Showing posts with label Ad-hoc. Show all posts
Showing posts with label Ad-hoc. Show all posts

Tuesday, 14 October 2014

Unknown

How to Set Up a Virtual Private Network with Windows

Imagine you are on business overseas working to secure a new account with an offshore supplier. This is a big meeting for you and your company. If you clinch the deal, you are in line for a big promotion. The morning of the presentation, you turn on your laptop and discover your hard drive has crashed. Panicking, you call your office to request an electronic copy of your presentation, but because of the time difference, your call goes unanswered.

However, if you knew how to set up a virtual private network (VPN), you could access the file from any computer in the world! A VPN allows you to connect to a computer from anywhere in the world and access the files.

Steps:
1.  Open your web browser and go to www.whatismyip.com. Write down the IP address. You will need it to configure the client.


2. Click the Start button and click Run.

3. Type control and hit Enter.

4. Click Network and Internet Connections.


5. Click Network Connections.

6. Click Create a New Connection, which is the first option on the left toolbar.

7. The New Connection Wizard will open. Click Next.

8. Choose Set up an advanced connection, the last element on the list. ClickNext.


9. Choose Accept incoming connections. Click Next.

10. You will see the Devices for Incoming Connections screen. Do not select anything on this screen. Click Next.

11. Select Allow virtual private connections. Click Next.

12. Select to whom you want to give access. Click Next. If a user is not listed, you will have to add an account. See “Related Wikihows” for more information.

13. Do not change anything on the Networking Software screen. Click Next.

That’s it! Your computer is now set up to allow for VPNs. Click Finish to complete the wizard.
Now you can enjoy the free VPN services.


Read More

Tuesday, 12 August 2014

Unknown

Bluetooth Technology explained

Bluetooth wireless technology (IEEE 802.15.1) is a short-range communications technology originally intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security. The key features of Bluetooth technology are threefold: robustness, low power, and low cost. Bluetooth has been designed in a uniform way. This way it enables a wide range of devices to connect and communicate with each other by using the Bluetooth wireless communication protocol. The Bluetooth technology has achieved global acceptance in such a way that any Bluetooth-enabled electronic device, almost everywhere in the world, is able to connect to other Bluetooth-enabled devices in its proximity. Bluetooth-enabled electronic devices connect and communicate wirelessly through short-range, ad hoc networks known as piconets. Each device can simultaneously communicate with up to seven other devices within a single piconet. Each device can also belong to several piconets simultaneously. Piconets are established dynamically and automatically as Bluetooth-enabled devices enter and leave radio proximity. One of the main strengths of the Bluetooth wireless technology is the ability to handle data and voice transmissions simultaneously. This enables users to use a hands-free headset for voice calls, printing, fax capabilities, synchronizing PDA’s, laptops, and mobile phone applications to name a few.
An important aspect of this thesis is about the scalability of Bluetooth broadcasting. Since scalability can sometimes be a rather vague concept, we give a short explanation of the term. An important aspect of software products is how they are able to cope with growth. For example, how does the system handle an increase in users or data traffic? This property of a software system is usually referred to as scalability. A more detailed specification of the concept is given by André Bondi, who defines it as follows: ‘Scalability is a desirable attribute of a network, system, or process. The concept connotes the ability of a system to accommodate an increasing number of elements or objects, to process growing volumes of work gracefully, and/or to be susceptible to enlargement.’ Whenever a system meets these requirements we can say that thesystem scales. In this thesis scalability comes down to the question if the system is capable of dealing with large groups of users equipped with Bluetooth enabled devices capable of receiving simple text messages.
Passive Broadcasting
The first type of business deals with broadcasting from a central location, which we will call passive broadcasting. Most of these companies sell both the hardware and software to enable this. For example, BlueCasting by Filter WorldWide, one of the major players in the market which made the news in August 2005 when they distributed merchandise for the British pop band Coldplay, offers a product family divided into four types of systems. They offer solutions for small retail shops, one-off events such as music festivals, and even larger areas such as airports and train stations. The latest descendant in the family is a system that provides an interactive touchscreen allowing users to interact directly with the system. BlueCasting is an example of a product that comes with both hardware (one or more BlueCast Servers) and software (BlueCast Campaign Management System) which is used to provide remote setup, maintenance and reporting.
Besides this type of companies, i.e. the ones that are selling the total package, other companies have dedicated themselves to providing just the hardware. An example is BlueGiga. According to their website their BlueGiga Access Servers are used by more than 350 Bluetooth Marketing companies in more than 65 countries. They sell two lines of products: Bluetooth Modules and Bluetooth Access Servers. The modules are described as ‘completely integrated, certified, high-performance Radio Frequency products including all needed Bluetooth profiles’. Access Servers are sold in the form of Access Points (up to 7 connections) and Access Servers (up to 21 connections). Besides this they also sell the BlueGiga Solution Manager (BSM). This is a web-based remote management and monitoring platform for BlueGiga Access Servers that can be used to simultaneously upgrade, monitor and configure a large number of BlueGiga Access Servers, instead of configuring each device one-by-one.
Bluetooth Core System Architecture :
The transceiver operates in the globally unlicensed ISM band at 2.4 GHz. The bit rateis 1 Megabit per second and can be boosted to 2 or 3 Mb/s with Enhanced Data Rate[EDR]. The 79 channels in the band are ordered from channel number 0-78 and arespaced 1 MHz beginning at 2402 GHz. Bluetooth-enabled devices that arecommunicating share a radio channel and are synchronized to a common clock andfrequency hopping pattern. Frequency hopping is used to make the protocol morerobust to interference from other devices operating in the same band. The physicalchannel is sub-divided into time units known as slots. Data is transmitted betweenBluetooth-enabled devices in packets. These packets are situated in the slots. Packetscan fill one or more consecutive slots, allowing larger data chunks to be transmitted ifthe circumstances admit this. Bluetooth is primarily designed for low power consumption and affordability and hasa relatively short range (1, 10 or 100 meters). It makes use of low-cost transceivermicrochips that are embedded in each device.

The Bluetooth Baseband is the part of the Bluetooth system that specifies or implements the medium access and physical layer procedures between Bluetooth devices. Several devices can be joined together in what is called a piconet. One device owns the clock and the frequency hopping pattern and is called the master. Two or more piconets can be joined in what is called a scatternet. To form a scatternet, some units, called gateways, belong to different piconets. Such a unit can be a slave unit in more than one piconet but can act as a master in only one. Besides this, it can transmit and receive data in only one piconet at a time. To visualize this, imagine the following. You are on the phone with a friend, using your Bluetooth headset, while at the same time you are uploading pictures from your computer to your phone. Your phone now acts as a gateway, being the master in the piconet with your headset and slave in the one with your computer.
Read More

Friday, 8 August 2014

Unknown

How to connect two Laptops using a Ad-hoc network through CMD in windows 8

Hello Geeks, today I am going to tell you about how to connect two systems using command prompt.
The procedure outlined here makes use of Windows’ native Network Shell utility, deploying thewlan command within the utility to enable a hosted network that will, in turn, serve as your ad hoc connection. If all this sounds daunting, fret not, for the actual procedure is fairly easy. Follow the steps outlined below, and you should be good to go.


Windows8AdHoc
It should be noted that for this method to work, your network interface must be capable of supporting hosted networks. It’s always advisable to update your network adapter to the latest drivers before doing this.
Procedure
Step 1: Launch an elevated command prompt under Windows 8 (one with administrator privileges).
Step 2: Run the following command to verify that your network interface supports virtualization:
netsh wlan show drivers
Hosted Network support
If Hosted network supported says Yes, you’re all set. Otherwise, you need to upgrade your hardware, if the software update doesn’t fix it.
Step 3: Now, set up the ad hoc wireless network using this command. Replace the parts in markup tags with your own choices
netsh wlan set hostednetwork mode=allow ssid=<enter_network_name_here> key=<enter_password_here>
image
Step 4: Until now, your hosted network has been created. Now, you need to start it. Use the command below:
netsh wlan start hostednetwork
image
Step 5: You’re all set, with just one thing remaining. If it’s not already enabled, you need to allow Internet Connection Sharing (ICS) for your currently-active internet connection. Simply head over to Network & Sharing Center, and in the properties for the current internet connection, enable ICS. Make sure to select the ad hoc connection under Home networking connection.
Allow ICS


Now you can connect any device to the internet using the ad hoc wireless network with internet connection sharing that you just created on your Windows 8 PC.
Networks
It’s worth noting that this isn’t the only method to create an ad hoc connection. If you don’t want to play around with netsh command, or just need an easier solution, you may simply use a Virtual Router application for Windows, and that should do the trick for you. Google them out, you’ll find various good candidates there.

for any Queries write to us in the comments.
Thank you....:-) 

Read More