Categories

Showing posts with label COMPUTER NETWORKING. Show all posts
Showing posts with label COMPUTER NETWORKING. Show all posts

Wednesday, 6 January 2021

Latest Technology of 2021

 


Technology today is evolving at such a rapid pace, enabling faster change and progress, causing an acceleration of the rate of change, until eventually it will become exponential. However, it is not only technology trends and top technologies that are evolving, a lot more has changed this year due to the outbreak of COVID-19 making IT professionals realize that their role will not stay the same in the contactless world tomorrow. And an IT professional in 2020-21 will constantly be learning, unlearning and relearning (out of necessity if not desire).

What does this mean for you? It means staying current with new technology trends. And it means keeping your eyes on the future to know which skills you’ll need to know to secure a safe job tomorrow and even learn how to get there. All bows to the worldwide pandemic, most of the global IT population is sitting back, working from home. And if you wish to make the most of your time at home, here are top 10 new technology trends you should watch for and make an attempt at in 2021, and possibly secure one of the jobs that will be created by these new technology trends.

1. Artificial Intelligence (AI) and Machine Learning

Artificial Intelligence, or AI, has already received a lot of buzz in the past decade, but it continues to be one of the new technology trends because of its notable effects on how we live, work and play are only in the early stages. AI is already known for its superiority in image and speech recognition, navigation apps, smartphone personal assistants, ride-sharing apps and so much more.

Other than that AI will be used further to analyze interactions to determine underlying connections and insights, to help predict demand for services like hospitals enabling authorities to make better decisions about resource utilization, and to detect the changing patterns of customer behaviour by analyzing data in near real-time, driving revenues and enhancing personalized experiences.

The AI market will grow to a $190 billion industry by 2025 with global spending on cognitive and AI systems reaching over $57 billion in 2021.  With AI spreading its wings across sectors, new jobs will be created in development, programming, testing, support and maintenance, to name a few. On the other hand AI also offers some of the highest salaries today ranging from over $1,25,000 per year (machine learning engineer) to $145,000 per year (AI architect) - making it the top new technology trend you must watch out for!

Machine Learning the subset of AI, is also being deployed in all kinds of industries, creating a huge demand for skilled professionals. Forrester predicts AI, machine learning, and automation will create 9 percent of new U.S. jobs by 2025, jobs including robot monitoring professionals, data scientists, automation specialists, and content curators, making it another new technology trend you must keep in mind too!

Offer Expires In
  • 00 :  HRS
  • 51 : MIN
  • 15SEC

Artificial Intelligence Career Guide

Your Roadmap to Becoming an AI ExpertDownload Now

2. Robotic Process Automation (RPA)

Like AI and Machine Learning, Robotic Process Automation, or RPA, is another technology that is automating jobs. RPA is the use of software to automate business processes such as interpreting applications, processing transactions, dealing with data, and even replying to emails. RPA automates repetitive tasks that people used to do. 

Although Forrester Research estimates RPA automation will threaten the livelihood of 230 million or more knowledge workers, or approximately 9 percent of the global workforce, RPA is also creating new jobs while altering existing jobs. McKinsey finds that less than 5 percent of occupations can be totally automated, but about 60 percent can be partially automated.

For you as an IT professional looking to the future and trying to understand new technology trends, RPA offers plenty of career opportunities, including developer, project manager, business analyst, solution architect and consultant. And these jobs pay well. An RPA developer can earn over ₹534K per year - making it the next technology trend you must keep a watch on!

3. Edge Computing

Formerly a new technology trend to watch, cloud computing has become mainstream, with major players AWS (Amazon Web Services), Microsoft Azure and Google Cloud Platform dominating the market. The adoption of cloud computing is still growing, as more and more businesses migrate to a cloud solution. But it’s no longer the emerging technology trend. Edge is.

As the quantity of data organizations are dealing with continues to increase, they have realized the shortcomings of cloud computing in some situations. Edge computing is designed to help solve some of those problems as a way to bypass the latency caused by cloud computing and getting data to a datacenter for processing. It can exist “on the edge,” if you will, closer to where computing needs to happen. For this reason, edge computing can be used to process time-sensitive data in remote locations with limited or no connectivity to a centralized location. In those situations, edge computing can act like mini datacenters. 

Edge computing will increase as use of the Internet of Things (IoT) devices increases. By 2022, the global edge computing market is expected to reach $6.72 billion. And this new technology trend is only meant to grow and nothing less, creating various jobs, primarily for software engineers.

Offer Expires In
  • 00 :  HRS
  • 51 : MIN
  • 15SEC

Cloud Computing Career Guide

Your Pathway To Becoming A Cloud ExpertDownload Now

4. Quantum Computing

Next remarkable technology trend is quantum computing, which is a form of computing that takes advantage of quantum phenomena like superposition and quantum entanglement. This amazing technology trend is also involved in preventing the spread of the coronavirus, and to develop potential vaccines, thanks to its ability to easily query, monitor, analyze and act on data, regardless of the source. Another field where quantum computing is finding applications is banking and finance, to manage credit risk, for high frequency trading and fraud detection.

Quantum computers are now a multitude times faster than regular computers and huge brands like Splunk, Honeywell, Microsoft, AWS, Google and many others are now involved in making innovations in the field of Quantum Computing. The revenues for the global quantum computing market are projected to surpass $2.5 billion by 2029. And to make a mark in this new trending technology, you need to have experience with quantum mechanics, linear algebra, probability, information theory, and machine learning.

5. Virtual Reality and Augmented Reality

The next exceptional technology trend - Virtual Reality (VR) and Augmented Reality (AR), and Extended Reality (ER). VR immerses the user in an environment while AR enhances their environment. Although this technology trend has primarily been used for gaming thus far, it has also been used for training, as with VirtualShip, a simulation software used to train U.S. Navy, Army and Coast Guard ship captains.

In 2021, we can expect these forms of technologies being further integrated into our lives. Usually working in tandem with some of the other new technologies we’ve mentioned in this list, AR and VR have enormous potential in training, entertainment, education, marketing, and even rehabilitation after an injury. Either could be used to train doctors to do surgery, offer museum goers a deeper experience, enhance theme parks, or even enhance marketing, as with this Pepsi Max bus shelter.

Fun fact: 14 million AR and VR devices were sold in 2019. The global AR and VR market is expected to grow to $209.2 billion by 2022, only creating more opportunities in the trending technology, and welcoming more professionals ready for this game-changing field. 

While some employers might look for optics as a skill-set, note that getting started in VR doesn’t require a lot of specialized knowledge - basic programming skills and a forward-thinking mindset can land a job; another reason why this new technology trend should make up to your list of lookouts!

6. Blockchain

Although most people think of blockchain technology in relation to cryptocurrencies such as Bitcoin, blockchain offers security that is useful in many other ways. In the simplest of terms, blockchain can be described as data you can only add to, not take away from or change. Hence the term “chain” because you’re making a chain of data. Not being able to change the previous blocks is what makes it so secure. In addition, blockchains are consensus-driven, so no one entity can take control of the data. With blockchain, you don’t need a trusted third-party to oversee or validate transactions.

Several industries are involving and implementing blockchain, and as the use of blockchain technology increases, so too does the demand for skilled professionals. From a birds eye view, a blockchain developer specializes in developing and implementing architecture and solutions using blockchain technology. The average yearly salary of a blockchain developer is ₹469K

If you are intrigued by Blockchain and its applications and want to make your career in this trending technology, then this is the right time to start. To get into Blockchain, you need to have hands-on experience of programming languages, the fundamentals of OOPS, flat and relational databases, data structures, web app development, and networking.

Offer Expires In
  • 00 :  HRS
  • 51 : MIN
  • 15SEC

Blockchain Career Guide

A Guide to Becoming a Blockchain DeveloperDownload Now

7. Internet of Things (IoT)

Another promising new technology trend is IoT. Many “things” are now being built with WiFi connectivity, meaning they can be connected to the Internet—and to each other. Hence, the Internet of Things, or IoT. The Internet of Things is the future, and has already enabled devices, home appliances, cars and much more to be connected to and exchange data over the Internet.

As consumers, we’re already using and benefitting from IoT. We can lock our doors remotely if we forget to when we leave for work and preheat our ovens on our way home from work, all while tracking our fitness on our Fitbits. However, businesses also have much to gain now and in the near future. The IoT can enable better safety, efficiency and decision making for businesses as data is collected and analyzed. It can enable predictive maintenance, speed up medical care, improve customer service, and offer benefits we haven’t even imagined yet.

And we’re only in the beginning stages of this new technology trend: Forecasts suggest that by 2030 around 50 billion of these IoT devices will be in use around the world, creating a massive web of interconnected devices spanning everything from smartphones to kitchen appliances. The global spending on the Internet of Things (IoT) is forecast to reach 1.1 trillion U.S. dollars in 2022. New technologies such as 5G is expected to drive market growth in the coming years.

And if you wish to step foot in this trending technology, you will have to learn about Information security, AI and machine learning fundamentals, networking, hardware interfacing, data analytics, automation, understanding of embedded systems, and must have device and design knowledge.

8. 5G

The next technology trend that follows the IoT is 5G. Where 3G and 4G technologies have enabled us to browse the internet, use data driven services, increased bandwidths for streaming on Spotify or YouTube and so much more, 5G services are expected to revolutionize our lives. by enabling services that rely on advanced technologies like AR and VR, alongside cloud based gaming services like Google Stadia, NVidia GeForce Now and much more. It is expected to be used in factories, HD cameras that help improve safety and traffic management, smart grid control and smart retail too.

Just about every telecom company like Verizon, Tmobile, Apple, Nokia Corp, QualComm, are now working on creating 5G applications. 5G services are expected to launch worldwide in 2021 with more than 50 operators offering services in about 30 countries by the end of 2021, making it a new technology trend you must watch out for, and also save a spot in.

9. Cyber Security

Cyber security might not seem like an emerging technology, given that it has been around for a while, but it is evolving just as other technologies are. That’s in part because threats are constantly new. The malevolent hackers who are trying to illegally access data are not going to give up any time soon, and they will continue to find ways to get through even the toughest security measures. It’s also in part because new technology is being adapted to enhance security. As long as we have hackers, cybersecurity will remain a trending technology because it will constantly evolve to defend against those hackers.

As proof of the strong need for cybersecurity professionals, the number of cybersecurity jobs is growing three times faster than other tech jobs. Also, the need for proper cyber security is so high that by 2021, $6 trillion will be spent globally on cybersecurity.

You must note that however challenging the field is it also offers lucrative six-figure incomes, and roles can range from ethical hacker to security engineer to Chief Security Officer, offering a promising career path for someone who wants to get into and stick with this evergreen trending technology.

Offer Expires In
  • 00 :  HRS
  • 51 : MIN
  • 15SEC

Cybersecurity Career Guide

The Path to Becoming a Cybersecurity ExpertDownload Now

Half duplex and Full duplex

 

In telecommunication, a duplex communication system is a point-to-point system of two devices that can communicate with each other in both direction. These two types of duplex communication systems exist in Ethernet environments:

  • half-duplex – a port can send data only when it is not receiving data. In other words, it cannot send and receive data at the same time. Network hubs run in half-duplex mode in order to prevent collisions. Since hubs are rare in modern LANs, the half-duplex system is not widely used in Ethernet networks anymore.
  • full-duplex – all nodes can send and receive on their port at the same time. There are no collisions in full-duplex mode, but the host NIC and the switch port must support the full-duplex mode. Full-duplex Ethernet uses two pairs of wires at the same time instead of a single wire pair like half-duplex.

The following picture illustrates the concept:

 

 

Because hubs can only operate in half duplex, the switch and hub will negotiate to use half-duplex, which means that only one device can send data at the time. The workstation on the right supports full duplex, so the link between the switch and the workstation will use full duplex, with both devices sending data simultaneously.

Each NIC and switch port has a duplex setting. For all links between hosts and switches, or between switches, the full-duplex mode should be used. However, for all links connected to a LAN hub, the half-duplex mode should be used in order to prevent a duplex mismatch that could decrease network performance.

In Windows, you can set up duplex settings in the Properties window of your network adapter:


 

 

Monday, 4 January 2021

Cabling your home for computer network – still a requirement?

 

Cabling your home for computer network – still a requirement?

With proliferation of wireless networking and communication equipment it is oh-so-tempting to cut the cord and save a significant sum of money in the process. But is everything that a regular computer networking user needs can be done using just wireless network? Lets take a look at some pros and contras:

1. One important advantage of having a cabled network is the available bandwidth or simply speed. At the present point in time the speed of connection via a simple and inexpensive CAT5E cable can be 1000Mbit/sec, whereas the best that IEEE802.11g (one of the many flavors of Wi-Fi) can offer is only 54Mbit/sec. It may not seem so significant if you think you are only browsing Internet, and the DSL speed available to you is 1.5Mbit/sec. However, if you need to print via your network connection on a remote printer, you should realize that the print jobs, depending on the amount of graphic data in them, can easily reach dozens and even hundreds megabytes. Since 1Byte=8bit one 100MByte print job will take 15 seconds (and in reality this time can be much longer) to transmit via a Wi-Fi wireless connection, and this time shrinks to mere 1 sec or less on wired 1000MBit/s Ethernet connection. Same principal applies to transferring files, backing up files on other computers in the network etc.

2. It is not possible today and with all probability will not be possible in the future to transmit power needed for your networking device via the wireless link. Unless, of course, you would be willing to be subjected to very high levels of microwave radiation. Thus a device that was marketed to you as un-tethered will in fact be very much tethered via the power cord or will have to be re-charged every so often. The power requirements are increasingly important for devices that are expected to be always online, such as phone sets. Therefore it is best to have it connected via a cable that can deliver both power and the communication signal at the same time.

3. Wireless communications are very much proprietary and require whole gamut of conversion equipment to transmit multi-media signals. The same CAT5E cable can without any modification support phone, computer network, balanced line level audio signal, baseband video signal as well as host of other, more specialized, control applications signals. With inexpensive adapters called baluns the same cable can carry significant number of channels of broadband television or carry a baseband video, such as security camera output, through great distances. All of those applications, except the computer network of course, will require specialized expensive conversion equipment if they needed to be transmitted via a Wi-Fi link.

4. The cost benefit of not running wires around the house is not as simple as issue as it seems. Having installed a wireless network at home you have only eliminated the need to wire for a single application computer network. A modern home, however, requires all kinds of wiring to run even without regard to computers. The power and phones are obvious examples, as well as thermostats and security systems. Pre-wired speakers are common and most homes today have intercom systems as a desirable option, and those also require extensive wiring. It is very likely that the same contractor running the intercom or security cables is qualified to run computer cables CAT5E or better. If you are building a home, you should definitely check if computer cabling option is available in your new home, and our advice is to go ahead and purchase it before the walls close. It is going to be a pretty involved and expensive procedure to install the cables later. As an added cost benefit of a wired computer network you will find that all modern computers ship with wired Ethernet network interface card included, and the latest models ship with 1000MBit/sec cards that are essentially free for the computers owner.

There are multiple sources of information available on proper planning and design of a residential cabling for voice, data, audio, video and other applications. One of the best sources is the TIA/EIA-570B standard, most resent release of which has been published in 2004. The standard outlines recommended types of the cables, principals of cable distribution in a single- and multi-dwelling units as well as recommended amount of cables to be installed based on the size of the house.

In conclusion, cutting the wire seems like a step forward, some sort of liberation of computer from the bonds of the infrastructure. I would caution the reader, however, to take a more balanced and informed approach before joining the wireless revolution. There are still (and will remain in foreseen future) sound reasons to include properly designed cabling system into the list of your dream home options.



Virtual Private Network-VPN

 

Virtual Private Network is a network within a network. This is very popular with businesses that have people working remotely. Basically what we have here is a utilization of the network already provided by the internet. The internet infrastructure can be used as the network for remote employees to access their corporate systems.

Corporate environments have a far greater need for tight security. This is achieved by creating a VPN (virtual private network) on top of the normal internet connection. This type of connection allows for greater security and encryption.
Only authenticated users can access the corporate network and the data being transferred cannot be intercepted.

So this VPN (virtual private network) connection is being run through the internet public network.

Two components are needed to make this scenario work. First, there needs to be a corporate server setup which has the server VPN software installed (and a good router with a firewall). The next would be to have the client VPN software installed on the remote employees machines. Once the client machine is on the internet, they would use the VPN client software to communicate to the corporate server VPN where authentication occurs. Once the server identifies the connecting client as a valid machine, access to the network is granted. From then on all information to/from the client to the server is traveling along this virtual private network and is protected by the additional layer of encryption and security provided.

Finally, there can be a cost savings if determining whether a leased line or VPN is for you. Leased lines can increase in price based on the geographic distance between sites. A virtual private network does not and in fact is more scaleable. (This is a general statement ONLY. It’s best to consult with your communications broker prior to making this decision. A broker will be able to provide much more information when compared to speaking with a specific vendor)

VPN is definitely a viable option for businesses small and large that have remote employees, need site-to-site access with remote offices or secure dial-up connections.

This article is just a very general overview. You should use this only as a starting point to even determine whether or not this type of technology is for you. During your evaluation of this technology, you should consider what type of implementation your looking to do; remote access, site-to-site, secure dial-up. Additional areas to research would be security, firewalls, encryption, server type and IPSec (internet protocol security protocol).

What are proxy sites?

 

Proxy sites enable the individual to access websites and servers through another server to keep the location and identity of the individual unknown. This helps to limit the amount of spam, cookies, and other information from being gleaned or placed on the computer. This in turn helps to keep the computer running fast and efficiently.

Cookies and other computer identification software that is placed on the computer by websites can drastically slow down the computer. These cookies and other identification softwares help to identify a computer upon reentry into the website so that items that the website thinks you want will be available. The computer can also catch a virus from such softwares because of the softwares ability to be corrupted or otherwise altered. This is one of the major reasons that people use proxy sites.

In addition to the protection from cookies, proxy sites stop the gleaning of information from the computer through the website. This gleaning is often just information regarding what other websites that one is viewing, but can be much more invasive. The possibility of hackers and other individuals who might be using the gleaned information to steal ones identity or bank accounts is greatly reduced by using a proxy site.

These proxy sites can either be true internet sites that assist one in viewing additional websites while keeping the computer safe, or they can be servers that protect the computer. Proxy sites that are true websites tend to provide secured lines of communication between the website and the computer. This helps to defray any lost or gleaned information from the computer and limits the cookies that may be placed on the computer.

Servers that are used as proxy sites are often in addition to the server that allows for the computer to access a website. This server acts a surrogate computer and takes all of the cookies, spy ware, and other computer harming components for it to be trashed and destroyed before damage can be done. This server could be part of the computer itself, or it could be part of the ISP server units. Either way, proxy sites can be extremely useful and helpful for all those who use them.

What is VLAN??

 

A Virtual Local Area Network (VLAN) is a group of hosts that feature a like set of requirements and can communicate as though they were all connected via the same wires. However, unlike a traditional LAN, a VLAN is not necessarily all in the same place, and the hosts involved in the network can be located practically anywhere. All VLANs have the exact same attributes as a traditional physical local area network, though they can be configured via software instead of having to actually relocate the hosts.

Many VLANs are designed as replacements to the services that are traditionally provided by routers on physical LANs. VLANs are able to tackle issues like network management, security, and scalability with ease.

VLANs are known as Layer 2, or Data Link layer, constructs which transfer data between network nodes. Because they are Layer 2 constructs, they can interface with Layer 3 IP subnets with a one to one relationship.

How are VLANs designed?

The IEEE assigned IEEE 802.1Q as the protocol by which to configure virtual LANs. IEEE 802.1Q provides for a header with a 2-byte protocol identifier and another 2-byte tag control information. These are known as TPID and TCI, respectively. The TPID is fixed at 0x8100 while the TCI contains information pertaining to the user priority, canonical format indicator, and VLAN identifier.

What are the two types of VLAN memberships?

VLAN membership can be assigned in one of two ways. Static or Dynamic.

A Static VLAN is also known as a port based VLAN. These types of VLANs are created by assigning specific ports to a VLAN. As new devices enter into the VLAN network, the device assumes a specific port. If end users change ports but require access to the same VLAN, network administrators are required to assign new port to VLAN assignments for the new port.

A Dynamic VLAN is designed to be easily configured using software. The most common software for designing dynamic VLANs is CiscoWorks, a program developed by Cisco. A VLAN Management Policy Server (VMPS) must be set up first for a dynamic VLAN. This server will allow the VLAN to automatically switch ports whenever new devices connect to the VLAN. It uses information such as the devices ports, unique usernames, and MAC addresses to determine whether or not to change ports to fit the needs of the incoming device.

What is Subnetting?

 


 

Subnetting is, at its essence, the process of allocating bits from a host portion of a network as a network portion of that same network. This is done with networks that are using the Internet Protocol, or IP address system to create a subnetwork (also known as a subnet) of logical addresses within a particularly limited address space that is assigned to a business, organization or other large group.

With every IP address, there is a subnet mask associated with it. The subnet mask is designed to determine which and how many IP addresses are on any given local network. The router or firewall is known as a default gateway, as it is the device that is contacted every time a computer wants to access another computer that is not located within the same local network.

The subnet mask that most people are familiar with is 255.255.255.0. This is the default mask for most systems. As is the case with all IP addresses, the last digit can range from 1 to 254–and thats it. If there are more than 254 computers or other network devices that require IP addresses on a network, the subnet mask will run out of space.

How is subnetting used to extend the number of devices on a local network?

There are two different options for a systems administrator when a local network runs out of space in its subnet mask. One option is to change the subnet mask to allow for more devices. The other option is to add a router to extend the IP address range and essentially start over with a fresh subnet mask. Faster networks that have a lot of data transferring around should add a switch or router while smaller networks that will not exceed 300 devices should extend the subnet mask.

While keeping with the same IP addresses, all hosts should have their subnet masks changed to 255.255.252.0. With this simple change via subnetting, the network will now be able to grow much larger and have a range of IP addresses from 192.168.0.0 to 192.168.3.254. With subnetting in this example, it is extremely important that all hosts are changed to the new subnet mask. If they are not, the network will experience communication issues and various other performance problems with the network.

USE SIGNAL OVER WHATSAPP RIGHT NOW!!

 USE SIGNAL OVER WHATSAPP RIGHT NOW!!   Signal is used by journalists, activists, lawyers, researchers, dissidents, politicians, and secu...