes that it will get to the right place. What this means is that UDP does not connect directly to the receiving computer like TCP does, but rather sends the data out and relies on the devices in between the sending computer and the receiving computer to get the data where it is supposed to go properly. This method of transmission does not provide any guarantee that the data you send will ever reach its destination. On the other hand, this method of transmission has a very low overhead and is therefore very popular to use for services that are not that important to work on the first try. A comparison you can use for this method is the plain old US Postal Service. You place your mail in the mailbox and hope the Postal Service will get it to the proper location. Most of the time they do, but sometimes it gets lost along the way.


Now that you understand what TCP and UDP are, 
Then start discussing TCP and UDP ports in detail. Lets move on to the next section where we can describe the concept of ports better.

TCP and UDP Ports

As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to the Internet. When information is sent over the Internet to your computer how does your computer accept that information? It accepts that information by using TCP or UDP ports.
An easy way to understand ports is to imagine your IP address is a cable box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports).
Ports work the same way. You have an IP address, and then many ports on that IP address. When I say many, I mean many. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports.
When a program on your computer sends or receives data over the Internet it sends that data to an ip address and a specific port on the remote computer, and receives the data on a usually random port on its own computer. 
If it uses the TCP protocol to send and receive the data then it will connect and bind itself to a TCP port. If it uses the UDP protocol to send and receive data, it will use a UDP port. Figure 1, below, is a represenation of an IP address split into its many TCP and UDP ports. Note that once an application binds itself to a particular port, that port can not be used by any other application. It is first come, first served.

<-------------------- 192.168.1.10 -------------------->
012345................6553165532655336553465535
Figure 1. IP address with Ports

This all probably still feels confusing to you, and there is nothing wrong with that, as this is a complicated concept to grasp. Therefore, I will give you an example of how this works in real life so you can have a better understanding. We will use web servers in our example as you all know that a web server is a computer running an application that allows other computers to connect to it and retrieve the web pages stored there.

In order for a web server to accept connections from remote computers, such as yourself, it must bind the web server application to a local port. It will then use this port to listen for and accept connections from remote computers. Web servers typically bind to the TCP port 80, which is what the http protocol uses by default, and then will wait and listen for connections from remote devices. Once a device is connected, it will send the requested web pages to the remote device, and when done disconnect the connection.

On the other hand, if you are the remote user connecting to a web server it would work in reverse. Your web browser would pick a random TCP port from a certain range of port numbers, and attempt to connect to port 80 on the IP address of the web server. When the connection is established, the web browser will send the request for a particular web page and receive it from the web server. Then both computers will disconnect the connection.
Now, what if you wanted to run an FTP server, which is a server that allows you to transfer and receive files from remote computers, on the same web server. FTP servers use TCP ports 20 and 21 to send and receive information, so you won't have any conflicts with the web server running on TCP port 80. Therefore, the FTP server application when it starts will bind itself to TCP ports 20 and 21, and wait for connections in order to send and receive data.

Most major applications have a specific port that they listen on and they register this information with an organization called IANA. You can see a list of applications and the ports they use at the IANA Registry. With developers registering the ports their applications use with IANA, the chances of two programs attempting to use the same port, and therefore causing a conflict, will be diminished.

Major Differents Between TCP & UDP

 

1 comment

Wednesday, 15 February 2012

What is Cluster Computing






Cluster Computing, or simply Cluster Computer is a collection of computers connected by a communication network. The purpose of Cluster Computing is to distribute a very complex process between the various components of the cluster computers. In essence, a problem that requires a lot of processing power to be solved is decomposed into separate subproblems which are solved in parallel. This obviously increases the computing power of the system. You can also compare to see the difference of Cluster Computing with Fabric Computing.
Types of Cluster Computing



There are three types of cluster computing system 

Fail-over, load balancing and high performance computing, the first two which are probably the most common:
1. Fail-over Cluster Computing : The machines’ work is continuously monitored and when one of the two host stops working the other machine takes over. The aim is to ensure a continuous service.
2. Cluster with load balancing : It is a system where work requests are sent to the machine with less load.
3. HPC Cluster Computing : The computers are configured to provide extremely high performance. The machines break down the processes of a job on multiple machines in order to gain in performance.






Characteristics of Cluster Computing:

Cluster Computing system makes multiple computers to act as a single computational resource and the various components of Cluster Computing are resources dedicated to the operation of the whole, then the server cluster is a high performance server, instead of putting the burden on a single system, divides the workload (ie functions, for example – mail servers, web servers, database servers and file servers) on multiple machines. In fact, Cluster Computing is a form of distributed system.



To create a Cluster Computing system one must :

  • Have an operating system able to operate computers as a cluster (Like Linux)
  • Hardware for high-performance network in Cluster Computing
  • Ability of Cluster Computing to run systems in parallel
 Advantages of Cluster Computing

The advantages of this Cluster Computing system are:
  • Economical : In fact these Cluster Computing systems are up to 15 times cheaper than traditional supercomputers with respect to which, for the same performance.
  • Scalability : Since the resources are distributed in case of Cluster Computing.
    Easy to upgrade and maintain.
  • Reliability : As the Cluster Computing system continues to operate even in case of failures in parts of it, obviously with lower performance.
Disadvantages of Cluster Computing

The main disadvantages of Cluster Computing are:
  • Difficult to manage and organize a large number of computers
  • Poor performance in the case of non-parallelizable applications
    Physical space needed is considerably greater than that of a single server
  • Increased power consumption compared to a single server
Usage of cluster computing for high performance

Using Cluster Computing can provide significant performance gain. System X, the supercomputer of Virginia Tech was the twenty-eighth most powerful supercomputer on Earth. It is a cluster from 12.25 TeraFLOPS consists of 1100 Apple XServe G5 dual processor 2.3 GHz ( RAM from 4 GB , HD SATA 80- GB ) running Mac OS X and interconnected via InfiniBand (Information provided by TOP500 Supercomputing Sites.)

No comments

Tuesday, 14 February 2012

How Virtualization Works and What it Does





Virtualization is now offered not only bigger companies, but also by small or medium sized companies. But how this Virtualization works and what it does. We have published various articles on Virtualization, this article explains two basic questions :
  • How Virtualization Works
  • What Virtualization Does
 How Virtualization Works
 The reduction in hardware prices and the presence of open source software making this technology increasingly affordable and if it is properly used, it can offer us more choices of operating systems ,while lowering the costs and bringing a greater control over our infrastructure. The major need to deploy the technology is dependent on type of processor. – the deployment of Virtualization is dependent on processor core – deployment differs from x86 and x64 processor.A hypervisor or Virtual Machine Monitor (VMM) is a virtualization software , which provides an environment for virtual machines created. Quite obviously, in order to manage the whole system, a specialized software is needed.

What Virtualization Does



The most common used application of Virtualization technology is in the field of hosting – Virtual Private Server or Virtual Dedicated Server. As one physical dedicated server is split in to virtually existing 3-4 dedicated servers, the cost – both the one time investment and running costs are reduced, which translates to reduced cost of web hosting.
Although web hosting appears to be the most important practical usage of Virtualization, there are various other usage of Virtualization technology and most importantly, Cloud Computing is nothing but a product of Virtualization technology.

To summarize

  • This technology makes one physical computer to behave as if like multiple computers.
  • Among the various advantages, the technology reduces both the short and long term costs.
  • It helps to avoid the under usage of resources.
  • Desktop virtualization, Virtual Private Server / Virtual Dedicated Server, Database Virtualization and Storage virtualization, Cloud Computing are either direct or indirect benefits of the technology.

2 comments

Friday, 3 February 2012

iWatch Concept

Sometimes I want to play the role of fairy god mother who can do anything in few simple stroke of her magical wand in the air. And guess what, you’re right I will surely make Apple throw this iWatch concept into production, right away.


Thanks to guys at the ADR Studios for this concept, the iWatch2 is a new generation wrist-wear that is iOS-compatible and full of exciting features.

And as we sees it, this concept watch boast some of the features we wanted to have on the final design of iWatch. The concept can be wirelessly connected to iDevices and it’s capable of  FaceTime, front-facing camera along with a mini LCD projector, a 32 GB hard drive to store all your pictures, music tracks and video files.
And if you’re thinking why Apple should have the iWatch? Think of Siri and iCloud as a perfect medium on how iPad, iPhone, iPod, Apple TV and Macs communicates on each other, then all of them was virtually controlled conveniently over your wrist. For example, you can just say or touch something on the iWatch and the Apple TV will play something for you. Interesting?
As of the moment, we don’t know if Apple is brewing something like this on their design lab but we’re very optimistic that Cupertino-giant will surprise us with their own iWatch soon.

Gallery


1 comment