Saturday, January 29, 2011

【 Weak current College 】 see offsite affiliates how to implement multiple link load balancing---Power By 【 China power house network 】



Currently, many enterprises in order to improve the information publishing performance and reliability, to several telecom operators also leased Internet line, therefore has two or two above Internet connection link, these users want through multiple links using the network platform and resources, but this network construction forms, export revealed the following problems should be solved.
At the same time, for one or more of the regional branches of the company structure, organization and control enterprise remote branch office network access, so that the branch structure of enjoyment and company equally excellent network access environment, unified access control and security, has become a major challenge to be addressed.

Enterprise WAN link network problems:

1. a single point of failure for the link:

A single Internet connection link of any single point of failure, once the link failure will cause the entire corporate network.

2, link performance bottlenecks:

A single Internet connection link bandwidth is limited, can not meet all the users on the enterprise's internal Internet access required bandwidth, but also failed to meet a large number of Internet users access to the enterprise.

3, network security protection capacities:

Now anyone on the Internet are a wide variety of network attacks, the router itself on the network attacks protection capacity is very limited, DOS/DDoS network attack on wide area network consists of devices have a serious impact.

Existing multiple link, there is no connection between each other, this leads to two links cannot be completely independent, each use; two or more separate independent access, link, link up may not mean that bandwidth cannot be fully utilized; any link interruptions can affect the normal work of the Internet, lack of fault tolerance mechanisms.

Solution:

Faced with these problems, you should exit the enterprise network to deploy a Barracuda Load Balancer LinkBalancer330 link, as shown in the following figure:

LB330 link load balancer deployed in enterprise dedicated routers, H3C routers connect DDN line, and other locations of branch of the Internet, the branch office by headquarters of Netcom and telecommunications exports uniform external access to the Internet, at the same time enjoying all the internal access to the LAN.

This can be achieved on several internet access link load balancing, and at the same time achieve all outbound traffic (internal Office users to access the internet) and the inbound traffic (internet users access to an internal server) bi-directional load balance, and you can choose according to the smart algorithm, the optimal path to achieve optimal access speed. If when a ISP1 fails, the load balancer can be timely detected, and the internal and external network traffic to ISP2, network can still run correctly. LB330 link load balancers support up to 3 external links. In addition, LB330 link load balancers have against DoS/DDoS, effectively protect the internal network of servers from attack.

Programme features:

1. the increase in exports bandwidth, and provides redundant WAN links.

2. adoption of intelligent algorithms that are available through the optimal path to achieve internal and external network access.

3. can withstand DoS and DDoS attacks and effective protection of the intranet server.

Select the reason: Barracuda

1. the aggregated link bandwidth

Barracuda link equalization function buildings automatically aggregate bandwidth of multiple access, the administrator can choose the best price/performance ratio of a home or home access to multiple lower bandwidth access to the best of the best bandwidth investment protection.

2, link redundancy

If a link failure, Barracuda link equalization function automatically switches to the traffic of other good links, without the need for manual operation. Link failures, Barracuda can automatically detect periodically, once detected this link to return to normal, will enable this link again. Because Barracuda have link health detection capabilities, so be sure that link redundancy.

3. bandwidth management and QoS

Barracuda link balance machine buildings provide bandwidth management function, different applications can set different priorities, such as Web browsing and email is set to high priority on the protection of their bandwidth and streaming media and some point-to-point (p2p) applications can be configured to low priority. The priority setting of flexibility to ensure that the bandwidth low-priority application does not interfere with normal business applications.

4. traditional firewall (as a boundary equipment, Barracuda link balancing machines also have firewall function):

? A) network address translation (NAT), this feature allows the Barracuda link balance machine can be isolated from the external network to the intranet of a flow.

? B) one-to-one address mapping, one-to-one address mapping allows the Barracuda to public network IP directly assigned to a network device, while outside the network have access to internal applications, such as SMTP application.

? C) port translation, the same external address can be converted according to the port to a different internal server; multiple links of the same port can also convert to the same internal devices, which will facilitate external access to internal servers.

? D) IP access list that helps administrators to allow or block inbound or outbound traffic.

5Barracuda link balance machine-also provides the following network services:

? A) DHCPserver, Barracuda link balance machine according to the DHCP protocol to automatically assign IP addresses, and traditional DHCP server, you can view at any time to Hecht, or management of address allocation table.

? B) DNScachingserver, Barracuda link balance machine can be configured as a DNS query to the server, open the DNS cache function, the internal network are resolved through the Barracuda can, if the cache does not resolve, Zander will proxy wants ISP DNS queries and sends the results back to the internal network, so that common DNS query will be complete on the Barracuda. SSL offload and acceleration: avoid SSL encryption and decryption operations to the server the extra pressure to increase server capacity, ensure access of HTTPS, safe, reliable and efficient.






【 Weak current College 】 buy u disk must note u disk speed (go)


Today went to computer city bought a USB2.0 PCMCIA transfer of riser card, home to try out OK, but must be combined with a power supply from the USB port of the line. XP and can direct Ubuntu7.10 recognized.

However in buy u disk when toss some time, but also understand some u disk "Maoni" correct some mistakes on their own.

First of all that interface. Previous USB interface with USB1.0, USB1.1, three USB2.0, this is quite clear. USB1.0 is rare; compare older point might be USB1.1 (my own history since the two machines are the USB1.1 =. =), the speed is 12Mbps, is almost 1.5MB/s, and in particular slow; probably 02, is the majority of the USB2.0, this interface bandwidth you can reach 480Mbps, 40 times.

Later learned of the news is that in order to promote the USB, the above three USB are collectively referred to as USB2.0, original 1.1 and 2.0 to FullSpeed and HighSpeed distinction. Here is a problem in one place, the result is what is called USB2.0, not sure who did not pay attention to the Full or High. But the good news is that now the basic interface is HighSpeed, that is I think the real USB2.0.

It is now the most important fact is the u disk speed, not the speed of the interface. USBHi-Speed is 480Mbps, but it's just a theory, the hard drive is generally not exceed such high speeds. As long as it is not a limitation of USB1.1 interface (usually two, u disk itself is USB1.1 interface, now rarely; the other is the computer are USB1.1 interface, my computer just > _ <), then the interface type is not important, then you want to see u disk itself can reach speeds. The simple point that is similar to a normal SD card and a high-speed SD cards.

Thought as long as the interface, then Hi-Speed speed does not slow my mind think of speed will be 10MB/s (actually I too optimistic ... )。 Began to see is the price crunch 8GU plate, so run to buy. Home to a test, speed was only about 1.5MB/s, a 600M movie took 6 minutes. But Ithought this fool himself of speed copying entire 8G need four hours, in fact probably almost an hour. The speed that I simply cannot believe that in order to copy the content of the 8G wait so long, is not worth it, even if it is 1 g for 10 minutes too long, because my mobile hard drive is probably less than half a minute. Of course, I exclude my machine USB1.1, because after all, the riser card.

Then run back to computer city, try Kingston's 1GU spare, results of the speed and power. Last try a yuzhan 8G, actually found handcuffed 600M content less than 2 minutes. Conversion, probably this speed is 6MB/s, compared to the other two basic is 4 times the gap. Things to do, I also met ~ ~ at least 1MB/s faster ~ ~ just mind the strange thing is, why is the ratio of how much your didn't Taiwan power and speed is 3 times faster that the yuzhan 8G hear?

But I'd taken ~ ~ this is the Internet only to find, in fact, this is the price the yuzhan 8G and than that Taipower 8G also cheap. EH.

Of course, capacity and prices do not say that it is the first concern. I just want to remind one, speed, u disk read and write speed of the actual, or chip speed. Of course, if you can bear 1.5MB/s speed, it does not matter.

However, one needs to worry about is that u disk read and write times for life ... The problem that is even more impossible to verify.






【 Weak current College 】 notebook maintenance must master the knowledge



With the personal digital (having a mobile communication devices and mobile work equipment), the concept of universal access and laptop price of civilians, notebook and NetBook computers have access to a lot of SOHO (SmallOfficeHomeOffice) a family's life, I believe that the use of all of them are no problem, but after all, a laptop or a high-tech and expensive and relatively easy to damage the product, thus maintaining your laptop has become particularly important.
  
To remind you to clean your laptop is careful, because a small drop of water may also be asked for it, so the internal clean when the dry cloth. There is also easy to be ignored.
  
First, the shell of maintenance
Note: do not huasun shell
Laptop shell is usually quite smooth, some adopt aluminum alloy case design of the shell is more easily maintained, usually just a piece of cotton cloth to make shell spotless, it should be noted that, in the move process, be sure to use a separate bag or sack is installed, so the way huasun shell, at work, do not put the notebook into a rough desktop to protect shell shiny new, it is recommended that you use a damp paper towel to wipe the shell.
  
2. LCD maintenance
Note: gently wipe the water
Laptop look most like a notebook, folding design, internal surface is divided into the screen, on the other side of the keyboard and MOUSE operation equipment, side for various peripheral devices (such as CD-ROMs, floppy) and interfaces (USB, IDE, infrared interface), the overall shape design trend with more light in the direction of more fashion. On the laptop, the most vulnerable to damage the LCD, some thin compact LCD that surface if squished it is easy to be damaged, to considerable attention, and some use an aluminum-magnesium alloy casing of laptops, can withstand the pressure will be larger. Recommendations in General don't be any objects on top of the laptop. In addition to prevent the squished, and of course to make daily clean, clean the LCD screen is best used to dip in the clear water (or water) are not off milling of cloth, gently wipe, in addition, the use of the software on all black screen protection also contributes to the longevity of the LCD.
  
3. keyboard
Note: need to waterproof
The keyboard is used most of the input device, press the key when the power of control, not too hard. When cleaning the keyboard, you should use the vacuum cleaner and with minimal most soft brush nozzle, the key gap between net uptake of dust, then slightly moistened with a wet cloth, wipe the keycap, immediately after you finish a wipe with a dry cloth to wipe dry, remember, don't let those soup such as soups and water and your laptop too close. According to the manufacturer's conclusion: Sprinkle water droplets to the keyboard is a portable most dangerous killers, the losses caused by it will be difficult to restore. Fortunately, there are some laptops have a waterproof keyboard, this makes some careless users could slightly relieved.
  
4. CD-ROM drive
Note: remove disc
Many laptops are equipped with a DVD drive, CD drive, of course, this would be the same maintenance. Need to make the necessary periodic cleaning bald. Also note in carrying the laptop before going out, it should be in the CD out, otherwise, in the event of a drop or collision, the platters and heads or laser head collision, damage the disc or optical drives in the data.
  
5: computer security maintenance
The notebook is also a container when you continually to match something that always has a day it is blocked, the slow running variable. This is our time to pay attention to clean up the garbage in the notebook, notebook volume relatively small after all. Security maintenance is about to kill the soft, Internet use, or with a drug tyrants like anti-virus software, jisuban not only anti-virus anti-virus functionality also helps to maintain the internal computer. Columns as rubbish, energy saving, small memory are beneficial harmless advantages other know very little about, just give us a suggestion, and maintenance methods.
  
Six: hard drive
Note: shockproof and backup
Although notebooks are advertised with the hard disk has a very good shock factor, but turbulence for notebook hardware of dangerous or considerable, you shouldn't get important data to bet, therefore, as far as the place to work smoothly. Of course, like desktop as data processing and backup is necessary.
  
7: power supply
Note: stability
Notebook can use local AC power to work, then note that voltage stability issue conditional to tie in with the regulator, because current fluctuation caused the injury, the notebook is not worth it.
  
8: overall maintenance
Note: a good protection
You should always tell myself, the notebook is an expensive, vulnerable, high-tech products, there are your most important data, so long as you have this kind of mentality, in any moment you will take care of it, because laptops are characterized by mobility, and the way in mobile is the most vulnerable, and therefore, you should be more attention to mobile laptop. And in the day-to-day maintenance, typically to clean, also note the use of the method, in this way, the life of your notebook will be longer.




【 Weak current College 】 word2003 questions and answers



Word2003 questions:
1. create a new word document, the contents of Windows Clipboard to paste into the Word document.
2. to save the current document version (do not enter a version of the notes), and set off automatically save a version of the document.
3, please use the document map displays the current document, and is set to blue and white.
4, please start a Word document to the default path was changed to "my documents" folder by following the "Startup" folder.
5, please print the current document, the other four options for default (don't wait for the end-of-print).
6, please restore the "format" in the default state of the toolbar, and make it available to the Normal.dot template.
7, in the active window, view the "layout" tab in the help information.
8. Please insert the page number for the current document. Requirements: the page number is located on the top of the page (header), the format is-1-, 2-.... (The other option is the default value)
9, in the current document to insert the cursor on the desktop called "advanced programming language" in the word document.
10, please build for selected text, a hyperlink to the linked object as the default path "dissertation" Word document.
11, place the contents of the Clipboard to plain text format to paste into the text at the cursor.
12, the document is set to check grammar as you type and check grammar with spelling.
13, the style of the selected text in the document, there are dozens, the batch to be replaced by "heading 4" style.
14, restore the directory to the "body text" style.
15, set the format of the selected paragraph to "keep lines together".
16, for the selected paragraph add multilevel, style as: "1/1.1/1.1.1" and progressive right indent.
17, custom code, style as "a, b, c," ¢.
18, the selected text in the font set to "xxfareastfont".
19, selected English all converted to uppercase.
20, please add the selected text is center aligned, pinyin, the font size to 12 points.
21, the file's page orientation to landscape.
22, in the cursor to insert a section break section break type is "continuous".
23. in order to make the current document, even page header content is not the same, please make the appropriate settings.
24, please insert the cursor a 28 rows, 9 columns of a table called inserted while using AutoFormat option "vertical column type 4".
25, click in the column to the left of the cursor to insert a column of cells.
26, draw the selected forms of internal horizontal line, horizontal line style from the default value.
27, please send the selected table cells is set to wrap.
28, in a drawing canvas on the right side of the graphics to draw a rounded rectangular callout, and enter text in annotations: star anise star.
29, the drawing canvas, select the graphics into a graph.
30, will select the picture color changed to grayscale.
31, please change the selected WordArt styles, new style within the WordArt in row 4 column 4.
32, a diagram of the document is set to top and bottom wrapping style.
33, at the current cursor created a does not contain any graphics drawing canvas.
34, please select the Word table data to create graph "MicrosoftGraph".
35, please send the currently selected text in the outline level to "title 33-class" outline.
36, deselect the text in the list style is applied.
37, first put the current document is set to "automatically when you insert a picture in the picture below, add a ' picture 1 ' caption", then "E:\ pictures/photos 6.jpeg" file content into a cursor.
38, please create a directory for the document, and catalog format is popular, display level is level 4, the other parameters remain unchanged.
39, first at the cursor type "autobiography," the text, and then only the form data is saved to the default folder, the file name is "autobiography", other parameters with default values.
40, please fill in thefollowing student information form field: name: Zhao sex: female date of birth: 1993.12.1 audit report professional: painting


The answer:
1. click 1) files — new 2) Edit-Paste
2. click file — layout —.
3. click View 1) — the document map 2) click Tools-Options-General
4. click Tools-Options-file location — double-click Startup —.
5. click File-Print-4..
6. click View-Toolbars-custom toolbars — — — — — — reset form
7. click the "?" and (in the upper-right corner)-layout options
8, click the Insert page numbers — — — —. -Format:.. ".
9, click Insert file — — — — — —. desktop.
10. click Insert — Super connection —. — — OK
11. click Edit-Paste —.
12, click Toolbar Options — — — — — — Spelling Grammar. — — OK
13, select the text box at right — select a format similar to this: in the format toolbar (upper left) to select.
14, click the format-style and format:— Body
15, right — paragraphs — the line and page breaks —.
16, click Format — the bullets and numbering — outline numbered —.
17, click Bullets and numbering — custom numbering style — — — —.
18 click format – font —.
19, click format-change case —.
20, click Format — Asian typography — the phonetic guide —.
21, click Page Setup on the file — — — — — — determine the horizontal
22, click Insert separator — — — —..
23, click Page Setup on the file — — — — — —.. layout.
24, click Insert table — — — —. table. — Auto format —.
25, click Insert table — — — — in the left column
26, click click in the table — property — border shade — preview —..
27, click click in the table — property — cell — options —.
28, click AutoShape (in the lower left corner)-callout — rounded rectangular callout —.
29, right-click — combination —..
30, click Format Picture — — — — — — gray color.
31, click the WordArt toolbar (top left) shows the WordArt-4 rows of 4 columns — OK
32, click — Format — border shade — the layout — advanced —and bottom — OK
33, click Insert-Picture — new drawing
34, click Insert — objects — M.. G。。 Chart — — — — click on the icons.
35, in the format and style taskbar (right) click on the title III
36, click Format — the bullets and numbering-style list — a list of free
37, 1), click Insert — reference — captions — the AutoCaption — M.. Word pictures —.
2) click pictures to insert — — — — — from file.
38, click Insert--reference--index and Directory-directory-list 4-OK
39, 1) type "autobiography" — click Tools-Options-Save-select. — — OK
2) click on the file-save copy as. ..
40, simple, type selection

Weak current College】 【reasonable configuration does not have a bad habit threat system security.



In the frequent manipulation computer processes, we often form some bad habits, these habits operation looks can provide efficient, but through these operations used to take a look at the many threats to the security of the system, for example from Internet network download REG file, most people eyes closed is double-clicking, import it into system registry, but it can cause serious system failure; another example, the system administrator rights, feel free to open IE readers to surf the Web, may cause the system to encounter a Trojan horse or other malicious code or attacks. Because the operation used to not be changed overnight, in order not to let the bad habit of threat to Windows system security, we can reduce by reasonable configuration, bad operation used to security threats.

1. reduce the threat of double-clicking the reg file

Sometimes, in order to achieve a functional purpose, we download the reg file, and then double-click mouse essentials to import it into system registry, you can achieve it. However, now the Internet network in many malicious REG file, if they do rashly to, double-click Windows system may encounter illegal attacks. In order to reduce this habit of security threats, we can manually configuration, amend the REG file to open the form, and let Windows system to receive the double-click action command after the first call to a text editing program such as WordPad to open the REG file, so that we can identify the REG file could exist against system security of malicious code, here is the gist of the specific implementation steps:

First click the "start"/"run" command in the pop-up system run dialog box, enter the string "cmd" command, click the Enter key, the system screen to switch to a MS-DOS window of work;

Then in the Windows command line prompt, enter the string command "ftyperegfile = write.exe% 1" and click the Enter key, Windows system will succeed changes to REG file import forms, we again use the mouse to double click the file, the Windows system will use WordPad to open the content in the reg file, in the text editing window we will see at a glance which could exist against the system of malicious code. If you find that no malicious code exists, we need to do is right-click the target reg file, from the shortcut menu to perform the "merge" command, you can set the contents of the file are imported into the local system registry.

Of course, if you download from the Internet network is available in the BAT file, we can use the same key to modify its open form, in order to ensure the security of running Windows System. We can work in the MS-DOS window in command line prompt, execute string command "ftypebatfile = write.exe% 1" to the future with the mouse double-click BAT file, first open the text editor window. If you find that target BAT file in line with the operational requirements, we work in the MS-DOS window in command line prompt, enter the path to the BAT file, click the Enter key.

2, reduce the threat of double-click IE icon

In order to obtain maximum operation permissions, many Internet users are often like to use the system administrator account logon Windows system, and then in the system administrator rights, feel free to open IE readers to surf the Web, in fact, this is also very dangerous habit, this is because IE Reader itself there are many security vulnerabilities, some hacker programs often through these vulnerabilities on your computer system to perform illegal attacks, or attempts by these vulnerabilities to steal system administrator for the local computer. In order to reduce the threat of double-click IE icon, we can find ways to have Windows system forcing IE readers must be run as a standard user account, while at the same time need to enter a password to open IE readers do Internet access; to do this, we can perform the following actions:

First right-click on the local computer system desktop "computer" icon, from the shortcut menu command "management", open the corresponding system of the computer management window, on the left side of the display area of the window, click on the "System Tools"/"local users and groups"/"the user" branch options;

Then use the right mouse button to click the "user" branch options, and perform a right-click menu in the "new user" command, then the new user dialog box, set a new standard account name, and configured the appropriate access password, assuming that here we new a "aaa" standard account, the account password is configured to "111";

The following is a shortcut IE readers form, and place the shortcut forms directly onto the system desktop, right-click IE shortcut forms, from the shortcut menu command "property", open the target shortcut forms of property configuration window, in the window of the "target" text box, enter the string content directly "C: \Windows\System32\runas.exe/user:" aaa "C:\ProgramFiles\InternetExplorer\IExpLORE.EXE", click "OK" button to finish the above modification operations;

In order to guarantee the absolute security of the system, we now turn on the local computer's "start" menu, to remove IE readers about the project, as well as other locations on the shortcut forms, only reservations system that IE shortcut on your desktop.

After this configuration, our future system privileges,Double-click System desktop shortcut form in IE, the system will first require us to enter the "aaa" account password, wait until the password is entered correctly, IE readers would be to "aaa" account privileges to start running, in the permission state, hackers or unauthorized attacker even use the vulnerability to attacks on the local computer, but no permissions for their attack is limited, and does not threaten the safety of the local computer system.

3, reduce the threat to run Registry

A little know how little computer knowledge, often in the local computer system free run Registry Editor to modify the system for free registry key, but if a key value changes inappropriate words, light causes a system function cannot normally use, serious cause paralysis occurs in computer systems. In fact, through the following configuration operation, we can let Windows system user performs "regedit.exe" program, an automatic pop-up warning prompt, tell the user to run high risk procedures do not randomly:

First open the WordPad program and program edit window, enter the specific warning prompt, assuming the content entered here as "you are currently running is a high-risk procedure, please be sure to caution," and the content is saved as "F:\jinggao.txt";

Secondly then open WordPad file edit window, enter the following code:
startF:\jinggao.txt
ping-n5127.0.0.1>nul
taskkill/imwrite.exe

To confirm that the above code content is correct, then click "file"/"Save" command to save it as "F:\jinggao.bat" file; Windows system in the future, once the batch file has been executed, the system screen appears for 5 seconds "you are currently running is a high-risk procedure, please be sure to caution" text prompts;

Following "start" then click "run" command/, in the pop-up system run dialog box, enter "regedit" in the string command, click the "OK" button, open the corresponding system registry editing window, in the edit window on the left side of the display area, expand HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ImageFileExecutionOptions branch option, in the target branch option to the right shows area, right-click the blank space, and then click on the shortcut menu of the "new"/"key" command, and then adds a new item named "regedit.exe";

Select "regedit.exe" subkey, and then press the same key in the subkey following the establishment of a string key value, the string value named as "debugger", and then double-click the key value, then the numerical configuration dialog box, set the "debugger" value is configured to "F:\jinggao.bat", and finally click "OK" button to finish the registry configuration operations.

Later, when other users on the local computer system running the registry program, the screen automatically appears "you are currently running is a high-risk procedure, please be sure to caution" such a warning message, and after five seconds the message will automatically disappear, believe that such alert notification, the ordinary person is free to run the registry edit such high risk procedures.

【 Weak current College 】 server for backup best practices


Data center operations with large amounts of data, when the data is destroyed, this is a disaster. This is the importance of regular backups. Even if you have a large number of backup data are not used, a backup is certainly not a waste of time. You may be lucky to have never experienced a loss of data. However, because this kind of thing very rarely occurred, and to maintain the integrity of data is very important, skip to the "save backup" of time and resources seems to be no problem.
Some industry insiders that data center backup is very important, the reason is very obvious, although I have heard a small company's system administrator said some agencies do not have the "waste" of time and resources for backup and success. In my opinion, he did not understand why I feel this way and do not believe that shock looked at him. I want only one of millions of people believe that a backup is not available. I hope that the majority of IT professionals believe that the value of the backup and only the best to make the appropriate backup.
If you have never used because of a disaster, you are lucky you are. However, because of the disaster is no timetable for attacks, when disaster strikes, the most recent backup is successful for disaster recovery of life-belt. Many backup best practices of points actually everyone know and use some common sense. Anyway, here are some of the backup best practices:
1. establish rules and procedures. Many technicians are annoying file or something, however, sufficient provisions is the key to success in any action. Backup rules and procedures do not have to be a thick book, you make a backup of only the content can contain them: what time is what needs to be backed up, backup, who is responsible for the backup, who can access the backup content, etc.
2. test backups. This rule is a common sense. However, the question is worth mentioning. There is a corrupted backup must be useless. Worse yet you still think it is good, can beused for disaster recovery, results cannot be used. Therefore, in order to avoid this, be sure to always test the backup, especially in the back up important data.
3. tag and sort backups. When you have 2 to 3 backup CD, to speculate on each CD content is relatively easy. When you are in a variety of backup media in a number of PT's data, the mere speculation. Therefore, you must mark your every backup and put these backup is arranged in a library. Tags backup include using a meaningful name, backup data, date and time, data, content, who created the data, as well as some notes, and more.
4. store backups in a safe place. Your security requirements are likely to contain the contents of the backup storage. However, if you do not contain these elements, you have to develop at the right time to correct these provisions. Location is a broad vocabulary, usually means that you store the backup location is protected to prevent unauthorized access and protect against fire, flood and earthquake hazards in the physical destruction of the place. It is better not to backup data stored in the data center itself. However, if you do have a safe place to store the backup, you can store there. Some data center as fortresses, than other places were safe.
5. real time for backup. The most recent backup is always useful. For example, in banking, online trading, etc., only real-time backup is useful. Real-time backup does not require additional resources. However, if your data is time-sensitive, real-time backup is only a selection. Even if your data is not time sensitive, it is not for real-time backup.
6. backup has a backup of the data. In order to increase the additional protection, you can back up the data has been backed up. It looks like you are back up again and again, however, important data, to have a backup of the data backup is not a waste of time.
7. the use of automation. Manual backup is a very heavy work, despite the current data center using artificial for backup is not never heard of. However, manual backups is a rare, because now there are many automated tools. If you do not have these tools, you have to get a such tools, because that will make your life easier. However, you do not forget to check the results of the backup, because the automation while good (to save time and effort), but if you cannot use the backup is not good. Backup tool error conditions rarely, however, you do not think that this kind of thing never let you encounter.
8. consider encryption. Backup contains sensitive data. Even if you're not worried about security issues, you have to think if an intruder to access backup data may occur. Even if you take a strict access control and others illegal access to your backup data of risk is very small, you still want to use encryption. Many automated backup tools provides reliable encryption features, why not?
9. know what you want to backup. If you can absolutely backup everything is the best, however, absolute method is not realistic. The second way is whether you can omit the data can be ignored. In any case, you should be based on the importance of your data classification, at least to regularly back up important data and very important data. Indeed, backup data, the more the better. However, if you run a serious limitations, you must ensure that the important data.
10. destroy you no longer use any backup media. You are thrown into the garbage room used backup media have a huge security risk, because unless you ensure these storage media data above have been completely eliminated and use any of the methods are unable to reply to you as someone else provides illegal access to these data. Old backup media may be old, but it still is not falling into the hands of illegal access.
11. the use of reliable media. This is a common-sense rules. If you use an unreliable medium for backups, which means that you indeed have a reliable backup。 If you use reusable media, you should periodically check this media is still time to complete the backup task. If not, you want to replace.
12. regular backups. Backup requires time and depend on you in the use of specific backup program. Backup may affect your data center's work. You will not be able to backup to stop work in progress. Indeed, the backup tool in general there are no such requirements. However, some data in the running time cannot be backed up, you need to first stop the machine, and then back it up. If possible, plan the data backup time, the workload of the machine is not great (night and morning) for backup.
13. back up the virtual machine. Finally, when a backup, you should not forget one thing is the virtual machine. Back up the virtual machine is not a separate science, however, it does require some skills. Therefore, unless you do not need to back up the virtual machine, or you're going to use some time to learn the correct backup virtual machines of some methods. In some cases, virtualization solutions to the manufacturer's instructions file will provide some guidance, however, not every vendor. Introduction to virtual machine backup techniques nor are so detailed. Therefore, in your backup virtualization solution when you need some more seriously.
Data backup best practices list is not exhaustive. Some of the best practices in some cases it is easy to use, but some rules are always reasonable. In any case, backups are extremely important and should not be overlooked. Therefore, you want to test a variety of ways and see which method is best for you. Repeated tests are not the best strategy. Therefore, to learn in advance as possible in order to avoid some pitfalls.



【 Weak current College 】 process for reference manuals (4)


T
tapisrv.exe
This is a background service for Windows98 and Windows phone WindowsNT4 (TAPI) support. This program on your system up and running is very important.
taskmgr.exe
Taskmgr.exe for Windows Task Manager. It displays your system running process. The program uses the Ctrl + Alt + Del to open, this is not a purely system program, but if you terminate it, may result in unknown issues.
tlntsvr.exe
Tlntsvr.exe is part of the Microsoft Telnet program. Telnet is a Terminal based on TCP/IP networks.
tcpsvcs.exe
Tcpsvcs.exe is Microsoft Windows networking components. This system processes for computer use private TCP/IP network services such as DHCP, simple TCP and printing services. This program on your system up and running is very important.

U
Userinit.exe
Userinit.exe is a key process in the Windows operating system. Used to manage different boot order, for example in the establishment of the network link and start the Windows shell.

W
WinLogon.exe
WinLogon.exe is a WindowsNT Login Manager. It is used to process your system login and login process. The processes in your system's role is very important. Note: winlogon.exe may also be W32.Netsky.D @ mm worm. The viruses spread through Email messages, when you open a virus attachment is infected. The virus creates SMTP engine in the victim's computer, mass mailings. It allows an attacker to access your computer, stealing passwords and personal data. The process's security level is recommended to remove. [TOP↑]
WMIADAP.EXE
WMIADAP.EXE is part of the Microsoft operating system. The processes AutoDiscovery/AutoPurge (ADAP) process transmission performance libraries to the WMI repository. This program on your system up and running is very important.
Wmiexe.exe
Wmiexe.exe is Windows Management program. This daemon allows users to access the basic system information. Delete this important process can cause an error in your system.
wmiprvse.exe
Wmiprvse.exe is part of the Microsoft Windows operating system. Used for processing through the WinMgmt.exe process WMI operations. This program on your system up and running is very important.
wscntfy.exe
Wscntfy.exe is Windows security-related policies. This program on your system up and running is very important.
wuaclt.exe
Wuaclt.exe is a Microsoft Windows system automatically detects your computer part of the software update feature. This program on your system up and running is very important. Note: wuaclt.exe is also possible that the Trojan, Trojans W32.Cult allows attackers to access your computer, stealing passwords and personal data. The process of security levels are recommended for immediate deletion.
WUAUBoot.exe
WUAUBoot.exe is used to manage Windows automatic update. The process will detect detection updates.
Wuauclt.exe
Wuauclt.exe is Windows automatic update management process. This process will continue online detection updates. Removing this process will enable you to get the latest information.
wuaudt.exe
Wuaudt.exe is a Microsoft operating system updates automatically. This program on your system up and running is very important.
WUCrtUpd.exe
WUCrtUpd.exe is used to detect Windows updates. The process timing automatic link to the online address detection updates. Removing this process will enable you to get the latest information.

0
1xconfig.exe
1xconfig.exe is SCMMicroSystems multimedia software and hardware products. This process provides a convenient way to pallet operation.
3dm2.exe
3dm2.exe is 3wareATA/SATARAID hard disk Web interface control tool. The process is not necessary to run, but there may be a problem to terminate it.




Weak current College】 【notebook of various fault detection steps.



First, no power (power led not lit)
1. check the adapter or power port, make sure the main power supply to protect isolated circuit.
2. check the power on switch.
3. replace power supply Board (for the power plate separation of model) test.
4. maintenance of the motherboard.

Second, the power led is on but the system is not running, nothing is displayed on LCD
1. press the power switch and turn the power off for four seconds, and then restart the check start normally.
2, external CRT monitor is displayed properly.
3. replace the memory.
4, clearing the CMOS.
5. replace the memory, CPU.
6, maintenance motherboard

Fourth, the panic, the blackout
1. check the cooling system.
2. minimum system testing.
3. to reinstall your operating system.
4. maintenance of the motherboard.

5. video corruption
1. the external monitor to see properly.
2. Add the same video:
1) replace the memory test;
2) reinstalling the video driver;
3) detect the video chip is virtual welding;
4) video BGA or replace the motherboard.
3. Add normal:
1) reinsertion pingxian ends;
2) plus welding pingxian interface;
3) replace pingxian;
4) replace the LCD;
5) video BGA or replace the motherboard.

Six, anping
1. replace the LCD to judge whether the lamp is damaged.
2. damage to the tubes, replace the lamp.
3. lamp is not bad, check the pressure plate meets the basic working conditions.
4, are not met, check the signal source section; meet, replace the pressure plate.

7. no sound
1. check the volume adjustment is correct.
2. check the sound card driver is installed correctly.
3. check the speaker connection.
4. check the speaker damage.
5, inspection, replacement power amplifier, audio chip.
6. replace the motherboard.

8. keyboard problems
1, judging by test program
2. check the keyboard cable is unplugged
3. replace the keyboard test to determine if the keyboard is damaged
4, keyboard, maintenance, replacement keyboard
5. change keyboard failure persists, check the keyboard cable connector
6. replace the keyboard chip
7, maintenance, replacement motherboard

9. touch pad does not work
1. check whether there is an external mouse access and MOUSE test program detection properly.
2. check the touch pad cable is connected correctly.
3. replace the touch pad
4. check the keyboard control chip exists Xu Han
5, maintenance, replacement motherboard

10. USB port does not work
1, check the BIOS setting USB port is set to "ENABLED".
2. reinsert the USB device, check whether the connection is working properly.
3. check the USB port driver and USB device drivers are installed properly.
4. check and replace the USB port.
5. check for the existence of virtual welding South Bridge.
6, nanqiao BGA or replace the motherboard.

11. fan problems
1, with FAN test has detected correctly, when the fan is powered on.
2. test the fan wiring for good.
3. test the fan is good.
4. replace the fan controller chip.
5, bad motherboard

12. serial port device does not work
1, in the BIOS Setup, check the serial port is set to "ENABLED"
2, with SIO test program detection properly.
3. check the serial port device is properly connected.
4. If a serial mouse, check the BIOS settings to turn off the built-in touchpad; check the serial mouse driver is installed properly.
5. check the serial chip.
6. check the southbridge chip on the motherboard for the existence of a virtual cold welding and soldering.
7, repair and replace the motherboard.

13. parallel port device does not work
1, check the BIOS settings and port is set to "ENABLED".
2, with PIO test program detection properly.
3. check all the connections are correct.
4. check the external device is powered on.
5, check the printer mode settings are correct.
6. check the southbridge chip on the motherboard for the existence of a virtual cold welding and soldering.
7, repair and replace the motherboard.

14. battery identification in Windows is not working properly
1. confirm that the power management features in the operating system is started and set up correctly.
2, the battery charge three hours before use.
3. the battery charge and discharge twice and then try again.
4. replace the battery.
5. Inspection Board

13. driver problem symptoms
1. display does not function properly;
2. sound card does not work;
3, Modem, LAN does not work
4, you cannot use the QSB
5, some hardware because there is no load driver or drivers loaded is not correct and not normal use

14, operating system, the symptom of the problem
1. the system runs slow
2. the blue screen of death,
3, can not be normal shutdown
4, system errors

Weak current College】 【Windows 7 using skills in.

<br> According to foreign media reports, the recent period of time, IT managers have been consistently rapid learning, server virtualization, desktop, VDI, Exchange, SharePoint, Microsoft constantly inject fresh in the enterprise. In so many new products under siege, .managers are hard to empty out the time to learn the skill of Windows7. <br> <br> Here, the author is summed up the Windows7 of small skills, as follows: <br> <br> ◆ The tray icon has a keyboard .shortcut <br> <br> Users want to use the keyboard shortcuts to open the application, simply hold down the Windows key, then press the key on the keyboard and the icon corresponding to the number. For example, if the InternetExplorer is the first .icon, the user simply press and hold the Windows-1, you can open the IE browser. <br> <br> ◆ The user can set any of the items on the taskbar is moved <br> <br> Perhaps users may find .this function in WindowsXP and Vista already existed, but in fact this is a new Windows7. <br> <br> ◆ Paint and WordPad uses the new ribbon interface <br> <br> In addition, the paint program also includes new improvements, .however, the user still cannot open more than one document or a picture. <br> <br> ◆ Windows7 contains a powerful new tool to facilitate users on distant family and friends to provide support <br> <br> Click "start" button ., and then type the PSR open problem steps recorder. This tool can step by step (or even take screenshots) captures a person's operational processes. <br> <br> ◆ Users can system notification area to display more than one time <br> .<br> For those with colleagues across time zones work together in terms of users, this is a very nice feature, Windows7 system notification area to display different parts of the clock. <br> <br> Click the notification area of the clock and .choose to change the date and time settings, select the additional clocks tab to display up to two clock and set the time zone. In fact, as early as WindowsVista, Microsoft has added this functionality, however very few people to notice it. <br .> <br> ◆ Fast running one with administrator privileges application <br> <br> In previous Windows operating systems, if the user wants to open an application with administrator privileges, usually through the start menu, right-click the application, and select .run as administrator. However, in the Windows operating systems, users can simply type in the start menu instant search field name, press and hold the key to fast running Ctrl-Shift-Enter one application with administrator rights. <br> <br> .◆ Take the "focal points" to replace "Security Center" <br> <br> <br> "Action Center" is located in the system control panel, it can guarantee the security of the user's operating system, and to users with maintenance .information. In addition, the "focal points" also provides to the user, such as the backup settings and many other features. <br> <br> ◆ Windows7 has a new UAC (user account control) slider that allows a user to set .the desired level of tip <br> <br> Users can instantly search bar type UAC quickly open a user account control feature, new UAC slider control function, the user can control how often UAC prompts. This Windows7 UAC on in do not like Vista's .UAC to interfere with the user's normal work. <br> <br> ◆ You can quickly open and close a specific Windows application <br> <br> To open and close the built-in applications such as Internet Explorer, DVD player and Media .Player, users can instantly search bar, enter the name of the function, and select Windows features on or off link under control panel, and then you can find this function. <br> <br> ◆ Users can run a private version of IE .<br> <br> If the user is participating in the meeting or in a public place, and want to run a private version of IE, you can quickly jump to InPrivate browsing mode to achieve this goal. <br> <br> ◆ .Users can turn off your location and other information like browser <br> <br> Sometimes, when a user visits a site, it may ask the user whether you want to know their location and the area of weather information, this may allow users to .feel awkward. In Windows7, one named "InPrivate filter" new IE feature allows you to solve this trouble. <br> <br> ◆ The user can create a shortcut for a home network <br> <br> By using the Windows7 in .HomeGroups function, users and other home network Windows7 members quickly sharing files, pictures, and printers. <br> <br> ◆ Help to find the source of the problem causing the reliability <br> <br> If the user's computer problems such as .crashes or hangs, and other applications, so users can instantly search bar type reliability to open Reliability Monitor, it will display the user's system in a history of reliability. <br> <br> ◆ The user can easily in 60 seconds to see computer .diagnosis <br> <br> Used in Windows7Households without the use of management tools, performance monitor, and the data collector set, you can start the system diagnosis directly through distributed control systems to open an administrator command prompt, and then type perfmon / report .you can see the computer diagnostic report. <br> <br> ◆ The administrator can enforce interning users play games of the time limit <br> <br> In Windows7, administrators need only through the use of parental control in the control panel to .do this. <br> <br> ◆ Find as WindowsMail and photo gallery and other missing tools <br> <br> These tools are Microsoft shifted to a LiveEssentials downloads Web site. <br> <br> ◆ Use PowerShell to speed up .the work speed <br> <br> Windows7 in built-in PowerShellv2, it can provide users with a powerful remote processing capability that enables the user to the tasks from the command line for other systems. <br> <br>.

Weak current College】 【paragraphs have long-term damage the hard disk's internal software --- Power By】 【China power house network.

<br> <br> This article closely for beginners share if you are an expert, you can skip this article! <br> <br> Hard drive is the most important computer storage media, on the hard drive maintenance, believe that every computer .user. However, the previous articles are for single users of dial-up era, with the increasing popularity in the broadband, large hard drive continuous price today, many people turn on the computer will have a hard drive full load operation: see high- .definition movies, DVDRip conduct an ongoing BT download, use the system restore feature of Windows ... <br> <br> However, you may not know, these new new software, and will give a new hard disk damage! new application models .of vulnerability <br> <br> 1. Frequently defragment disk fragmentation <br> <br> Disk defragmentation and system restore would Windows provide the functionality, however if you frequently do these actions, on the hard disk is not harmful. Disk defragment to .hard disk low-level analysis, determine which data can be moved, what data cannot be moved, and then sorts the files. In formal arrangements for hard drive data structure, it constantly random read write data to a different cluster, good order and then .put the data back to the proper location, these actions will consume large amounts of CPU and disk resources. <br> <br> In fact, now the large hard drive, the document and mail takes up very little space, most people buy a .large hard drive is used for movies and music, the partition is not required frequent consolidation - because the effects of playing multimedia files and the disk structure is no relationship, the playback speed is determined by the video card and CPU. <br> <br .> 2.WindowsXP automatic restart <br> <br> WindowsXP-automatic restart feature can automatically close unresponsive process automatically exits the illegal actions of the program, thus reducing user action steps. However, this function also has a very big problem: it will .automatically restart before shutting down the hard drive power, in time to restart the machine and then open the hard drive power!, the hard drive in less than 10 second intervals, subject to current two impact, is likely to occur suddenly "death". .In order to save some energy to let the system automatically turns off hard drives are more harm than good. <br> <br> 3. coding error DVDRip <br> <br> Now online from DVD DVDRip transcription compressed format movies is quite popular .. This format of movie and DVD comparable, but download a movie only 700MB ~ 1.3GB size, so many users like to download DVDRip format movies to your hard drive slowly. However, play this format movies on system has high requirements: in addition to .the CPU, video card requires strong enough to ensure that the playback is smooth, hard disk load is very high - because the play is a DVDRip constantly decoding uncompressed, then transfer to the show system processes. <br> <br> The authors found .that, in the face of a coding error DVDRip file, the Windows disk usage is very high: the system constantly want to convert the encoding of the video signal, but coding error file indexing and appropriate signal segment is not matching - at this point, .the hard drive light is flashing constantly, the entire system on the user's actions in response to the extremely slow, the user clicks on the menu but almost no reaction. If an encoding error more, sometimes even panic. Many users are very impatient at this .time, press the RESET button on the chassis or even direct power off the computer, the hard disk head is not properly reset, this operation is very dangerous! <br> <br> Tip: WindowsXP users need to pay particular attention, when we .automatically preview the WindowsXP some large such as ASF, WMV files, although no formal play, but will also appear suddenly slow computer speed, the hard drive light flashes continuously; the culprit is still a video file error code! <br> <br> .4.Bittorrent downloads <br> <br> Bittorrent download is the broadband era emerging P2P swap file mode, share resources between the various users to each other when the seeds and hops, commonly known as the BT download. Since each user of the download .and upload almost simultaneously, so the download speed is very fast. However, it will download data directly into the hard drive (not like FlashGet, download tool you can adjust the cache, to a specified amount of data is written to the hard disk) ., so the hard disk usage than FTP download more! <br> <br> In addition, BT download the prior to request a hard-disk space to download large files, there are generally 2 to 3 minutes for the entire system of priority were .to apply for space occupied by the task, other tasks to respond very slowly. Some people in order to make full use of bandwidth, but also simultaneously several BT download tasks, you will very likely to occur because the disk usage is too high, causing .the death machine failure. <br> Therefore, unless your computer's hardware configuration is quite high (particularly memory, at least 256 MB and above), BT download the improvements in the past, if you want to make long, multi-tasking application to .download, it is using the traditional FTP software. <br> <br> 5.PQMAGIC conversion risk <br> <br> PQMAGIC is the famous partition magic, can not destroy data freely adjust the partition size and format. However, PQMAGIC has .just launched, usually the user's hard drive is about, and now 2GB 60 ~ 80GB hard drive is seen everywhere, PQMAGIC early elaborated: adjust zone data, the partition above 5GB typically need more than 1 hour! <br> <br> In addition .to capacity factors, PQMAGIC adjustment hard disk partition, considerable time was spent the validation data and detect the hard drive, you can see, in this case "nondestructive partition" is difficult to ensure that the conversion of: Slowly, time-consuming, conversion .adjustment, it is easy for a computer or computer, and other factors causing data loss. Such losses are often one or several partitions, lost, or the capacity becomes abnormal, serious or even an entire hard drive cannot read the data. <br> .<br> 6. hard disk protection software anomalies <br> <br> Easy hard drive causing abnormal, and hard disk protection software. For example, the "restore the Elves", because many people do not pay attention to reinstall the system or .repartition and normal uninstall before it tends to occur in the system is not fully installed. You then want to install and uninstall the "restore the Elves", but prompt software already installed, can't go into an endless loop. This failure is due .to "restore the Elves" has taken over the INT13 before the operating system control the hard disk boot, use the FDISK / MBR command cannot fix. <br> <br> Originally, this is just a software failure, but many inexperienced, a .problem will find a variety of partitioning tool "test", or even lightly low-level format, in such a toss, the hard drive is likely to die prematurely. <br> <br>.

Wednesday, January 26, 2011

【 Weak current College 】 cpu knowledge encyclopedia (2)



10. instruction set

(1) CISC instruction set

CISC instruction set, also known as a complex instruction set, the English name is CISC, (ComplexInstructionSetComputer abbreviation). In CISC microprocessor, the program's instructions is a serial execution of the order, each instruction in the various actions is also a serial execution of the order. Order of merit is the control of simple, but computer parts usage is not high, slow. In fact it is Intel's x 86 series production (that is, IA-32 schema) CPU and compatible CPU, such as AMD, and VIA. Even now, a new x 86-64 (also known as AMD64) belong to the category of CISC.

Want to know what is instruction set also from today's x 86 architecture CPU. Intel x 86 instruction set is for its first 16-bit CPU (i8086) specially developed for the launch of the world in IBM1981 first PC CPU — i8088 (i8086 Lite) is also used by the x 86 instruction, and computer to enhance the capacity of floating-point data processing has increased after X87 chip, the x 86 instruction set and X87 instruction sets are collectively known as the x 86 instruction set. Although with the CPU technology, Intel has developed the update type of i80386, i80486 until past PII Xeon, PIII Xeon, Pentium3, finally to today's series, Xeon Pentium4 (not including Xeon Nocona), but in order to ensure that computers can continue to run in the past development of various types of applications to protect and inherit rich software resources, so Intel company produces all the CPU still continue to use the x 86 instruction set, so it's still belong to X86 series CPU. Since the IntelX86 series and compatible CPU (e.g. AMDAthlonMP,) use the x 86 instruction set, so they formed a large x 86 series today and compatible CPU lineup. At present mainly has intel x86CPU of server CPU and AMD Server CPU.

(2) RISC instruction set

RISC is the English acronym for "ReducedInstructionSetComputing", is a "reduced instruction set". It is in theCISC instruction system developed on the basis that it was tested on the CISC machine has shown that the use of the various directives, the frequency is most frequently used are some relatively simple instructions, they accounted for only 20 per cent of the total number of instructions, but the frequency in your accounts for 80 per cent. Complex instruction set will inevitably increase the complexity of the microprocessor so that the processor for a long time and high costs. And complex instruction requires a complex operation that will reduce the speed of your computer. For these reasons, the 1980s RISC-CPU was born, relative to the CISC CPU type, CPU RISC type not only streamlines instruction system also uses a feature called "superscalar and hyper pipelined architecture", greatly increased the parallel processing capabilities. RISC instruction set is a high-performance CPU. It and traditional CISC (complex instruction set). In contrast, unified RISC instruction format, type less, addressing mode is less than the complex instruction set. Of course, processing speed increased a lot. At present in the high-end server universal adoption of this directive, the system CPU, especially high-end servers are all adopt CPU RISC instruction set. RISC instruction set is more suitable for high-end server operating systems UNIX, Linux or UNIX operating systems are similar. RISC-CPU with Intel and AMD CPU in software and hardware are not compatible.

Currently, high-end servers with RISC CPU instruction in the following categories: PowerPC processor, SPARC processor, processor, MIPS processor PA-RISC, Alpha processor.

(3)IA-64

EPIC (ExplicitlyParallelInstructionComputers, accurate parallel instruction computing) is a RISC and CISC system Inheritors controversy has been a lot, single to EPIC system, it's more like Intel processors into RISC system important steps. In theory, the EPIC system design of the CPU, on the same host configuration, handling Windows application software is based on the UNIX application software is much better.

Intel uses EPIC technology of server CPU is Itanium Itanium (development code name i.e., Merced). It is a 64-bit processor, is also the first IA-64 series. Microsoft also has developed an operating system codenamed Win64, be supported on the software. In Intel used the x 86 instruction set, it also turned to seek more advanced 64-bit microprocessors, Intel do this because they want to get rid of capacity great x 86 architecture, thus introducing the energetic and powerful instruction set, and uses EPIC instruction set of the IA is born. IA-64 in many respects than the x86. Break through the traditional IA32 architecture of many of the limitations in the data processing capability, system stability, security, availability, good reason, and so get a breakthrough increase.

IA-64 microprocessor's biggest flaw is their lack of compatibility with x 86, Intel to IA-64 processors to run two dynasties of software, which in IA-64 processor (Itanium or Itanium2 ...) Introduces the x86-to-IA-64Decoder so that you can put the x 86 instructions translated into IA-64 directive. This decoder is not the most efficient codec, or run the best way to x86 code (the best way is to directly run on x 86 processors x86 code), so the Itanium and Itanium2 at run time in application x86 performance is very bad. This has also become X86-64 the root cause.

(4)X86-64(AMD64/EM64T)

AMD company design, you can at the same time, deal with 64-bit integer operations, and compatible with x 86-32 architecture. Which supports 64-bit logical addressing while providing converted to 32-bit addressing option; but data manipulation directive defaults to 32-bit and 8-bit, converted to a 64-bit and 16-bit option; support for general-purpose registers, if it is a 32-bit arithmetic operation, it is necessary to extend the results into a complete 64-bit. In this way, the directive has a "direct" and "transformation performs" difference, its directive field is an 8-bit or 32-bit, you can avoid field is too long.

X86-64 (also known as AMD64) have also not groundless, x 86 processor of 32bit addressing space is limited to 4 GB of memory, and processor IA-64 nor compatible x86. AMD to take full account of the needs of customers, enhance the x 86 instruction set of features that make this set of instructions that can simultaneously support 64-bit operation mode, so AMD put their structure called x86-64. Technically AMD x 86-64 architecture for 64-bit computing, the AMD as it introduces new R8-R15 general-purpose registers as existing x 86 processor registers of expansion, but in 32-bit environment does not fully used to these registers. The original registers such as EAX, EBX and expansion by the 32-bit to 64-bit. In SSE units new joined eight new registers, to provide support to SSE2. The increase in the number of registers will bring performance improved. At the same time, in order to support both 32 and 64-bit code and register, x86-64 architecture allows the processor to work in two modes: LongMode (long mode) and LegacyMode (genetic pattern), Long model is divided into two seeds mode (64bit mode and Compatibilitymode compatibility mode). The standard has been introduced in AMD's Opteron server processor processors.

But this year also introduces support for 64-bit EM64T technology, and haven't been formally life as EM64T is IA32E before, this is the Intel Extended Memory 64 Technology name, used to distinguish between x 86 instruction set. Intel's EM64T support 64-bit sub-mode, and AMD x 86-64 technology similar to using a 64-bit linear addressing, join the plane eight new general-purpose registers (GPRs), also adds eight registers support SSE instructions. Similar with AMD, Intel's 64-bit technology will be compatible with the IA32 and IA32E, only if you are running a 64-bit operating system, it will adopt IA32E. IA32E will consist of 2 sub-mode: 64-bit and32-bit sub-mode sub-mode, as with AMD64 is downward compatible. Intel's EM64T is fully compatible with AMD x 86-64 technology. Now Nocona processor has joined a number of 64-bit technology, Intel's Pentium4E processor also supports 64-bit technology.

It should be said, both of which are compatible with the x 86 instruction set architecture for 64-bit microprocessor, EM64T and AMD64 or there are not the same place, AMD64 processor NX bit in Intel processor is not provided.

11. hyper pipelined and superscalar

In interpreting the hyper pipelined and superscalar pipeline before understanding (pipeline). Line is the first time in Intel 486 chip to start using. Assembly line work as industrial production on the Assembly line. In the CPU from 5-6 different function circuit modules one instruction processing line, and then place an x 86 instruction divided into 5-6-step, then such circuit unit performed separately, so that you can achieve in a CPU clock cycles to complete one instruction, thus increasing the CPU's speed. Classic Pentium each integer lines are divided into four levels of water, i.e. instruction prefetch, decode, execute, write back the result, float flow is divided into eight levels.

Superscalar is via built-in multiple lines to the simultaneous execution of multiple processors, its essence is a space for time. The pipeline is running through the refinement, increased frequency so that one machine cycle to complete one or more operations, its essence is taking time for space. For example, the line on Pentium4 20 level. The pipeline design step (grade), their complete instruction faster and therefore to adapt working frequency higher CPU. But the line is too long or a certain side effects that are likely to occur at higher CPU lower actual operation speed, Intel's Pentium 4 appeared in this situation, although its clock speed up to 1.4G above, but its operational performance is far behind the Athlon or Pentium AMD1.2G III. 12. package

CPU package is the use of specific materials to CPU chip or CPU module curing in which prevent damage to the protective measures, must be delivered after the CPU package. CPU package depends on the CPU installation forms and device integration design, from the large category to see usually uses the Socket outlet with the installation of CPU use PGA (grid array) package, which uses the CPU Slotx duct installation are all adopt the SEC (unilateral patch box) forms of packaging. Now there are PLGA (PlastIcLandGridArray), OLGA (OrganicLandGridArray) packaging technology. As the market competition becoming increasingly fierce, the current CPU packaging technology direction of development in order to save costs.


13, multi-threaded

Simultaneous multithreading Simultaneousmultithreading, SMT. SMT you can copy the processor of the State structure, so that the same processor for multiple thread synchronization and shared processor execution resources to maximize the wide emission, out-of-sequence, superscalar processing, improving the utilization of the processor arithmetic parts, ease because data related or Cache misses will bring access memory latency. When no more threads available, SMT processor virtually and traditional wide emission superscalar processors. SMT's most attractive is just small change processor core design, almost no additional costs can significantly improve performance. Multi-threading technology for high speed computing core prepared more pending data, reduce the operational core of idle time. This is undoubtedly a low-end system desktop is very attractive. Intel starts from 3.06GHzPentium4, all processors will support SMT technology.

14, multi core

Multiple core, also referred to as single-chip multiprocessor (Chipmultiprocessors, hereinafter referred to as CMP). CMP is made by Stanford University, the idea is to massively parallel processors in the SMP (symmetric multiprocessor) integrated into the same chip, each processor side-by-side execution of different processes. Compare with CMP, SMT processor structure comparison of flexibility. However, when semi-conductors technology into 0.18 Micron, line delay have exceeded the gate delay, request the microprocessor design through Division of many smaller, local better the basic unit of structure. In contrast, because CMP structure has been divided into more than one processor core to design, each nuclear are relatively simple, help to optimize the design, so even more promising. Currently, IBM's Power4 chip and Sun's MAJC5200 chips are CMP structure. Multi-core processor to processor internal shared cache, cache usage, while simplifying multiprocessor system design complexity.

The second half of 2005, Intel and AMD's new processors will also be integrated into the structure of the CMP. New Itanium processor development code for dual-core Montecito, designs, having at least 18MB chip cache, take the 90nm process, it definitely is on the challenges of today's chip industry. It's the core of each individual will have independent L1, L2 and L3cache, contains approximately 10 billion-transistor.

15、SMP

SMP (SymmetricMulti-Processing), symmetric multiprocessing architecture ", refers to a computer has gathered a group of processors (CPU), shared between the CPU and memory subsystem bus architecture. In this kind of technical support, a server system can simultaneously run multiple processors, and share memory and other host resources. Like dual Xeon, that is what we call the second road, which is symmetric processor system one of the most common (Xeon MP can support to four road, AMDOpteron can support 1-8). A small number is 16. But generally speaking, the structure of SMP machines scalability is poor, it is difficult to be 100 over multiple processors, regular is generally 8 to 16, but for most users is sufficient. In high-performance server and workstation-class motherboard schema are most common, like UNIX server can support up to 256-CPU system.

Build a set of SMP system requirements are: support for SMP hardware including the motherboard and CPU; support for SMP systems platform, then the application software support SMP.

In order to be able to make SMP systems play an efficient performance, the operating system must support SMP systems, such as WINNT, LINUX, and UNIX, and so on 32-bit operating system. That is, able to multi-task and multithreading. Many tasks are at the same time with the operating system to allow different CPU perform different tasks; multithreading refers to the operating system to make different CPU parallelism on the same task.

To create a SMP systems on the selected CPU high demands, first of all, the internal CPU must be built-in APIC (AdvancedProgrammableInterruptControllers) unit. Intel multiprocessing specification of core is advanced programmable interrupt controller (AdvancedProgrammableInterruptControllers--APICs); once again, the same model, same type of CPU core, exactly as running frequency; Finally, to keep the same product serial number, because the two production batch of the CPU as a dual-processor operation, of the possibility of a CPU burden is too high, and the other a little of burden to maximize performance, worse may cause panic.

16, NUMA technology

NUMA is non-uniform access distributed shared memory technology, it is made up by high speed private network connections with the system of independent nodes form, each node can be a single CPU or SMP system. On NUMA, Cache consistency has a wide range of solutions, operating system and special software support. Figure 2 is a Sequent NUMA systems company. Here are three SMP module high speed private network with up to form one of the nodes, each node can have 12 CPUs. Like a Sequent systems can reach up to 64 CPUs even 256 CPUs. Obviously, this is on the basis of the SMP, then uses NUMA's technology to expand, this is the combination of the two technologies. 17, out of sequence execution technologies

Out of sequence execution (out-of-orderexecution) refers to the CPU to allow more than one directive does not require order by program development to the appropriate branch circuit unit processing technology. This will be based on a circuit unit status and instructions can advance implementation of the specific situation analysis, will be able to advance the implementation of the directive be sent immediately to the appropriate circuit element, in this order is not required during the execution of instructions, and then by rearranging cell will each perform unit results order reorder instructions. Adoption out of sequence execution technology is designed to make the CPU internal circuit full load operation and a corresponding increase in the CPU to run the program. Branch-and-technology: (branch) of the directive when it is necessary to wait for the results of operations, general unconditional branches only needs to order according to the directive, and the conditions under post-processing Mycobacterium must, before deciding whether to make the original order.

18, CPU internal memory controller

Many applications have a more complex reading mode (almost randomly, especially when cachehit unpredictable time), and there is no efficient use of bandwidth. Typical of this kind of application is the business process software, even if you have such as out-of-sequence execution (outoforderexecution) CPU characteristics will also be affected by the memory latency. This CPU must wait until the operation is required to complete the data divide mount can execute instructions (whether these data are from CPUcache or main memory system). The current low segment system memory latency is approximately 120-150ns, and CPU speeds can reach more than once 3GHz separate memory request may be a waste of 200-300 CPU cycles. Even in the cache hit ratio (cachehitrate) reaches 99% of cases, CPU also may take up to 50 per cent of the time to wait for memory request end-for example because the memory latency.

You can see the Opteron consolidated memory controller, its delays, and chipset supports dual-channel DDR memory controller's delay in comparison, it is much lower. Intel is also planned that internal consolidation in the processor, the memory controller led North Bridge chip will become less important. But changing the processor access main memory, help to increase bandwidth, lower memory latency and improve processor performance


【 Weak current College 】 wireless LAN technology on a


1. What is wireless network?

Generally, the so-called Wireless, as the name suggests is the use of radio waves as the transmission of information, and application level, it with the wired network uses completely similar, the two biggest difference lies in the transmission of information media. In addition to this, because it is wireless, both in hardware installation or use of mobility than the cable network to many advantages.

2. wireless network with wired networks, there are those who benefits?

To use its mobility, convenience, and the cable network, the cost, it can save a considerable wiring costs, costs that are basically modified interior space is flexible.

3. wireless network effects on the human body have anything?

For wireless networks transmitting power than the average of the cellular phone to faint, wireless network transmission power about 20 ~ 70mW and transmitting power cell phones cell phone about 200mW, and using way nor like a mobile phone in direct contact to the body in General, less security on considerations.

4. If you want to structure a wireless network, the most basic of equipment needs to have those?

General set up a basic wireless network is equipped with a wireless network card and a bridge (AP), so will be able to cope with the wireless mode, the existing wired infrastructure to share network resources.

5. wireless network will be used to interfere with or affect the operation of other devices?

Basically, the wireless network is using the frequency band is part of the high frequency range ISM2.4GHz, daily life, or Office, etc. with the electrical equipment does not interfere with each other, because of the frequency difference, and the wireless network itself has a total of 12 channels available for adjustment, natural disturbance phenomena do not have to worry about.

6. What is ISM band?

ISM band, divided into industries (902-928MHz), scientific research (2.42-2.4835GHz) and medical (5.725-5.850GHz)---by United States Federal Communications Commission (FCC) allocation of having to permit radio frequency band (power cannot be more than 1W). Recently (1997.1) approved for wireless LAN (WLAN) is a medical band.

7. What is a spread-spectrum (SpreadSpectrum)?

Spread spectrum technology is divided into 「introduction frequency hopping technology "and" direct sequence 」. While the two technologies is in the second world war the army use of technology, it is hoped that in the worst war environment, still able to maintain a communication signal of stability and security. For a non-specific receivers, arising beating SpreadSpectrum signals on it, only be impulse noise. So on the whole is a more secure communication technologies.

8. What is the frequency hopping (Frequency-HoppingSpreadSpectrum)?

Frequency-hopping technology (Frequency-HoppingSpreadSpectrum; FHSS) in sync, and at the same time to accept both ends to a specific type of narrowband carrier to transmit signals for a non-specific receivers, FHSS beats produced by signals on it, only be impulse noise. The signal is FHSS may be designed to avoid noise or One-to-Many distinct channels and the frequency hopping signals must comply with the requirements of the FCC, to use more than 75-hopping signals, and frequency-hopping to the next maximum interval (DwellTime) to 400ms.

9. What is a direct sequence spread spectrum (DirectSequenceSpreadSpectrum)?

Direct sequence spread spectrum (DSSS DirectSequenceSpreadSpectrum;) is the original signal "1" or "0", with more than 10 chips to represent the "1" or "0" position, allowing the original higher power, narrower frequency becomes more broadband low-power frequency. Each bit use how many chips called Spreadingchips, a higher Spreadingchips can increase resistance to noise, and a lower SpreadingRation can increase the number of users. Basically, in DSSS SpreadingRation is quite low, e.g. in almost all 2.4GHz WLAN product are less than 20 SpreadingRation. In IEEE802.11 standard, its SpreadingRation only 11, but the FCC's regulations must be greater than 10, and, best of SpreadingRation around about 100.

10. wireless networks can cover the extent of?

General wireless networks can cover the scope appropriate to the environment is open or not, if no external antenna, in the field of vision and of about 250M, if in the case of half-open space, there is a compartment of the region, about 35 ~ 50M around, of course, if the external antenna, a distance of up to more distant the relationship to the gain of the antenna itself, therefore depends on the customer needs to be planned.

11. wireless network to use confidentiality?

Basically GEMPLEX of wireless network technologies-DSSS system itself has the function of anti-eavesdropping, plus information on encryption (WEP40bits) of dual protection, so its security is quite comprehensive.


【 Weak current College 】 XP everyday experience skills (1)


1. How do I empty the page file when system shuts down open Control Panel, click Administrative Tools → local security policy → local policies → security options, double-click the shutdown: clear virtual memory page file ", click the pop-up menu of the enabled option, click OK.

2, how to configure WindowsXP services

If you are in the stand-alone use WindowsXP, so many service component is not needed, extra services that impact the speed of the system, you can use these extra services component is disabled. Click Start → Control Panel → Administrative Tools → Services ", a pop-up list of services, some of the Services window has already started, others not. We can see the appropriate service project description, the services do not need to be closed. Such as Alerter ", if you are not connected to the LAN and do not need to manage alerts, you can turn it off.

3. What is the role of Smartdrv program

Phenomenon: in many presentations on WindowsXP installation are mentioned in the article: "If in DOS install WindowsXP is very slow, is definitely not run Smartdrv.exe before installation. I would like to ask what the Smartdrv.exe files specifically how to use the supervisory??

Smartdrv.exe this file for familiar with DOS friends must be very clear that the main role is as a disk file read-write cache increase. We all know memory read and write speeds much higher than the disk, if the memory as a disk read-write cache can effectively improve the efficiency of the system is running. Smartdrv.exe this file in the Windows versions of the installation CD or hard disk Windows/command/RI, only several dozen KB, the file is copied to a floppy disk, start the system directly to run this program (you can not add parameters, the program will automatically assign the appropriate based on memory size of the memory space for cache), and then install WindowsXP. Also remind you that this program after you install Windows, do not run, or else Windowswill reduce the available memory.

4. What is a Win32k.sys file

Phenomenon: I've just installed WindowsXP, but the next reload duba has found a virus that is located in a Win32k.sys file F:WINNTSYSTEM32, delete and not delete, quarantine and no, Windows98 or DOS by deleting leads to WindowsXP is not started.

This file is a multiuser management WindowsXP drivers. In this directory have X:WindowsSystem32Dllcache file backup. As long as the backup copy to X:WindowsSystem32 substitute carrier file. Do a Windows98 Startup disk, and copy Attrib.exe files on floppy disks, this file is installed with Windows98 machine X:WindowsCommand directory. In the BIOS boot order in the AdvancedBIOSFeatures adjusted to start from A disk, DOS, enter Attrib-s-h-rwin32k.sys X:WindowsSystem32 directory, enter, and then enter enter X:WindowsSystem32dllcache directory, then use the same command copywin32k.sysX: windowsSystem32 to overwrite the file, and then restart it.

5, WindowsXP boot menu what meaning

Phenomenon: recently I installed WindowsXP OS, I know that pressing the F8 key during startup or when the computer does not start correctly, you will enter the WindowsXP-initiated the Advanced Options menu, where you can select normal startup out of 8 different mode boot WindowsXP. I ask these models represent what does it mean?

(1) security mode: choose the safe mode boot WindowsXP, the system only uses some of the most basic files and drivers to start. Enter safe mode is a troubleshooting an important step. If safe mode startup cannot determine the problem, or simply unable to boot in safe mode, then you may need to use the emergency repair disk ERD feature to repair your system.

(2) network security model: and security model is similar, but adds support for the network connection. In LAN environments solving WindowsXP-boot failure, this option is very useful.

(3) the safe mode command prompt: also and security model is similar to using only basic files and drivers boot WindowsXP. But after login screen command prompt appears, instead of the Windows desktop.

(4) enable boot logging: boot WindowsXP, at the same time by the system to load all of the driver and service logging to a file. Filename is the ntbtlog.txt, located in the Windir directory. The log to determine the exact cause of the startup problem.

(5) enable VGA mode: using the basic VGA driver starts the WindowsXP. When you install the WindowsXP doesn't start of a new video driver, or due to improper refresh frequency setting of a fault, this mode is very useful. When in safe mode boot WindowsXP, use only the most basic video driver.

(6) the last known good configuration: select use' The last known good configuration ' boot WindowsXP "is resolved such as a newly added driver and hardware problems such as do not match. In this way start, WindowsXP only restore registry keys under. HklmSystemCurrentControlSet Any other registry key changes are unchanged.

(7) the directory services restore mode: does not apply to WindowsXPProfessional. This is an operating system for WindowsXPServer and only used to restore the Sysvol on the domain controller and ActiveDirectory directory services directory.

(8) Debug mode: boot WindowsXP, at the same time place debug information through a serial cable to another computer. If you are using, or have used, remote install services on your computer, install WindowsXP, can see and use the remote installation service recovery system-related additional options.

6. How can I completely remove XP

Phenomenon: I installed WindowsMe and WindowsXP dual system is FAT32 format. C tray WindowsMe, E tray WindowsXP. Yesterday, WindowsXP system lost SYSTEM32.DLL, start it. So I enter WindowsMe system, E-direct delete WindowsXP. However, each boot appear more system start menu, choose. How can I completely remove the XP?

With a piece of Me Windows9x/startup, in "A", enter "SYSC:" C transmitted back to plate system can be.

7, how to deal with WindowsXP cannot automatically shutdown behavior

Phenomenon: my WindowsXP sometimes does not automatically shut down the computer, what should you do?

After you install WindowsXP, some computers after you click turn off computer does not automatically turn off, and need a previous AT like manually turn off the power supply. This was mainly WindowsXP does not enable advanced power management. Correction: click Start → Control Panel → performance and maintenance → power options, in the power options Properties window, click Advanced Power Management "and check" enable advanced power management support.

8, how to create the lock my computer shortcut

Because in a hurry and need to leave, but you don't want to log off a computer system? you can double-click the desktop shortcut to lock the keyboard and the monitor promptly, and without having to use the Ctrl + Alt + Del "key combination or screen saver. How to: right-click on the desktop, and then on the shortcut menu that appears, point to new, and select the "shortcut". Then, the system will start the Create Shortcut Wizard. Click in the text box, enter the following information: rundll32.exeuser32.dll, LockWorkStation, click Next. Enter the shortcut name. You can set "Lock Workstation" or choose your favorite any name, click Finish. You can modify the shortcut icon (my favorite one is provided by the Shell32.dll padlock icon). If you need to modify the shortcut icon, do the following: right-click the shortcut, and then on the shortcut menu that appears select "Properties". Select the shortcut tab, and then click the change icon button. In the following file to find the icon in the text box, enter the Shell32.dll, click OK. From the list, select the desired icon, and click OK. You also can provide a shortcut to specify a set of keyboard shortcuts, such as "Ctrl + Alt + L. Although this approach can help you savea keystroke, but makes the operation more convenient. If you need to add a shortcut key combination, please do the following: right-click the shortcut, and then on the shortcut menu that appears select "Properties". Select the shortcut tab, in the shortcut key text box, enter any key values, and WindowsXP will convert it to a shortcut key combination (usually Ctrl + Alt to take arbitrary keys +). If you wish to lock the keyboard and monitor, simply double-click the associated shortcuts or use the shortcut keys that you define.

9. How can I adjust the desktop icon color quality

On the desktop, right-click the blank space in the open the display properties dialog box, select the "settings" tab, "color quality drop-down list you can adjust the color quality of your computer. You can edit the registry to resize desktop icons color quality, specific action steps:

Open the registry editor, enter HKEY_CURRENT_USERControlPanelDesktopWindowMetrics subkey branch, double-click the key value, in ShellIconBPP open the Edit String dialog box, the value data text box shows the desktop icon color parameters, the system default icon color parameters is 16. Here the available color parameters including: 4 indicates that 16 colors, 256 colors 8 indicates that 16 said 65536 color, 24 indicates that 16 million colors, 32 represents a TrueColor (true color). You can do not need to select and set your desktop icon color parameters. Click OK to close the Edit String dialog box. Log off the current user and restart the computer after the settings to take effect.

On the desktop, right-click the blank space in the open show caseProperties dialog box, select the appearance tab, here you can easily on the entire desktop, Windows, or other items, the size of text and icons.

However, this method sets the icon size limitations, for example, a user can only select system already provides desktop size, neither arbitrary sets the size of desktop icons. If you wouldlike to freely on the desktop icon is resized, you can do so by editing the registry. Specific action steps: open the registry editor, enter HKEY_CURRENT_USERControlPanelDesktopWindowMetrics subkey branch, double-click the key value, in ShellIconSize open the Edit String dialog box, the value data text box shows the desktop icons size parameters, the system default 29, the user can according to their own need to set the parameter size (parameter, the larger the desktop icons also bigger), and then click OK to close the Edit String dialog box. When you log off the current user and restart the computer after the settings to take effect.

Weak current College】 【interpretation of distributed firewall - skills (2).



5. the basic principle of distributed firewall
Distributed firewall still interpreted by the Center, but by each distributed across a network endpoint to implement these strategies developed. It relies on three major concepts: what kind of connection instructions can be allowed to ban policy language, a system management tool and IP Security Protocol.
There are many kinds of policy language, such as the KeyNote is a common policy language. In fact, as long as the choice of language to easily express the need to adopt specific strategies which language does not primarily, the real key is how to sign internal hosts, obviously should not be using the traditional firewall with port on the physical implementation of logo. The IP address to sign internal host is one of the main points, but it's security is not high, so I tend to use IP Security Protocol password credentials to sign each host that hosts provide reliable, unique logo, and the network's physical topology.
Distributed firewall server system management tool for the formation of a policy file will be distributed to all firewall protection, you should keep an eye on the host is here refers to the firewall is not a traditional sense of the physical firewall, but logically distributed firewall. IP security protocol is a TCP/IP protocol family network layer encryption to safeguard mechanisms, including the AH and ESP, respectively on the IP header and an entire IP packet performing certification, can prevent various host attacks.
Now we look at distributed firewall works.
First of all by setting firewall access control center through the compiler will policy language v. description into the internal format, form the policy file; and then Center system management tools make policy files distributed to each host "internal"; "internal" host will be two ways to determine whether or not we can accept receipt of the package, on the one hand is based on the IP Security Protocol, on the other hand is based on a policy file on the server side.
6. the main features of distributed firewall
The above describes a distributed firewall features and advantages, so really what this firewall? because the software forms (a adopted software + hardware), so the function configuration more flexible, fully equipped, intelligent management ability in General can be reflected in the following aspects:
(1) Internet access control
Based on the workstation name, device properties such as fingerprints, using "Internet access criteria, control the workstations or workstation group within a specified time period will not be allowed to prohibit access to the template, or/list of URLs in the InternetWeb server, a user can access a workstation-based www server, and when a workstation/users achieve the required flow back to determine whether or not we can cut off the net.
(2) use access control
Through the network traffic from the link layer, network layer, transport layer, using layer based on source address, destination address, ports, protocol-layer packet filtering and intrusion monitoring, and control the use of from the LAN/Internet service requests, such as SQL database access, the IPX protocol access.
(3) the network status monitor
Real-time dynamic reports on the current network all users login, Internet access, intranet access, network intrusion events and other information.
(4) hacker attacks defense
Resist including Smurf denial of service attacks, ARP spoofing attacks, Ping attacks, Trojan horse attacks, almost 100 species originating from inside the network, as well as hacker attacks from the Internet.
(5) log management
On workstation Protocol guidelines log, log in to the event log, users Internet access log, fingerprint verification guidelines logs, intrusion detection criteria log records and query analysis.
(6) system tools
Including system layer parameters setting, guidelines, and other configuration information in the backup and restore, traffic statistics, template configuration, workstation management, etc.

【 Weak current College 】 wireless network loops into network access to the culprit



Unit A subnet network normally have been able to work properly, however I discovered recently A subnet workstations in the LAN Server not accessible units, after a careful examination, I see A subnet network new input using switch devices often connect the unit's core switch in LAN.

Taking into account the other subnet LAN workstations to function correctly, as this author believes that flat LAN core switch device is not present any problem, but A subnet network new input device is using the switch just unpack the equipment, the equipment appears the breakdown of possibilities is not very big, so I think is most likely A subnet new input switch equipment and units of local area network connection between the core switch fails. After careful investigation of the scene, I found A subnet of the new switch is using multi-mode fiber this media and LAN that is directly connected to the core switch, and use this medium to connect to a network connectivity failure occurs relatively small possibility that some; therefore I first thought of A subnet of the new switch would not have happened "soft" type of fault, the thought of this point, I restart a new switch device, wait until the device is restarted, the author attempted from A subnet to access LAN Server units resulted in the discovery of the symptom as usual. The author cannot be reconciled, and units of local area network core switch to restart it, and in the core switch startup process, the author carefully observed the switch status of the lights in the Control Panel, find the connection for A subnet that the new switch ports that lights blinking status for several seconds to immediately disconnect, a network connection line appears bad phenomenon?

No, I will again scepticism "sight" to the physical circuit connecting the media; because here is using the connection medium, fiber optic cable to the author by excluding method then click on fiber adapters, fibre splicing head ends, as well as fiber-optic trunk cable jumpers, and other factors by troubleshooting test, the results did not find any suspicious behavior, just for the above troubleshooting test, occasionally see A subnet new switches and LAN connectivity between core switches, but after a few seconds and immediately disconnected.

There may be A subnet of the new switch is not properly set up work parameters? considering this factor, I immediately pressed A subnet new switch control panel restore button, the device parameters all return to the default factory values, then the proper way to reset the network parameters, and perform the save operation and restart at A subnet of the new switch device. Thought this new switch resets, network access to the fault can be automatically eliminated, but when I once again from A subnet of a workstation to attempt to access LAN Server, the unit I found A subnet is still not able to properly access unit LAN Server.

In despair, I happened to see A subnet of the new switch has a fibre optic jumper as if there is a problem, so I stuck to this root jumper pulled down, while carefully observed the new switch control panel lights work status, found and local area network core switch that is directly connected to the port State should correspond to the work resumed, this time try from A subnet to access LAN Server units, network access has been properly. In order to confirm A subnet workstation cannot access unit LAN server failure whether it is from this root jumper, I again will it reconnects to A subnet of the new switch and found as long as connected to this root jumper, the new switch control panel Link port light is in rapid blinking status, not for a few seconds, the corresponding port lights are automatically turned off, at which point we will find A subnet workstation will not be able to access LAN Server units.

According to the above symptoms, I unhesitatingly believe this jumper is sins of a network failure, so the author named Samuel began to look closely at this root jumper and the jumper is connected to the network device. As a result, I see this fiber jumpers and another switch Gigabit module is connected to; take a look at another switch, the author has seen two wireless AP device while connected to the switch device, both the wireless access point equipment in any server moved, A subnet workstation immediately can properly access LAN Server units. It is obvious that the fault caused the network access to the real cause is actually the two wireless access point devices.

After further investigation, I see the two wireless AP mode in accordance with the principle of the device should be set to work mode, but the AccessPoint not know how it happened, I find a wireless access point devices work mode has been modified to work in mode AccessPointClient. In that case, and the same switch devices directly connected to both wireless AP device imperceptibly and formed the wireless bridge network, the network has led to A subnet in network loops, it is this network loops caused A subnet workstations in the LAN Server not accessible units.

Small Tip:

Through the above failures, it is not difficult to find the network wiring is how important. From the face of it, network wiring seems very simple, in fact, it is very advanced, practical, confidentiality, security, and reliability, it is a systems engineering. Only the network cabling with the full understanding that can lead to sufficient attention to the actual wiring process are willing to invest, so that the network cable layout more systems, specifications and reasonable. Only the system and network cabling to ensure communication network of flexible extensibility and subsequent smooth upgrade, you can greatly reduce the workload of network maintenance in the future, in particular to a significant reduction in continuous investment in network maintenance costs. Network cabling is for the entire communication network system build a transmission performance goodNetwork platform, the use of the network platform, ensure that the entire communication network system has a certain maturity, flexibility, openness, interoperability, security, as well as a very good price-performance, for example, on the whole floor or whole buildings system wiring, as long as reasonable planning, allocation of staff resources, the network traffic maintenance costs reduced to the original half.

On the network cable to the system layout, you can use of common standards for cross edge system, to easily and quickly on a network device layout, installation, testing, debugging, thereby making networking units on the network-building investment to obtain ideal efficiency. Through a systematic and structured manner, network cabling, network form a diversified features star physical structure that can apply to almost all kinds of different topology requirements to guarantee the formation of a good network has a wide range of applicability. Because this kind of network structure, easy maintenance and extended upgrade, just some of the network node, with some local variations, almost without moving any cable and equipment.

In addition, in the planning layout, you should follow the principles of progressiveness and practicality to; network wiring in the various technologies involved, should adopt open standards to ensure that your network system facilitate interconnection and extended; of course, in order to guarantee the future of good scalability, we should also use the routing process, selection of standardized design of the standardization of network equipment and products; in order to ensure that the network of serviceability, network wiring in our planning, we should try to use modular design principle, take full account of the hierarchical network maintenance, visualization, ensure that network maintenance simple and easy.