ABoUt ThIs BLoG



Hi..... i am a guy just like u....i am wokin and learnin...normal.. i use internet for many things ..i searched for many tutorials ..movies..the problems i faced....etc ........now i want to share the things with the world....so here i am posting every thing i searched and collected from internet some thing like

       

   

IBM TIVOLI STORAGE MANAGER- INTRODUCTION

In today's on demand world, the performance and availability of your storage environment can either enhance or hamper your business processes. Compliance with legal, governmental, and other industry specific regulations, is also driving new data retention requirements. Because data is a critical component of your business, efficiently managing the growing amounts of information is key to competing and winning in the on demand world. Industry analyst research indicates that disc storage is growing about 40% per annum. Growth in enterprise data requirements should be similar.

Complex business environments need better capabilities to manage data availability and costs as well as providing the ability to recover from disasters. Improving data and application availability, optimizing storage resource utilization, and enhancing staff productivity, all while reducing IT costs, are core needs of most organizations.

Organizations are increasingly concerned with disaster recovery. But what constitutes an information technology disaster? A fire in the datacenter? A hurricane? An explosion? Or it could be something far less spectacular, like a corrupted file. Even something as common as a disk crash could be a disaster if it happens on the CEO's laptop the morning of a crucial investor presentation. Business executives confront continually increasing business complexity, and the rising cost of backing up their business critical applications and recovering from disasters. Users experience increased down time when restores, retrieves and recoveries cannot be completed quickly. Valuable IT resources are devoted to time consuming manual data backups and restores, archives and retrieves, and recoveries in multiple application environments. And IT administrators are concerned with the time required to perform backups and recoveries with available resources.

The following scenario shows you a day in the life of Jen, a manager who is responsible for IT Continuity Services for a mid sized manufacturing company. The IBM Tivoli Storage Manager family of offerings provides Jen with the building blocks to address her IT needs by providing a full range of flexible capabilities including data retention management for regulatory compliance, hierarchical storage management for cost effective storage, archive management for effective access to active and inactive data, and backup and recovery management to mitigate the potential for data loses.

Jen is awakened at 3:00 am by a phone call from the third shift Director of Operations, Bryan. A critical database server is down and Bryan tells her he has no access to customer's orders or inventory data, so production is in jeopardy.

Jen then calls Peter, the onsite IT Operations Manager. Peter says he has to install a new server before Jen can start the data restore, which will take a while. Jen tells Peter that she has a much better solution. With TSM for Sysback, they can do a full bare metal restore of that server in a flash! Jen tells Peter to do a Flexible Sysback restore, by booting the new server from the TSM for Sysback server, which gives the new server all the same configuration, operating system and applications, exactly like the one that crashed. Peter then calls Jen telling her the server is ready and connected to the network.

Jen logs into the Tivoli Storage Manager from her home computer. As Jen logs onto the Tivoli Storage Manager Administration Center with its new Health Monitoring, she has a single visual status of all the company's Tivoli Storage Manager servers. Jen then starts the recovery of the database and monitors its progress. She also has access to the activity log, and sees the message that TSM finished the recovery process from the storage copy pools.

Jen is able to see that the restore is successful and that the database is up and running. She calls Bryan, the Director of Operations, back within the hour to inform him that all production systems have been restored and customer data is secured and available. He is incredibly relieved! Using Tivoli Storage

Manager, all of the data was protected and has been restored, beginning with the most critical data. Jen never even had to go into the office.

IBM's Tivoli Storage Manager addresses these needs across your organization. For business units dependent on data availability and rapid application data recovery, Tivoli Storage Manager provides extensive application integration to enable comprehensive and accurate data protection. For storage managers and administrators responsible for protecting enterprise data while containing cost, Tivoli Storage Manger's highly automated, centrally managed solution, simplifies heterogeneous storage management while optimizing storage and network resources. And for IT Operations managers and administrators responsible for making sure all servers are up and running, TSM for Sysback allows for recovery of all or part of the system, and is flexible enough to allow a system installation image from one system to be installed onto another system with either identical or different hardware configurations.

Tivoli Storage Manager scales from small to very large installations. It offers management from PCs through Unix servers, all the way up to mainframes. It has support on over thirteen different operating environments. TSM has been around for over ten years, and currently protects millions of computers worldwide. Tivoli Storage Manager is built for smart backups and quick restores. With Tivoli Storage Manager, you can choose to never do periodic full backups again. Its advanced technology lets you continually backup only new or changed files. This reduces backup time, network traffic, and storage requirements. Tape collocation and reclamation also sets Tivoli Storage Manager apart from the rest.

To find out more about what Tivoli Storage Manager can do for you and your storage infrastructure, go to www.ibm.com/tivoli/storage or call your IBM or Business Partner representative.

GSM Vs CDMA

To Understand this post prefectly please read the previous post. In this post we are comparing the both CDMA and GSM technologies in various aspects:

SIM(Subscribers Identity Module)
GSM: The phones using GSM techonology uses SIM cards by which we can easliy activated , swapped  and interchanded , You can easly upgrade or change your handset just by swapping the SIM card of your phone no an another.SIM card is directly connected to the network.SIM card also have some memory in which your can store your contact numbers and messages you received.

CDMA: The phones using CDMA technology uses R-UIM card which can be swapped only between some handsets which supports CDMA technoloy.Some phones regarding CDMA work without  UIM cards , only operator can change your number, In this type you have a option of saving your contact details with the operator and retrive them when you change your handset or your handset is lost.

DATA TRANSFER

GSM: GSM uses two different technologies First one is EDGE(Enhanced Data rates for Gsm Evolution)  which gives a average speed of 70-140kbps and the second one is GPRS(General Packet Radio Service).

CDMA: CDMA uses EVDO(Evolution Data Optimized) technology for data transfer which gives a average speed of 300-700kbps.

GLOBAL TRAVELING 

GSM & CDMA: When international  travel is an issue, GSM leaps forward in the race for the title of “Most Accessible.” Because GSM is used in more than 74% of the markets across the globe, users of tri-band or quad-band handsets can travel to Europe, India, and most of Asia and still use their cell phones. CDMA offers no multiband capability, however, and therefore you can’t readily use it in multiple countries.


What is CDMA and GSM?-- Mobile phones

Hi , this is ravi, for many days i used to have a doubt in my mind about the difference between CDMA and GSM mobiles. The only difference i know was CDMA mobiles dont have sim card and GMS do.
 
*In this post i would like to share the differences , advantages between CDMA and GSM.

*First thing first , CDMA  and GSM are not mobile models  and not the names of the moblie network providers.They are network techonologies that carry voice signal across network.

In our world celluar service there are two main competing network technologies:
 
1) GSM   - Global System for Moble communications. or (TDMA).
 
2) CDMA - Code Divison Multiple Access.
___________________________________________________

GSM : GSM is a "branded" term referring to a particular use of TDMA(Time Division Multiple Access) technology.(GSM)Global System for Mobile communication is an international organization founded in 1987 which is dedicated to developing , providing , overseeing the worldwide wireless standard of GSM.This is the leading techology used around the globle in more than 100 countries .GSM operates in four seperate frequencies. 900MHz and 1,800MHz bands in Europe and Asia and 850MHz and 1,900MHz(1.9GHz) bands in North America and Latin America. This technology allows you to send digital data and allows several callers to share the same channel at the same time.

CDMA : CDMA (Code Divison Multiple Access) is a proprietary standard designed by Qualcomm in the UnitedStates and has been dominant network standard for North America and parts of Asia. Unlike GSM/TDMA  CDMA spreads data out over the channel after the channel is digitized.Multiple calls can then be overlaid on top of one another across the entire with dedicated sequence code to keep the signal distinct.CDMA was actually invented for military during World War II for field communications.




World Wide Web(www) Terminology - WWW in a nutshell

Hi, this is Ravi. In this post I am going to present you  about the basics and terminology of Internet and World Wide Web (www).

 --> For better understanding please read the previous post(Difference between internt and www)

 --> To make this post unique apart from others I would like to make it Small and Simple.

 -->  I can assure you that after reading this post you will gain good knowledge of  Internet and     World Wide Web  terminology which helps you to read any kind of article regarding WWW in WWW. 

 --> Here I am  giving just 10 WORDS  with some explanation which gains you a brief knowledge about internet.


 TEN Terms that makes you familier with Internet


  1. INTERNET: The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).

 

  1. WWW: WWW stands for World Wide Web which is most often called as web is a system of interlinked documents accessed via Internet through HTTP.

 

  1. WEB-PAGE: All the information that we want to share in the internet is stored in the documents usually written in (X)HTML –Hyper Text Markup Language, accessible via HTTP.

 

  1. WEB-SITE: A collection in webpages , images ,videos and other digital entities usually addressed with one name , which is called name of the website.

 

  1. WEB-SERVER: The webpages and are stored in a server called Webserver , websites are hosted on one or more web servers.

 

  1. WEB-CLIENTS: Computers or users who are reading the webpages and websites form the webservers are called webclients, (we are webclients).

 

  1. WEB-BROWSER: Web clients like ourselves uses a software program to view the websites ,This software is called webbrowser. Widely used webbowsers are Internet Explorer ,Mozilla Firefox ,Opera , Google  chorme etc,.

 

  1. HTTP: Hyper Text Transfer Protocol is the communication protocol or one of the languages used over the internet for communication. It is used for retrieving the interlinked text documents which let to the establishment of World Wide Web. A         web client makes an HTTP request using a web browser to which an HTTP response is sent from the web server. 

 

  1. ISP: ISP stands for Internet Service Provider a company, which provides home and business users with an access to the Internet, is known as an Internet service provider or Internet access provider, these days there are WISP’s Wireless Internet Service Providers.

            Most popular ISP’s are : BSNL,AIRTEL, etc.

               

  1. URL: An Uniform Resource Locator (URL) is the term used to identify an Internet resource of information , and can be specified in a single line of text.

            Ex: http://www.ravimisc.blogspot.com


Difference between Internet and World Wide Web(www)





HOME

Difference Between INTERNET and WORLD WIDE WEB

Firstly I would like to drag out of the illusion that INTERNET and WWW are not synonyms. Internet and www are not same be clear on that.

INTERNET : This is a huge network of networks that connects millions of computers to form a global network in which each and every computer can communicate with each other,Information travels over the internet via many languages called protocols.

WWW : World Wide Web or simply Web is way of accessing the information over the medium of internet , This is a information-sharing model that is built on the top of internet, Web usesHTTP protocol one of the languages spoken in internet to transmit data. Internet is not only used by Web, It is used for e-mail which uses SMTP protocol and is used for transferring files which uses FTP protocol.

The Web is just one of the ways that information can be disseminated over the Internet.

HOME

Desktop Virtualization

What is Desktop Virtualization?

Introduction:

Installing and maintaining separate PC workstations is complex, and traditionally users have almost unlimited ability to install or remove software. Corporate information technology departments, and users have therefore often used Terminal Services or Citrix's Presentation Server to provide a stable, "locked down" desktop environment out to the user, who could be either using a regular desktop PC, or a small, quiet and robust thin client.

Desktop virtualization provides many of the advantages of a terminal server, but (if so desired and configured by system administrators) can provide users much more flexibility. Each, for instance might be allowed to install and configure their own applications. Users also gain the ability to access their server-based virtual desktop from other locations.

Definiton & Explanation:

Desktop virtualization or virtual desktop infrastructure (VDI) is a server-centric computing model that borrows from the traditional thin-client model but is designed to give system administrators and end-users the best of both worlds: the ability to host and centrally manage desktop virtual machines in the data center while giving end users a full PC desktop experience

  The user experience is intended to be identical to that of a standard PC, but from a thin client device or similar, from the same office or remotely.

    Many commercial solutions also add the ability to switch some incoming client sessions (using connection broker software) towards traditional shared desktop systems such as Microsoft's Terminal Services or Citrix's application servers, blade servers or even to individual unused physical desktop computers.

About Pano logic



What is Panologic?

Pano Logic, Inc. is a privately funded company, developing virtual desktop products and solutions supporting hypervisor agnostic server virtualization solutions such as those distributed by VM ware, Inc. The company has its headquarters in Menlo ParkCaliforniaUnited States, with sales and engineering offices located in Menlo Park; and in TorontoCanada.

 

About Pano Logic

Time to rethink the desktop

Today's PC architecture does not take advantage of the benefits of virtualization. Over the last five years, server computing has been revolutionized through virtualization, both reducing operating costs and creating valuable new capabilities. Pano's vision is to use server-based virtualization to bring the same level of value and innovation to the desktop. In doing so, Pano has taken a "clean slate" approach to designing a new desktop computing model. This next-generation architecture requires not only virtualization, but also a completely different desktop device. The result is a radically different architecture that makes IT more effective and gives users a superior Microsoft Windows™ experience.

Server-based desktop virtualization is widely heralded as the "next big thing in virtualization". Citrix recently acquired start-up XenSource for $500M in pursuit of this market; Microsoft has recently announced new licensing schemes for server-hosted desktops, along with its intention to aggressively support this new model; VMware, the market leader in server virtualization, is aggressively developing this market with its Virtualized Desktop Infrastructure (VDI). But there remains a problem: the existing desktop PC and thin client architectures were not designed for this new model of server-based desktop computing. Worse, these legacy architectures defeat the benefits of desktop virtualization. If the desktop is running on the server, why place another operating system on the desktop just to connect to the server?

Pano's innovation: The all hardware, no software desktop

Pano's solution to the unnecessary desktop software is a 100% hardware client that has no CPU, no memory, no operating system, and no software, so it requires zero maintenance and has no security risks. Combined with server-based virtualization, Pano delivers a superior Windows experience.

Ref:www.panologic.com                                                                     



How pano works

What Makes Pano Different

Desktop PCs Today: A Major Management Problem

Desktop PCs today are complex stacks of multiple hardware components, operating systems, drivers and applications. Maintaining and managing this hardware and software consumes more than 70% of the TCO of a typical PC, and it represents the bulk of the workload of helpdesk staff.


The New Desktop

Many solutions have been proposed to reduce the cost of desktop complexity, but none takes the radical approach of Pano Logic's purpose-built desktop virtualization solution: moving the PC and all its software off the desktop and into the data center.

Leveraging virtualization and today's fast networks, Pano Logic's unique design places a small device-the Pano-on the desktop to connect the monitor, keyboard, mouse, and USB peripherals to Microsoft Windows XP or Vista running on a virtualization server in the data center.


Users rely on the same hardware they've always had-their existing display, keyboard, mouse, and USB devices-which are now attached via the Pano to a virtual PC running on the server inside the data center. This architecture makes better use of hardware, eliminates software from the client endpoint, and centralizes the management of desktops.

The Pano Management Server, which sits between the Pano and the virtualization server, enables administrators and IT staff to enforce security and access control, including use of the USB ports. IT can configure virtual machines for groups of users or individuals; roll out updates, upgrades, and patches seamlessly; and perform backups of all PCs on their own schedule.


Pano has a single button-the Pano Button-that gives users access to numerous self-help options, which are simply not available on desktop PCs: users will soon be able to go back to an earlier working configuration of their applications, or pick other options configured by the IT administrators.


This out-of-band, self-help, self-service option enables users to resolve by themselves most of the common problems for which they previously relied on support staff, helpdesks, and system administrators.

Pano's unique approach is driven by these guiding principles:

  • Move all desktop software to the server
  • Deliver a complete solution that removes all barriers to getting started
  • Empower users with self-help capabilities

Pano's approach results in a 70% reduction in desktop costs and elimination of security risks at the desktop while giving users a superior Windows experience.

Ref:www.Panologic.com

                                                                                  


The Pano Device

The Pano Device

The Pano device is a zero client- no CPU, no memory, no operating system, no drivers, no software and no moving parts. Pano connects keyboard, mouse, display, audio and USB peripherals over an existing IP network to an instance of Windows XP or Vista running on a virtualized server. Pano is power friendly, consuming only 3% of the energy consumed by a traditional desktop computer.

The Pano is compact, power efficient, and works with all desktop peripherals.

The Pano can be viewed as using the IP network as an extension that connects all desktop peripherals to the virtual machine running on the server.

Getting started with a Pano

To deploy a Pano device, simply connect it to peripherals, network and power. There is no configuration to perform, no firmware to update, and no software to download.

As soon as a Pano is connected to a network, a logon screen appears. Users enter their Windows credentials and are automatically connected to their virtual machines. From there on, it's the same Windows experience.

Using peripherals with Pano

Pano can support a video display, keyboard, mouse, additional USB peripherals, plus external audio speakers or headphones.

Supported PeripheralsConnectors
Video display (resolutions up to 1600x1200)One RJ-45
USB peripheralsThree USB 2.0
Video display (resolutions up to 1600x1200)One VGA
Audio OutInternal speaker
Audio OutOne mini-jack
Audio IntOne mini-jack

Peripherals attached to the Pano device operate the same way they do when attached to a traditional PC. For instance, when users want to read data from CD, they simply attach an external CD reader via one of Pano's USB ports. If the user is authorized to use the peripheral, the CD drive will appear to Windows as if it was locally attached. The only drivers that are used are the peripheral's native drivers, and these drivers only need to be installed on the Windows virtual desktop, not on the Pano.

Security and the Pano

The Pano is secure because it does not run an operating system or any other software. Because there is nothing in a Pano that can be infected by a virus or have malicious code installed, it doesn't need to be scanned for vulnerabilities or exploits.

Even when a peripheral such as a USB thumb drive is connected, Pano remains secure. Peripherals work only when the user is authorized via policies enforced by the Pano Management Server. If the user isn't authorized, Windows doesn't even see the peripheral that is connected to the Pano. If a user is authorized, the peripheral is connected directly to Windows. Pano enforces fine-grained access policies based on user group membership, USB device class, and operation. As an example, a user may be authorized to read from a CD, but not write to it. This policy allows users to copy files or load software onto their virtual desktop, but prevents data from leaking out. Even when users are authorized, Pano can record USB operations so that the business can keep track of all its information assets.

Ref:www.panologic.com

what is font subsetting?

About this post
       Hi ...This is ravi....... I came to know about this topic when i was trying to convert a pdf file (Portable Document Format) to doc file(Microsoft Word Document) , I downloaded many converters like (pdf to doc converter) but i was not sucessfull, After that i downloaded some pdf editors like (Foxit pdf Editor) to do some changes...i was sucessful in editing the pdf file but i was not able to convert it sucessfully, When i tired to convert i  was getting some weird font in my Microsoft Word document .
    After all this effort i came to conclusion that i should figure out  the reason for my failure...then while editing in (Nitro pdf professional) i came to know that there will be a option while creating a pdf that option is called (FONT SUBSETTING) this option is provided by the Adobe acrobat distiller while making a normal document in to a pdf..
EMBEDDING AND SUBSETTING THE FONTS
Subsetting Fonts:If you subset the font, the person who receives your PDF would need to have your same font in order to make changes to your PDF. The file size of the PDF would also be smaller because you are embedding only part of a font. When you subset a font you usually just embed the characters you are using (obviously it depends on how you are subsetting your font).That's why somebody on another computer would have your same font in order to make changes.
Embedding Fonts: If you embed the whole font in the PDF, the person on the other end can make changes to it even if he didn't have your font, if he has the full version of acrobat or another program with the capability of modifying PDFs. The file size of the PDF would also be bigger because you are embedding the entire font
M0dification  Vs  View/Print:  There is  big difference between modification and view/print
the above topics will come to play when the context is modification. we can not change a PDF with font subsetting, but we can view them.If you embed your fonts properly and your fonts are not corrupted, then whether you subset the font or not will not affect the way somebody else can view or print your PDF.
Quick Reference:
--> Full Font Embedding = Larger file size
       Recipient doesn't needs the same font to view or edit the file
-->subset Font Embedding  = smaller file size
      Recipient doesn't need the same font to view but does need the same font installed in order to edit the file
-->No Font Embedding  = Small file size
      Recipient need to have same fonts installed

Classes of ip address

Class A - This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.

Network(n)

Host (h)                           

115.

24. 53. 107

Class A - 0nnnnnnn hhhhhhhh hhhhhhhh hhhhhhhh

1 -> First bit zero (0) ; 7 network bits(n) ; 24 host bits(h)

2 -> Initial byte: 0 - 127

3 -> 126 Class As exist (0 and 127 are reserved)

4 - > 16,777,214 hosts on each Class A

 ______________________________________________________

Class B - Class B is used for medium-sized networks. A good example is a large

college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.

Network(n)

Host (h)                 

145.24.

53.107

Class B - 10nnnnnn nnnnnnnn hhhhhhhh hhhhhhhh

1 -> First two bits 10; 14 network bits; 16 host bits

2 -> Initial byte: 128 - 191

3 -> 16,384 Class Bs exist

4 -> 65,532 hosts on each Class B

  _____________________________________________________

Class C - Class C addresses are commonly used for small to mid-size businesses. IP

addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.

Network(n)

Host(h)                            

195.24.53.

107

 

Class C - 110 nnnnn nnnnnnnn nnnnnnnn hhhhhhhh

1 ->First three bits 110 ; 21 network bits (n) ; 8 host bits(h)

2 ->Initial byte: 192 - 223

3 ->2,097,152 Class Cs exist

4 ->254 hosts on each Class C

  ______________________________________________________

Class D - Used for slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Network(n)

Host (m)                        

224.

24.53.107

 Class D - 1110mmmm mmmmmmmm mmmmmmmm mmmmmmmm

1 -> First four bits 1110; 28 multicast address bits(m)

2 -> Initial byte: 224 - 247

3 -> Class Ds are multicast addresses 

 ______________________________________________________

Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Network(n)

Host(r)                        

240.

24.53.107

Class E - 1111rrrr rrrrrrrr rrrrrrrr rrrrrrrr

1 -> First four bits 1111; 28 reserved address bits

2 -> Initial byte: 248 - 255

3 -> Reserved for experimental use

  ______________________________________________________

 

Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.

  ______________________________________________________

Default Network - The IP address of 0.0.0.0 is used for the default network.

  ______________________________________________________

Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.

 ______________________________________________________

Ip Address and its classes

About this post:
        Hi this is ravi again, I am now learning IBM Tivoli storage manager in an institute, while learning fundamentals for the course i searched for this topic called IP ADDRESS AND ITS CLASSESS  and another reason for searching for this is: I used to see different types of ip addresses in different places, I found the ipaddresses in my company as on type and other  in my institute.
so in the below artical i would like to explain the ip address and its different classes Note: i am not really good in my English.......so comment if there are any changes to be made
--> What is an ip address?
     An IP(Internet Protocol) address is an unique identification number given to a particular device or node present in a computer network. The ip address is stored in the memory in binary form but we can see that in decimal values each representing 8 bits, the range of each bit is 0 to 255 known as octets and these decimal values are separated by dot. so this notation is called "dotted decimal notation" .
 Ex: 151.124.200.222.
 In binary form it is 
      151       .    124         .      200       .      222  
 10010111 . 01111100 . 11001000 . 11011110
Every IP address has two parts 
 1)Network address

 2)Node/device  address

NEXT:Classes of IPaddress:

D.B.Cooper


Hi….This is one of the distinguished topic I am going to present here in this post, I came to know about D.B.Cooper when I was watching a famous TV series called Prison Break.

At first I thought the character was part of the script but when I saw a program in discovery channel about the unsolved mysteries I found out this man was real. I was very curious to know more about this guy so I browsed many sites and gathered some info. In this post I am going to present detailed information about D.B.Cooper his skyjack, plot etc and I hope this is going to be very interesting………

The case of D.B. Cooper is one of the most famous crimes in American history. It is also the only skyjacking in the world that has gone unsolved. Over the past three decades, the FBI has investigated nearly 1,000 suspects. They might as well be looking for Sasquatch. D.B. Cooper is folklore now. He’s inspired books, movies, safety regulations for airplanes, and treasure hunters. A bar celebrates the anniversary of his heist with a D.B. Cooper look-alike contest. Poems have been inked.. Songs too, like Chuck Brodsky’s “The Ballad of D. B. Cooper”:

It was Thanksgiving eve

Back in 1971

He had on a pair of sunglasses

There wasn’t any sun

He used the name Dan Cooper

When he paid for the flight

That was going to Seattle

On that cold and nasty night

NEXT: Hijacking

D.B.Cooper - Hijacking


That night changed aviation history. It started in Portland, Oregon, when a man walked up to the flight counter of Northwest Orient Airlines. He was wearing a dark raincoat, dark suit with skinny black tie, and carrying an attaché case. He had perky ears, thin lips, a wide forehead, receding hair. He gave his name, Dan Cooper, and asked for a one-way ticket to Seattle, Flight 305. The ride was a 30-minute puddle jump. He sat in the last row of the plane, 18-C, lit a cigarette, and ordered a bourbon and soda. The plane took off and he passed the stewardess a note.


Florence Schaffner was 23, cute, perky, the sexy stewardess. Working on planes, she’d been approached by so many men that she’d taken to wearing a wig onboard to disguise herself. She dropped the man’s note in a purse, thinking, Just another guy hitting on me. But the man was insistent. “Miss. You’d better look at that note. I have a bomb.” She looked at the man’s eyes. She saw that he was serious.

 

She read the note. It was printed in felt pen, all capital letters, elegantly formed. “I have a bomb in my briefcase. I want you to sit beside me,” it read. She did as he requested, then asked to see the bomb. She saw a tangle of wires, a battery, and six red sticks. Then he dictated some instructions: “I want $200,000 by 5:00 p.m. In cash. Put in a knapsack. I want two back parachutes and two front parachutes. When we land, I want a fuel truck ready to refuel. No funny stuff or I’ll do the job.” He let her get up to take them to the captain. When she got back, the man was wearing dark sunglasses. 

NEXT:Hijacking part-2

D.B.Cooper- Hijacking part-2

Schaffner’s mind was reeling. She imagined her parents back in Arkansas watching the evening news. She imagined the plane exploding. She imagined this man taking her hard by the wrist and raping her right there. She took deep breaths. Inhale, exhale, repeat.Surprisingly, the man was able to calm her down. He was not a so-called sky pirate, which she’d read about in the papers, or a hardened criminal. He was not a political dissident with a wish to reroute the plane to Cuba, like many of the hijackers until then. He was polite. Well spoken. A gentlemen. At one point, he offered to pay for his drinks with a $20 bill and insisted the stewardess keep the rest ($18) as change. He also seemed like a local, glancing out the window and saying, “Looks like Tacoma down there.”

 

The plane landed on the Sea-Tac tarmac, greased up by the squalls of the rainstorm. It was late, two hours late, because FBI agents needed time to collect Cooper’s ransom and to station their sharpshooters. Inside the cabin, Cooper ordered all passengers be released. The airline staff then carried his ransom—$200,000 in $20 bills (the bundle weighed 21 pounds) and parachutes—onto the plane as it refueled. The gentleman hijacker was getting anxious. “It shouldn’t take this long,” he said, and told the captain to get the plane back in the air. Where to?

 

Mexico City,” he said, and delivered more specific flight instructions: Keep the plane under 10,000 feet, with wing flaps at fifteen degrees, which would put the plane’s speed under 200 knots. He strapped the loads of cash to himself and slipped on two chutes—one in front, one in back—and moved deeper into the vessel, toward the aft stairs, which were used to let passengers disembark from the rear of the plane. The 727 was the only model equipped with such stairs. He lowered them. The seal of the cabin broke, and there was engine noise in his ears and the cold, black, wet windy night outside. He climbed down the stairs and hovered on a plank over southwest Washington. The plane was too high to see anything below. The cloud ceiling that night was 5,000 feet, and some of the most rugged terrain in this country was beneath it: forests of pine and hemlock and spruce, canyons with cougars and bears and lakes and white-water rapids, all spilling out into the Pacific.

Out a little service doorway in the rear of the plane cooper jumped into the darkness into the freezing rain. They say that with the wind-chill it was 69 below not much chance that he’d survive but if he did where did he go?


NEXT:Investigation and leads of FBI 

D.B.Cooper - Investigation and leads

Cooper left behind a few things, including the spare chutes and 8 Raleigh-brand cigarette butts. Authorities were surprised also to find the hijacker's black tie and tie tack, with a mother-of-pearl detail—an overlooked potential bit of evidence that was perhaps the only mistake he made. FBI crime-scene experts catalogued 66 fingerprints that could not be matched to the crew or other passengers. They led nowhere.

 

The authorities tried follow the plane, wait for him to jump, then track him to the ground.  but the opportunity was lost in a questionable choice of a chase plane. The Air Force scrambled up two F-106 fighter jets from McChord. Those pilots were instructed to follow at a safe distance and watch for a jumper. But the fighters are built to fly at speeds of up to 1,500 mph. They were useless in slow-motion, low altitude surveillance. The authorities tried to recover by sending up a slower-flying Air National Guard Lockheed T-33, but Cooper probably had already jumped by the time it arrived.

 

Nasty weather on the night of the jump led authorities to put off a ground search until the next day,  An exhaustive search, by land and by air, over several weeks failed to turn up any trace of the hijacker or his parachute.

In 1980, some of Cooper’s money surfaced. A boy found $5,800 in decomposing twenties buried in a bag, a few feet from a river. The FBI searched the area again, hoping to find more bills—or, better yet, a body. They found nothing.

 

The Cooper file is now a morgue of dead-end leads. It sits buried in the basement of the FBI’s Seattle field office and occupies several shelves in long rows that open and close by spinning black plastic wheels. The belief among agents handling the case now is that Cooper died in the jump—the conditions were simply too brutal to survive, and the twenties would have blown away. When a new tip arrives in the mail, the Feds typically shrug it off and file it away. 

NEXT: Suspects

D.B.Cooper - Suspects




In 1971, mass-murderer John List was considered a suspect in the Cooper hijacking, which occurred only fifteen days after he had killed his family in WestfieldNew Jersey. List's age, facial features, and build were similar to those described for the mysterious skyjacker. FBI agent Ralph Himmelsbach stated that List was a "viable suspect" in the case. Cooper parachuted from the hijacked airliner with $200,000, the same amount List had used up from his mother's bank account in the days before the killing. After his capture and imprisonment in 1989, List strenuously denied being Cooper, and the FBI no longer considered him a suspect. List died in prison custody on March 21, 2008

 Five months later, Richard McCoy, a former Sunday-school teacher from Utah and a Vietnam helicopter pilot, jumped out of a plane over Utah with a $500,000 ransom. He was snatched by the FBI a few days later with $499,970 in a cardboard box. McCoy told the Feds he wasn’t Cooper, but they didn’t believe him. He was sentenced to 45 years in prison. Then he escaped, using a fake gun made from plaster of Paris stolen from dental supplies, and led a crew of convicts through the prison gates with a garbage truck. When the Feds found him again, there was a shoot-out. McCoy was killed

The next major suspect was Duane Weber. Just before he died in 1995, Weber’s wife claims, he told her, “I’m Dan Cooper.”  She became suspicious and began checking into his background. Weber had served in the Army during World War II and had later served time in a prison near the Portland airport. Weber recalled that her husband had once had a nightmare where he talked in his sleep about jumping from a plane and said something about leaving his fingerprints on the aft stairs. Jo recalled that shortly before Duane's death, he had revealed to her that an old knee injury of his had been incurred by "jumping out of a plane." The FBI compared Weber's prints with those processed from the hijacked plane and found no matches. In October 2007, the FBI stated that a partial DNA sample taken from the tie that Cooper had left on the plane did not belong to Weber.


The October 29, 2007 issue of New York magazine stated that Kenneth P. Christiansen had been identified as a suspect by Sherlock Investigations. The article noted that Christiansen is a former army paratrooper, a former airline employee, had settled in Washington near the site of the hijacking, was familiar with the local terrain, had purchased property with cash a year after the hijacking, drank bourbon and smoked (as did Cooper during the flight) and resembled the eyewitness sketches of Cooper. However, the FBI ruled out Christiansen because his complexion, height, weight and eye color did not match the descriptions given by the passengers or the crew of Flight 305