Windows XP is anoperating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, and media centers. It was released in 2001. The name "XP" is short for "eXPerience."[3] Windows XP is the successor to both Windows 2000 Professional and Windows Me, and is the first consumer-oriented operating system produced by Microsoft to be built on theWindows NT kernelandarchitecture. Windows XP was first released on October 25, 2001, and over 400 million ...
Abstract-New networking protocols are desired essentially in future Optical Wide Area Network (OWAN) environments to meet increasing demands of communication with low latency and high bandwidth. In this paper, a simulation study based on 100 nodes random topology is conducted to observe packet delay patterns and efficient link utilization for two session traffic sources Exponential and CBR (Constant Bit Rate), with number of wavelengths (16, 32, 48 and 64) while varying packet sizes ranging f...
One of the corner stone's of object-oriented programming is inheritance because it creates a different classifications of hierarchical. To make unique the few other specific classes whenever the class is inherited. Super class is called whenever a class in inherited. And the class which is not inherited is named as sub class. Her it is clear that sub class will appear by super class means specialised version. In this type of version its add unique elements whenever an methods and instance var...
Infrastructure less networks has found their significant place in the recent trends of engineering and technology. The research issues and challenges are paving the ways for the excellent research opportunities. In general, in wireless networking there are two main architectures: infrastructure (single-hop) networks and mobile ad hoc (multi-hop) networks. Even though users can handover between base stations or access points and roam among different networks, the conceit of mobility is limited...
You are working in the IT department in an organization and responsible to design a network system for the organization. Do a research on the types of network topology available and identify the network topology that you would recommend to the management. Give the reasons to support your recommendation. The transmission media that are used to convey information can be classified as guided or unguided. Guided media provide a physical path along which signal is propagated; unguided media employ...
Introduction Shopping on Internet is a web portal that concentrates on the arteries of a commercial transaction, which is properly established for the customers. The application helps to impose the standards and strategies that are put forward from the actual world with the use of the electronic media. The purpose is designing the portal, as the present system is to improve the accessibility for customers for fulfilling their needs, as per the required transactional state. The customer can re...
1. What are the benefits of configuring mail on database. Database Mail, a new addition to the SQL Server 2005 database engine, is as simple to use as it is useful. Destined to be the replacement for SQL Mail, Database Mail uses a Simple Mail Transfer Protocol (SMTP) server to send e-mails rather than using the MAPI accounts that SQL Mail required. This allows your organization to send e-mails with attachments, e-mail query results, attach query results, and format HTML e-mails. It also gives...
Although most of the people think that there is nothing to do a research in the area of computer virus protection, there are more and more things to research as everyday more than 200 computer malware are created by the virus creators. In the modern world most of the people are using computers in their day-to-day activities. So it is more important to have knowledge of computer viruses and protecting the computers from those viruses. \begin{sloppypar} \end{sloppypar} Identifying what the comp...
There are many articles about IP v 4 and IP v 6 internet protocol and mostly of articles describes IPv6 more secure internet protocol, but I came across with one article from Cisco and my work I'd like start from not very positive view of IP v6 and later on to find out is the IPv6 more secure or not… IPv6 security is very similar to IPv4 security. Mechanism which transporting packets in network is almost the same. The mostly unaffected layer is upper layer which is responsible for transport...
The goal of this paper is to study the use of mobile devices in health care sector. Mobile technology helps to swiftly access information, help in patient safety, reduce cost and improve workflow to make efficient decisions. Mobile Devices provide remote access, portability, and connectivity which was not available in traditional computers. Mobile devices can be used in various forms like SMS alerts and reminder, use of RFID to decrease medical errors, manage assets and patients, identificati...