Tuesday, 23 June 2015
Friday, 19 June 2015
Thursday, 18 June 2015
Wednesday, 17 June 2015
How to run android on pc using bluestacks
Have you ever wanted to run android on pc , laptop or mac devices ? Here comes solution , in this video you will know how to download and run bluestacks on pc.
Bluestacks is an android emulator which allow user to run android apps on pc.
Sunday, 3 May 2015
Download APK from play store trick
APK Downloader
Have you ever downloaded apps from google play store. If you own an android phone I bet you did. If you have good internet connection or high speed wi-fi than it's ok , but if you have slow speed or bad connection network or any other network problem than it will definitely affect your download or stop download from play store. Sometimes internet isn't the issue , issue is storage. Google stop downloading after certain limit is crossed in your phone storage and you just need to download apk file or you are at home and you need to download apk file from play store but you don't know how you can download apk file in pc or mac. Here comes this trick.
Saturday, 2 May 2015
OSI Model Explained
OSI Model Explained
OSI Model or Open System Interconnection is conceptual model of network structure given by ISO (International Organization for Standardization). This model is to guide developer and network community for how stuff work inside network model. This structure is divided in Seven layers known as seven layers of OSI model. This was deloped by representatives of major computer and telecommunication companies beginning in 1983.The main concept of OSI is that the process of communication between two endpoints in a telecommunication network can be divided into seven distinct groups of related functions, or layers. Each communicating user or program is at a computer that can provide those seven layers of function.
What is VPN and Types of VPN
Types of VPN
In present day , everyone is uses Facebook , twitter and many other social networking websites , due to this websites PRIVACY becomes so publicly , it's almost impossible to make it truly private. So here comes the need of VPN ( Virtual Private Network). VPN setups private tunnel between user and vpn-service provider , so when user browse on web , every website gets different IP address than actual IP address of user and it's almost impossible to hacker to track you.
Friday, 1 May 2015
Five best games of 2014
Top Five Best Games Of 2014
2015 has arrived but games are never gonna end this year too. Here is the list of top five Games from 2014 which is been liked by public and has been rated top games . This list would be randomly but I prefer my ranking to them.
Thursday, 30 April 2015
Hybrid topology
HYBRID TOPOLOGY
Hybrid networks use a combination of any two or more topologies, in such a way that the resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example a tree network connected to a tree network is still a tree network topology. A hybrid topology is always produced when two different basic network topologies are connected. Two common examples for Hybrid network are: star ring network and star bus network
tree topology
TREE TOPOLOGY
A tree topology is essentially a combination of bus topology and star topology. The nodes of bus topology are replaced with standalone star topology networks. This results in both disadvantages of bus topology and advantages of star topology.For example, if the connection between two groups of networks is broken down due to breaking of the connection on the central linear core, then those two groups cannot communicate, much like nodes of a bus topology. However, the star topology nodes will effectively communicate with each other.It has a root node, intermediate nodes, and ultimate nodes. This structure is arranged in a hierarchical form and any intermediate node can have any number of the child nodes.
mesh topology
MESH TOPOLOGY
A mesh network uses a network topology in which each node (called a mesh node) relays data for the network. All nodes cooperate in the distribution of data in the network.
star topology
STAR TOPOLOGY
Star networks are one of the most common computer network topologies . In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. This consists of a central node, to which all other nodes are connected; this central node provides a common connection point for all nodes through a hub. In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch. The switch is the server and the peripherals are the clients.[1] Thus, the hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems.
ring topology
RING TOPOLOGY
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node – a ring. Data travel from node to node, with each node along the way handling every packet.
Learn Topology
What is topology ?
Topology is physical representation of computer networks and how they are connected to each other.This is geographical way of network connected and how they interact to each other.Before getting started first you should have some basic terminology of technical terms.
bus topology
BUS TOPOLOGY
A bus network is a network topology in which nodes are connected in a daisy chain by a linear sequence of buses.There are two terminator in the end of cable to observe signal and stop signal to bounce back.
Subscribe to:
Posts (Atom)