30 Eylül 2012 Pazar

Totally Easy Quilt - A good one for prompting geography lessons!

To contact us Click HERE
This quilt is an absolute cinch to make. For about $20 (on etsy) you can buy the world map fabric. You will also need some red (or yellow, blue, whatever you like best) smooth minky fabric and some batting. I recommend looking at your local Joann's and buying it when you can use a 50% off coupon. You'll need 2 yards of minky or other fabric for the backing.

Just pin the three layers, stitch along the lines of latitude and longitude using a clear presser foot (no free motion foot needed), start in the middle of the quilt and work your way out. When done with all the lines, fold over the minky, pin and sew it down (I did the binding by hand because it looks nicer especially when you have minky bindings). I used black for the lines and red bobbin thread.

Voila! The finished quilt is about 32 x 56 inches — large enough for a play mat or lap quilt. And best of all, you can use it to start all kinds of fun talks about the world for years to come.

I plan to sew fench knots onto the places Baby Field Notes visits. Another idea is to sew them into places I'd like for her to visit and then take them out when she has, replacing the knots with a different colored thread. I've got a few places on my list and I am sure she will add her own. Today I fell in love with Krabi, Thailand after seeing my friend's vacation pictures. Picture white sand beach along crystal clear turquoise water with not a soul in sight. Just you, the fish and the ocean breeze — I'd go tomorrow (and leave BFN with one of her grandparents so the Mr and I can enjoy ourselves!)

I have a baby APE!

To contact us Click HERE
Why it took me so long to realize this, I have no idea. But, I truly do have a baby ape. For the past 2 days as we leave the bedroom, Baby Field Notes has reached toward the mobile hanging from the overhead light. She's had her eye on this thing since the day she came home.

A couple of years ago I admired it in a shop in Japan. It's not really intended for babies, it's just a cool little doodad that I liked and brought home. It matched the bedroom, so I hung it up there. Eventually it just faded to the background.... until Baby Field Notes moved in. It caught her eye, being black against the white of the ceiling.

And now, finally, she's developmentally able to gesture to get lifted up to touch the end of it. There's a little bell there. When she realized she could make it make noise, she came unglued. So I've been lifting her up so she can make its bell ring. Well, today she grabbed hold of the little bell and would not let go. I had already lifted her up several times so I was getting tired. I think I made her feel off balance when I hoisted her up the last time and that's why she latched onto the bell so firmly.

When mama's unsteady, better grab anything close... branch, vine, mobile. I thought she was going to take the whole light fixture down with her. Babies are stronger than they look, afterall, and for good reason too. It wasn't all that long ago geologically-speaking, that young apes were able to hang on to mom all by themselves.

So there she was, my little ape hanging on for dear life, wobbling while I was trying to figure out how to get her to let go without being able to pry the bell out of her hands myself.

I forgot what I did, but not the lesson learned: Don't do that again!

NEW: Flowers made out of paper that grows!

To contact us Click HERE
Spring comes quickly around here, and with the tops of the bulbs already peeking out of the ground, I have a limited amount of time to develop my new line of recycled paper products before planting season is here. For a few years now I have been making 'plantable paper' in my spare time, mostly custom requests from people who are getting married. Plantable paper is embedded with seeds. As the paper biodegrades in soil and water, the seeds sprout and grow out of the paper. It's a really nifty way to give seeds and also makes a perfect, inexpensive favor to give away at weddings. Over the years I've been asked to make butterflies, hearts, cones to hold flower petals, printed table place cards in various shapes and most recently — 200 paper flowers. They are going to be placed in little pots along with a smaller paper butterfly and flower. Soon this years flowers will be growing from the scraps of this project. In the meantime, I am putting them up for sale as a new regular item in my store on etsy. Happy planting!

We have a talking ape now! Baby's First 'Real" Word

To contact us Click HERE
Today Baby Field Notes said her first 'real' word: UP.

Previously she has said 'BIG,' which blew me away because, a) she's a very quiet child who doesn't really babble on and on so we've rarely heard vowel and and even fewer consonant sounds, b) was late to giggle, c) was only about 8 months old, and d) perfectly enunciated the word: BIG. It really surprised me. She's certainly heard that word a lot, what with two enormous dogs keeping her company!

This time was different though, because she used UP in the right context, intentionally, and along with the right gesture. When she said BIG it probably was unintentional. I think she was just experimenting with her tongue and mouth and voice. It wasn't in the right situation, at least not without making up a story, and wasn't coincident with any meaningful gesture, so it really can't be considered language.

But what is language? It's complicated but you can glean a lot from this excellent discussion, if you click here.

I'm back!

To contact us Click HERE
At long last, I think I may finally feel like blogging again. The long and short of it is that my little home business of making plantable paper really took off over the last year and the last six months it has practically exploded. I'm a work-at-home mama to a toddler not yet two years old, with a part-time job and what has now become an almost-full time business. My daughter has been a handful. Business has been a handful, and I hardly ever have free time to myself. And I really like writing, so I think I will give blogging a try again — to share notes from my new field of full-time papermaking, to share new crafts, new stories, pictures, projects, and to vent about being a WAHM (work-at-home-mom), a totally different bear than SAHM (not that being a stay-at-home-mom doesn't involve work)!

Here are a few snapshots of some projects and a little pic of how much "Baby Field Notes" has grown. We've been having chats lately about whether she's a "baby" or a "kid."

Seashell Plantable Beach Wedding Favors

Plantable Wedding Favors Boxed Kit
"Baby Field Notes"

29 Eylül 2012 Cumartesi

How to Manually Upgrade Firmware of Linksys EA2700 Router

To contact us Click HERE
Firmware is a hardware version of your router designed to maintain its functionality, performance, security and reliability. When you say you have to upgrade firmware of your router, it means you will upgrade its hardware version.

Like others, your Linksys EA2700 router also has a firmware version that needs to be upgraded from time to time. Cisco releases firmware upgrades for all its products from time to time. Check out the steps given below and upgrade your router’s firmware:Step1: Open your web browser and visit the Cisco website. Locate your Linksys model number’s details on the website and look for the firmware file (Cisco Connect Cloud). Make sure that you download the correct firmware file designed for Linksys EA2700 router. (See Also how to set up guest access in Linksys EA4500 router)Step2: Save the file when prompted. Choose a location to save the file. Now extract the file’s contents by right-clicking on it and selecting Extract All. A new folder will appear in the same location. Remember, you will have to upload this file to upgrade the firmware. (See Also how to reset Linksys E1200 router)Step3: When done, exit the browser window. Before you begin to upgrade, save your existing wireless configurations, otherwise these will be lost. You must log in to your Linksys router’s web interface to do so. Once you have backed up the settings, you can begin to upgrade its firmware. Step4: Reopen your web browser and type ‘192.168.1.1’ in the address bar. Hit Enter to proceed. In the next screen, if prompted, enter your admin password to log in to the router. if you never set up a custom password, enter the default one. Once logged in, click the Administration tab and then click Manual Upgrade. Step5: Click the Browse button to browse the file. Select and open the unzipped firmware file (and not the original zip file) and then click the Start Upgrade button. Ignore if any warning appears on the screen. Wait for the upgrade to complete. When prompted, restart your computer.Step6: That’s it and your router’s firmware will be upgraded. This method can be applied to the entire Linksys EA series to upgrade the firmware. (See Also how to install a Linksys WAG200G gateway device)

How to Reset Netgear Router’s Password on a Mac Computer

To contact us Click HERE
Need help resetting password of your Netgear device on your Mac computer? You may want to reset your password for security reasons or because it has been misplaced or forgotten. Well, whatever the reason is, the problem is there. Don’t worry! Check the below mentioned tips and reset your Netgear device’s password. (See Also Reset Wireless Network's Password) Resetting password when you have access to your existing password:1: Connect you Mac computer to your Netgear wireless router using the Ethernet cable. Plug its one end into the computer and run the other end into the back of the router into any of the 4 ports. Disconnect the modem if it is connected in between.2: When done, open Safari or whichever web browser you use. Type ‘http://192.168.1.1’ in the address bar and hit Enter. When prompted, enter your username and password and click OK. The default username and password for a Netgear router is ‘admin’ and ‘1234’ respectively (may vary as per router’s model) unless you have changed. If you set up a custom password, enter that. (See Also Default Password for Netgear Devices)3: When logged in, click Set Password under Maintenance in the left hand side. Type the existing password, new one in the respective boxes. Retype to confirm the password. If needed, review your passwords to ensure that there is no typing mistake. 4: Click the Apply button to save changes. Your password is now changed successfully. You must make a note of the password for future use. You will enter this password next time you will log in to the router. Exit the setup screen. Disconnect the Ethernet cable, reconnect your modem, and connect to your wireless network again. Resetting password when you have lost or forgotten the existing password:1: Unfortunately, it is impossible to recover a forgotten or lost password from the router. In this case, you must hard reset your Netgear router to restore it to the factory defaults. Disconnect the devices connected to the router. 2: Take a sharp, thin paperclip or pen and push it in the Reset button hole located at the back of the device. Press the button, hold it for around 10 seconds, and then release it. Wait until the router completes rebooting. (See Also how to reset Netgear router to facotry settings)3: When done, reconnect the devices like computer and modem and power cycle them. Wait until the devices have fully rebooted. Now open Safari and type ‘http://192.168.1.1’. Hit Enter. When prompted, enter default username and password that came with the router docs. When logged in, reset the password as desired (see above for password reset procedure)***You must check your router manual before entering anything as username and/or password. (See Also Default Password for Netgear Devices) If you still can’t get past the login problem, contact Netgear router support.

DIR600 D-Link Wireless N 150 Home Cloud Router: A Review

To contact us Click HERE
Not necessarily that you will be expecting a router to be stylish and compact by design and yet as powerful as delivering greater throughput and covering corner to corner throughout your house or apartment. To help you accommodate your wireless home networking needs, there are so many routers available in markets. However, D-Link Wireless n 150 Home Cloud router is one such stylish router that not only meets your home networking needs but also offers enhanced web protection and miscellaneous features that won’t let you think of buying any other router. Let’s check the specifications below and then pros and cons of this D-Link router.Specifications:-Wireless Standards: IEEE 802.11n, IEEE 802.11g, IEEE 802.3, IEEE 802.3u. Single Band: 2.4 GHz to 2.4835 GHzAntennas: 1 Fixed 5dbi built-in externalSpeed: up to 150 MbpsPorts: 4 x Ethernet 10/100 portsEncryption Type: WPA and WPA2Wi-Fi Protected Setup (WPS): Enabled (PBC/PIN)App Enabled: Yes for Android and iOS devicesUPnP® Support: YesAdvanced Security: Advanced Dual-Active Firewall with NAT (Network Address Translation) and SPI (Stateful Packet Inspection). Mac Address Filtering (MAF) and URL Filtering for enhanced web protectionRemote Cloud Services: EnabledOS Compatibility: Windows 7 (64-bit & 32-bit), Vista (64-bit & 32-bit), XPMiscellaneous Features: Traffic Control, Wireless Distribution Support (WDS), Remote Cloud Access, easy setup and configurationPros: excellent for small apartment or house. Easy to install and set up with D-Link setup wizard. Offers enhanced web protection with Dual-Active firewalls viz. NAT and SPI. MAC Address Filtering and URL Filtering ensure that you browse and see what’s safe and not contaminated. Integrated with D-Link Cloud Services, WPA & WPA2 encryption techniques, and UPnP® support. Amazingly affordable at a price of just $29.99 with so many built-in features.Cons: Not designed for multi-room homes or big apartment. Lacks advanced Wireless standard and dual band. Limited wireless coverage with 1 built-in external antenna. Limited bandwidth and slow data transfer speed with 10/100 4 Ethernet ports. (D-Link router support)Overview: Dir600 D-Link Wireless n 150 Home Cloud router is an affordable, easy to set up router that meets small home networking requirements. Don’t take it if you have a large, multi-storey or multi-room house. When it comes to web protection, it offers the best with Dual-Active NAT and SPI firewalls. (See Also how to configure firewall settings in D-Link® router)With Mac Address filtering and URL filtering, it blocks intruders from stealing your bandwidth and data. Enhanced WPA™ and WPA2 encryption ensures that you remain safe and protected from the unprotected wireless network traffic. You can choose any encryption type as per your requirements. Cloud is the buzz today and D-Link has really heard it. The router integrates Remote Cloud Services that will help you virtually access your wireless home network from anywhere via a Android or iOS device on a Wi-Fi, 3G or 4G network. For this to work, you will have to download the free mydlink app on your Android or iOS device from the D-Link App Store.This remote cloud service can help you manage your home network from your Android or iOS device. You can see who and when connects to your network, view the web browsing history in real time, set up automatic email alerts, block intruding device connections, and even upgrade your router with the latest updates when available. If you have multiple devices at your home, there is UPnP® support in the router. With UPnP® (Universal Plug and Play) support, you can multiple devices to the router for file sharing, gaming, and streaming media etc. Thus you can easily connect your printer, XBOX or Nintendo, or TV etc. to start enjoying media or games. Remember, if you connect and simultaneously share on multiple devices, you may experience slow speed and data transfer issues. To avoid this, you may prefer to connect one device at a time. With Traffic Control, you get ultimate web traffic control and peace of mind as well. Limited wireless coverage is not meant for you. With Wireless Distribution Support, the D-Link router allows your network to expand using multiple access points without requiring additional equipment. Despite that, with limited hardware capabilities you may not experience significant wireless coverage access. (See Also how to use D-Link wireless bridge to extend your network)

How to Set up WPA/WPA2 Security in a Belkin Router

To contact us Click HERE
Chances are that in fear of wireless network hijack, bandwidth theft, online intrusion, or virus infections, you might want to secure your wireless network. Setting up an encryption key is the best method for protecting your home or wireless network. Your Belkin router has both WEP and WPA encryption types. In this post, I am going to discuss about the WPA2 security key, which is better in terms of security than WEP. Check the steps given below and secure your wireless network:Step1: If you have a wireless network configured, you will need to make a wired connection first. Connect your computer directly to your Belkin router using the Ethernet cord. Step2: Open up the Belkin router’s web interface. To do so, first open your web browser and type ‘192.168.2.1’ in the address bar. Hit Enter to proceed. Step3: Click Login in the upper right hand side. Enter your Belkin router’s password and then click Submit. Belkin routers, by default, are shipped without passwords. So you can just click Submit. However, do check your Belkin router support docs for exact details.Step4: On the Belkin Router Setup Wizard window, click Security under Wireless in the left hand side. Beside Security Mode, click the drop-down menu and select WPA/WPA2-Personal (PSK). (See Also how to reset Belkin router to factory settings)Step5: Beside Authentication, select an authentication type. Once you select the authentication type, the Encryption Technique field will automatically populate. Step6: Type your password in the Pre-Shared Key (PSK) box. The password should be 8-63 characters (alpha-numeric) long. Also you can use a combination of upper and lower case to make your case sensitive and difficult to crack. Step7: Make sure that you note down or memorize your password to avoid losing a track of it. Since memorizing the password doesn’t always work, it’s better to make a note of it. Step8: Click Save Settings to save the changes. From now onwards, any wireless computer that connects to your wireless network will have to provide this encryption key. And that’s it!

How to Add an Android Device to your Belkin Router

To contact us Click HERE
What’s the point in having a stylish, new Android Jelly Bean or Ice Cream Sandwich device if you don’t use it to access Wi-Fi through your Belkin Router? Well that’s what an Android device is mostly used for. You can connect to your home network, surf the web, email, game, download apps, or share files etc. to and from other devices. You can do much more than what I just said here. Amazing it sounds and easy it is to set up your Android device to your Belkin router: (See Also Belkin router support)You can also check out my previous post on adding XBOX 360 to your wireless router.Step1: Make sure that your Belkin router iks on and you are connected to your wireless home network. Also make sure that you can browse the Internet. Step2: Also make sure that you have your wireless network name (SSID) and the encryption key handy. Without this information, you cannot connect to your home network on your Android device. Step3: If you never set up a custom SSID name and security key, you can find the default ones at the bottom of your Belkin router. The information also comes with your original Belkin router setup documentation. Step4: Once you have the details, do this. On your Android device, tap Settings> Wireless and Network> Wi-Fi. Your Android device will now display the available wireless networks. Step5: Once you see your wireless network name (the SSID), select it and then tap Connect. If set up a secured wireless network, it may prompt you to enter your encryption key or passphrase.Step6: Enter the key and proceed to connect. Wait unless you are connected to your Wi-Fi network. When done, open your browser and start browsing the web or emailing etc. Step7: That’s all you had to do to connect your Android device to your Belkin router. like your Android device, you can connect your gaming console, TV, or another computer to your Belkin router.

28 Eylül 2012 Cuma

Network Topology

To contact us Click HERE
The bus topology is a stretch of one cable with both ends closed, where there is a cable along the nodes. Signal in the cable with this topology are skipped one direction to allow a collision occurs. To make the interconnection between computers, bus topology using the T-Connector (with a 50ohm terminator on the end of the network).
The main difficulty of using cable sepaksi is difficult to gauge whether the cable used sepaksi really matched or not. Because if not truly be measured correctly will damage the NIC (network interface card) that is used and the performance of the network becomes blocked, do not reach maximum capacity. This topology is also often used in fiber optic network with a base (which later merged with a star topology to connect with a client or a node.).
At the two ends of a bus topology network must be terminated with a terminator. Barrel connector can be used to expand it. Network consists of only one cable channel that uses a BNC cable. Computers that want to connect to the network can link her with Ethernetnya to tap along the cable.

Bus network installation is very simple, inexpensive and consist of a maximum of 5-7 computers. The difficulty is often encountered is the possibility of data collision because the mechanism is relatively simple network and if one is broken then the node will disrupt the entire network performance and traffic.
There are also advantages for the user as follows;

  • cheap, because it does not wear a lot of media and cable that can be used easily to the right or widely available in the market.
  • each computer can exchange information, whether it be text, images, and video directly.



Loss

  • frequent hangs / Crass talk, ie when more than one pair of wear track at the same time had to take turns or plus relays.

Computer Network Installation

To contact us Click HERE
Computer network instalation - Before discussing about how to install a computer network, known in advance what exactly komputer. In the referred with a simple network of computer networks is 2 (two) or more computers that are interconnected to one another, each electronic communicate, sharing of resources (such as cd-rom , printers, file sharing, file exchange, internet, etc.) and also are able to use the same computer resources are connected to one another are usually can be connected through various media such as cable media, radio waves, satellites, infra-red. There is 3 different types of networks, namely:
1.Local Area Network (LAN)2.Metropolitan Area Network (MAN)3.Wide Area Network (WAN)
As we know that at this time, the network komputerterus growing more rapidly. Almost every company in various fields already use the network in their business activities. Included in residential areas throughout the world for communicate with each other. In this unit of competency participants will learn about the Local Area Network (LAN) having a much smaller scope than the MAN and WAN.
Before you start installing computer networks, the first we must think about what topology design that will be used. Topology is the pattern adopted in the weave network that shows how the shape of the relationship between the server and workstation systems lainnya.Ada several topologies commonly used, namely;
1.Topology Star (Star) Ie topology which makes computer servers service center point for all workstations.2.Topology Linear Bus Ie workstations interconnected with a cable line up the wrong one end connected to the server via a Hub.3. Topology Ring (Ring) That server is connected to multiple workstations form a circle (ring).
 4.Topology Tree Namely the merger of several smaller bus lane into a large jalurbus. is an extension of Linear bus topology.
Once we know the system topology to be used, we can prepare the necessary equipment if the operating system sertamengidentifikasithat there are possible kitauntuk make the system topology we have chosen. In addition, we also must prepare drivers that can make hardware devices that we install will be able to work optimally.
Setting up a Network Device Driver Installation Package
The software consists of a network driver interface (NIC), network operating system or Network Operating System (NOS), Network Application, Application Management and Application Diagnostic / Monitoring and Backup Applications. Some of these elements bundled in one package NOS and partly shaped as a third-party software.
Bridge with the network card driver software network in server or workstation side. Network card driver specific to the type of network card and operating system used, usually other than provided by the vendor, the card makers also sometimes provided by network operating system vendor. If you lose your NIC drivers that you can still search through the internet to your site or another site the vendor its NOS.
Type of driver that was developed there were two of the Open Data-Link Interface (ODI) andNetwork Driver Interface Specification (NDIS).
Network Operating System running on the server and responsible for process the request, manage the network, and mengendalikanlayanan and devices to all workstations. NOS can just change the file system used on the workstation in a transparent manner, for example padasistem Novell Netware, Windows workstation using the FAT filesystem and server are using Netware File System, another instance of Windows to a Linux Samba connections.
Each workstation requires a client to dapatberkomunikasi NOS applications with the server. These applications are often also referred to as a shell, the redirector, requestor or client. In general NOS client already bundled in the operating system, such as Samba client on Windows is included in the Explorer.
Application Aware Network is a bundle of server applications designed specifically for network systems. This application has the properties aware of the access network systems such as recording, aksestertentu restrictions, etc.. Sophisticated applications in the world of client / server can even divide the process into other machines apart. In Linux contohnyaadalah Beowulf.Network project management software is network monitoring software yangberfungsi. Element of bias in the form of network activity is monitored, life / death of nodes, etc.. Protocol Simple Network Management Protocol. function for this, if all nodes support the SNMP-agent monitoring software can monitor all activitiesnodes such that occur in the performance of processor, RAM usage, traffic input / output etc.. One of these applications are developed in Linux NetSaint and MRTG (Multi Router Traffic Grapher). Backup application in NOS become one of the things that pentingdalam tissue, NOS is usually bundle these applications in the package. Backups can be done in software or hardware, the software an administrator can perform remote backups to mesinlain periodically, usually done in hardware backups with disk-mirroring.

Introduction Of Computer Network Security

To contact us Click HERE
Computer network security is important and should be learned by experts network for the convenience of the user while accessing the internet. With the construction of computer networks, a computer will be easier and more frequently accessed. With the increasing number of access, automated computer security is increasingly vulnerable, especially if there are users who have bad intentions. Security settings on the computer network at its core is the set access software or hardware. Security software / hardware security should always be checked so as not to cause disruption in the system. 
4.1. Security hardware 
Security hardware is often forgotten but is usually the main thing to keep the network from the destroyer. In security hardware, servers and data storage should be a major concern. Physical access to servers and critical data should be limited as much as possible. It would be easier for thieves to take the hard drive data or tape backup of the server and the storage of data rather than having to tap the software from the network. Garbage should also be considered because a lot of hackers who come to the garbage company to find information on its computer network. One way of securing hardware is placed in a room that has good security. Airways holes need to be given attention because people can just enter the server room through the channel. Network cables must be protected so as not easy for a hacker to cut the cable and then connect to the computer. 
Access to computers can also be restricted by setting security on BIOS level that would prevent access to a computer, format the hard drive, and change the contents of the Main Boot Record (where information partition) hard drive. The use of hardware autentifikasiseperti smart card and finger print detector is also worth considering to improve security. 
4.2. Security software 
As already mentioned in the previous chapter that the first step to reduce the security risk is not to install unnecessary things on the computer, especially on the server. For example, if the server is only assigned to the router, do not need web server software and an FTP server installed. Limit the software that is installed will reduce the conflict between the software and limit access, for example if the router is also fitted with an FTP server, then the people from the outside with anonymous logins may be able to access the router. Software to be installed should also have good security settings. The ability of encryption (data scrambling) is a specification that must be owned ooleh software that will be used, especially because 128-bit encryption with a consistent 56-bit encryption has to be solved easily at this time. Some software that has a security hole is the sendmail mail server and telnet applications. Sendmail has a disadvantage that can ditelnet without logging in port (25) and accessor can create an email with a fake address. Telnet application has deficiencies transmit data without encrypting (scrambling the data) so that when it can be tapped will be very easy to get the data. 
The second thing to note is the password. Should set the minimum password length fatherly complicate memcahkan password hacker. Password will also be better if not composed letters or angak course, small or all capital letters, but should be combined. Encryption can increase network security by randomizing passwords and usernames, either in the record in the host as well as password and username that is passed the current network to log into another computer. 
For users who do not need to physically access the server, also need to be set so that user can only access from the client computer. In Windows NT, the term is a logon locally. Users also need to be restricted so as not to be shut down or reboot the computer. On UNIX systems by default, pressing ontrol-Alt-Delete will cause system reboot. 
Limiting traffic TCP / IP is the most widely used. Limiting traffic here, for example do not allow a host or network packets passing through the router, especially if the host has to know is owned by hackers. The most widely performed is to shut down certain ports that are not needed, such as telnet port (23) and FTP port (21). 
Routing is not apart from the security breach. Disorder that often arises is the provision of false information about path routing (source routing in the IP header). Giving false information is usually intended to be datagram-datagram can be tapped. To prevent such a thing, the router must be set to not allow source routing and the routing protocol diseertakan password authentication or some sort of order routing information is only obtained from a trusted router. Authentication is contained in the RIP version 2 and OSPF version 2. 

Wireless Internet Technology

To contact us Click HERE
Wireless Internet is wireless Internet technology, which in this case the cable media was replaced with media electromagnetic wave.
Have you ever thought how to work the Wireless Internet. What if I turn asked, "where wireless internet". WiFi, radio, satellite or cellular do not get confused and do not stare. You will get an explanation here.
Wireless Internet access is actually described as a type that is based on radio frequency. You've probably seen the houses with a small white box-shaped rectangular (canopy) mounted near the roof of their house. They are the ones with wireless Internet access.Let us begin to talk of Wireless Internet Service Provider (WISP) that is connected to your computer. From your ISP, a signal will be beamed to a tower or even through some of the tower before it gets to your home.
Basically, wireless Internet service is the signal emitted and the received signal must be in a position that actually seen (not obstructed by anything). This means, for example, you wrote idly climbed onto the roof and stand in front of your receiver, then you will be able to see a transmitter tower. However I do not recommend it because the signal emitted can result in less good for your body. Besides the risk of falling, of course.
After the signal was emitted from the ISP can be captured by your receiver, then the signal will go through different media, from the air and then into the network cable (RJ-45) leading to a modem (modulator / demodulator). Once the signal is modulated, is converted to a form of information that can only be received by the wireless network. Meanwhile, when in-demodulation, the signal is converted into an acceptable computer. Here's the picture.
As I explained above, it was all done by using radio frequency. Maybe you have a cordless telephone number that there will be read as 900 MHz, 2.4 GHz, 5.2 GHz or 5.7 GHz. This is a radio frequency that can be operated on a cordless phone. Similarly, the wireless Internet!
WISP uses this frequency on the grounds that frequency is the frequency of the public so no need to apply for a permit (license) to use it. 
May be the problem is security, public frequencies can be said easily intercepted because it is common and everyone can use it. But do not worry, because the frequencies used are usually quite safe. This is because the use of encryption is added to the signal emitted. Without the code description it will be very difficult for someone to be able to decipher the signals sent by DES encryption is a method commonly used.
Now let us discuss the above frequency waves. Perhaps you are wondering why there should be many waves (900 MHz, 2.4 GHz, 5.2 GHz or 5.7 GHz)Look, let's say like a highway. If there is only one way, then you can imagine how crowded the path that is used. That is why so many frequency bands.
Use of frequency bands such variety also carries some consequences. The smaller the frequency the more wide-reaching but worse quality. As a comparison, if you use the 900 MHz, the range may be as high as 40 miles (± 64 km), but if you use the 2.4GHz range from transmitter to receiver is limited to about 5 miles (8 km). Far away the difference. So now it's up to you, select the range or quality.

Understanding and Working Principle LAN

To contact us Click HERE
LAN (Local Area Network) can be defined as a network or network of computer systems, which are located in one building is limited, a complex building or a campus and not using common media of communication facilities like telephone, but the owner and manager of communications media is the owner of the LAN itself. From the above definition we can know that a LAN is limited by physical location. The use of the LAN itself result in all computers connected in a network can exchange data or other related words. Cooperation is growing from just the data exchange through the use of equipment together. LANs are generally using a hub, the hub will follow the principle of work itself. In this case is that the hub does not have pengetahuantentang destination address so that a broadcast data delivery, and also because the hub has only one collision domain so that if one port is busy then the other ports will have to wait.
Basic components of a LAN
Some of the basic components that normally form a LAN is as follows:
Workstation
Workstation is a node or host in the form of a computer system. Computer systems can be either a PC or can also be a large computer systems such as minicomputers, and even a mainframe. Workstations can work alone (stand-alone) can also use the network to exchange data with other workstations or users.
Server
Hardware (hardware) that function to serve the network and workstations connected on the network; its general resources (resources) such as printers, disks, and so that would be used jointly by the user at the workstation are and work on the server. Based on the types of services known as disc servers, file servers, print servers, and a server can also have multiple service functions at once.
Link
Workstations and servers can not function if the equipment is not physically connected. Relationship in a LAN is known as a transmission medium which is generally in the form of wires. As for some examples of the link is:
1. Twisted Pair Cable
  • The cable is divided into two, namely Shielded Twisted Pair and Unshielded TwistedPair (UTP)
  • More known as a telephone cable
  • Relatively inexpensive
  • Short Distance
  •   Easily affected by the disorder
  • Speed ​​of data that can be supported is limited, 10-16 Mbps
 2. Coaxial Cable
  •  Commonly used on television
  •  The distance is relatively more distant
  •  higher data transmission speeds in the appeal Twisted Pair, 30 Mbps
  •  Prices are relatively inexpensive
  •  The size is larger than Twisted Pair

3. Fiber Optic Cable
  • The long distance
  • High data speed, 100 Mbps
  • The relatively small size
  • Difficult influenced disorders
  • Prices are still relatively expensive
  • Installation is relatively difficult

Network Interface Card (NIC)
A workstation is not connected directly with a network cable or transceiver cable, but through an electronic circuit that is designed specifically to handle the network protocol known as the Network Interface Card (NIC).
Network Software
Without the software the network then the network will not work as desired. This software also allows one computer system to communicate with other computer systems.
LAN Support Tools
a. Repeater
  • In OSI, works on Physical layer
  • Continue and strengthen the signal
  • Widely used in bus topology
  • Its use is easy and relatively cheap price
  • Not having knowledge of the destination address so that the delivery data broadcast
  • Only have one collision domain so that if one port is busy then the other ports will have to wait.

 b. Hub
  • Work on the Physical layer
  • Forward the signal
  • Not having knowledge of the destination address
  • Its use is relatively easy and affordable
  • Only have one collision domain

c. Bridge
  • Working in the Data Link layer
  • Have used the addresses to forward data to its destination
  • Automatically create table translator for acceptance masing2 port

 d. Switch
  • Working in the Data Link layer
  • Each port in the swith has its own collision domain
  • Having a central translation table that has a list of interpreters to all ports
  • Allows full duflex transmission (both directions)

 e. Router
  • Router function to filter or filter the data traffic
  • Determine and select an alternative path to be traversed by the data
  • Connecting the network between LAN, WAN and even with LAN topology

Understanding Network topology is the arrangement of data flow path in the network that physically connects one node to another node. Here are some of the existing network topology and used to date, namely:
1. Star Topology
Some of the node / nodes connected to the central node / host, which form a physical network such as a star, all communications are handled directly and managed by the host in the form of mainframe computers.
2. Hierarchical Topology
Shaped like a branching tree consisting of the host computer (host) connected to the node / other node in stages. Higher levels of functioning as a regulator working level below.
3. Bus Topology
Some of the node / nodes connected by data paths (buses). Each node can perform the tasks and operations yangberbeda but all have the same hierarchy.
4. Loop Topology
Is the relationship between the node / nodes are serialized in the form of a closed loop. In this form there is no central node / host, all have the same hierarchy.
5. Ring Topology
This form is a combination of loop and bus topology, if one node / node is broken, then it will not affect other nodes due to communication separate from the data path.
6. Topology Web
Is a form of topology, each node / node in the network can be interconnected with other nodes via multiple links. A web form networks with n nodes, will use the link as many as n (n-1) / 2.
NB :
By using all the advantages and disadvantages each configuration, enabling the development of a new configuration that incorporates several new technologies in order topologies with ideal conditions for a network system can be met.

27 Eylül 2012 Perşembe

Sapporo Snow Festival

To contact us Click HERE
For a week in February, the northernmost island in Japan hosts a fantastic snow festival. The sculptures made of snow are a highlight. Some are enormous — even larger than this one. I haven't been to the festival yet myself, but Mr. Field Notes' dad has been a number of times. He shared this photo and I thought it was so neat I had to share it too. The detail in the leopard's spots and the orangutan's cheek pouches is awesome. It's estimated that 2 million people visit the festival. Here's a little insight into how the massive sculptures are constructed: how to make
a giant snow statue.

In Japan, as here too, it won't be much longer before festivities culminate around a different occasion — the appearance of the spring blossoms — something that is an even bigger event in Japan than this snow festival. I haven't been to Japan yet for the plum and cherry blossoms, but I think this year, Mr. Field Notes and I might have to break out the sake boxes and furoshiki we got in Japan and make our own mini party under our plum tree.

In anticipation of the spring, I've started farting around with a new spring line up for my etsy store. There are a lot more plantable paper offerers on etsy and the competition has had an effect on my sales. It's mostly fine, because I would rather hang out with my gorgeous daughter, but I do need to keep creating or I won't be able to keep buying nifty things on etsy! To that end, I recently received some new paper punches, an ume (plum) flower shape and a sakura (cherry) flower shape. This is what I've decided to do with them (the first one is an old hydrangea shape):



I need better photos and a prettier assortment of colors, but it's a start. I'm not sure, but I think I will offer them as a DIY wedding package, one that is very affordable (under $25). What do you think? I'd love some feedback...!

Construction Quilt - Finished

To contact us Click HERE

Made this one for my nephew's birthday, using scrap fabric and some construction fabric I found on etsy. He's three, and I don't know if blankets are really his speed still, but he loves construction equipment, so hopefully he will 'dig' it a little bit.. eh, I might have to go find a truck or something to go with it.

I had been wanting to make a quilt for my nephew, Jackson, using the Michael Miller 'dig it' fabric for a while now, but I wasn't feeling particularly inspired with a design, so I just chose a design similar to one that I bought on etsy for Little Field Notes. I had to offset the letters of his name to get them all to fit the space I set aside for them. That wasn't part of the plan, but it fits in more ways than one.

Work: A topic I rarely talk about.

To contact us Click HERE
My wheels have been spinning for some time now about what to do about my nearly complete lack of zeal for my current job and whether I can or even want to have a full time job in academia ever again.

That's pretty heavy stuff for any night, let alone a Saturday night. My how life has changed. And, having a baby certainly makes all of this a lot more important than it was before.

It means I can't just willy-nilly up and quit my job because I no longer find it fulfilling. It also means I can't just go out and get a different one without making some major decisions that are potentially life-altering.

I have some ideas on what I could do within the capacity of my current job to make it temporarily more fulfilling, which feels good. I feel like I have at least identified a problem and have come up with a way to go about fixing it that may actually be feasible. Unfortunately the more expedient way of solving the problem would never fly with the higher ups and would severely compromise my position if I even brought it up. So, I really, really like having a plan that could work.

It's totally exciting.

I hope my proposal is well-received and that it will result not only in some more pay for me but more importantly, more fulfilling work that affords me more flexibility and more creativity while simultaneously producing a higher quality 'product.'

Now that I put it that way, it seems ambitious.

Maybe it is, but I need a change. I cannot just up and quit my job, for a number of reasons, so I have got to find a way to make it more fulfilling — and meaningful.

Oh — and I don't know what I think of it yet, but I also came to the realization recently that I am 'over' primates. I just have not had any interest in new primate research or even in talking about existing primate research.

I love monkeys. I really do, but I am not in love with them anymore. As you can see, I definitely need a change. Unfortunately, this temporary solution I have concocted is only temporary....... what to do, what to do.

We have a talking ape now! Baby's First 'Real" Word

To contact us Click HERE
Today Baby Field Notes said her first 'real' word: UP.

Previously she has said 'BIG,' which blew me away because, a) she's a very quiet child who doesn't really babble on and on so we've rarely heard vowel and and even fewer consonant sounds, b) was late to giggle, c) was only about 8 months old, and d) perfectly enunciated the word: BIG. It really surprised me. She's certainly heard that word a lot, what with two enormous dogs keeping her company!

This time was different though, because she used UP in the right context, intentionally, and along with the right gesture. When she said BIG it probably was unintentional. I think she was just experimenting with her tongue and mouth and voice. It wasn't in the right situation, at least not without making up a story, and wasn't coincident with any meaningful gesture, so it really can't be considered language.

But what is language? It's complicated but you can glean a lot from this excellent discussion, if you click here.

I'm back!

To contact us Click HERE
At long last, I think I may finally feel like blogging again. The long and short of it is that my little home business of making plantable paper really took off over the last year and the last six months it has practically exploded. I'm a work-at-home mama to a toddler not yet two years old, with a part-time job and what has now become an almost-full time business. My daughter has been a handful. Business has been a handful, and I hardly ever have free time to myself. And I really like writing, so I think I will give blogging a try again — to share notes from my new field of full-time papermaking, to share new crafts, new stories, pictures, projects, and to vent about being a WAHM (work-at-home-mom), a totally different bear than SAHM (not that being a stay-at-home-mom doesn't involve work)!

Here are a few snapshots of some projects and a little pic of how much "Baby Field Notes" has grown. We've been having chats lately about whether she's a "baby" or a "kid."

Seashell Plantable Beach Wedding Favors

Plantable Wedding Favors Boxed Kit
"Baby Field Notes"