Friday, March 21, 2014

Hadoop Technology

Corporation world needs to process petabytes of data efficiently. It has become Expensive to build reliability in each Application for processing large Datasets. Computer Networks contain large electronic components, so, if there is a problem of Nodes fails, some of the causes of failure may be. Failure is expected, rather than exceptional. The number of nodes in a cluster is not constant. So there is a Need for common infrastructure to have Efficient, Reliable, Scalable, and Economical. Hadoop is an Apache open source software framework for distributed processing of large datasets across large clusters of computers and that provides a parallel storage. Hadoop is a “flexible and available architecture for large scale computation and data processing on a network”. Hadoop enables users to store and process large volumes of data. Originally it was created by Doug Cutting at Yahoo! Its primary purpose is to run MapReduce batch programs in parallel on tens to thousands of server nodes. MapReduce is an application module written by a programmer that runs in two phases: first mapping the data (extract) then reducing it (transform). Hadoop scales out to large clusters of servers and storage using the Hadoop Distributed File System (HDFS) to manage Big Data sets and spread them across the servers. More advantages of Hadoop include affordability (it runs on commodity hardware), open source (free download from Cloudera), and agility (store any data, run any analysis). The current Apache Hadoop consists the number of related projects such as Apache Hive, HBase and Zookeeper. Hadoop is a software framework for distributed processing of large datasets across large clusters of computers. Here, large datasets means terabytes or petabytes of data while large cluster means hundreds or thousands of nodes. Hadoop framework consists of two main layers and Hadoop is designed as master-slave architecture: •MapReduce EngineDistributed file system (HDFS) There are several design principles of hadoop, such as need to process big data, Need to parallelize computation across thousands of nodes, Commodity hardware, which means large number of low-end cheap machines working in parallel to solve a computing problem, Parallel DBs, Automatic parallelization & distribution, Fault tolerance and automatic recovery, and clean and simple programming abstraction etc. Hadoop is composed of a MapReduce engine and a user-level file system that manages storage resources across the cluster. The preferred operating systems is Windows and Linux but Hadoop can also work with BSD and OS X.

Sunday, September 18, 2011

BUS ARCHITECTURE
In generally, what is a bus and what function is taking? The bus takes the people and languages from one place to another. Is it true? Yes, well. The same way in computer, Bus is a pathway that a computer uses to send data or power from one part to another. Example: CPU to Memory. Buses (show in figure) are characterized by the number of bits they can transfer at a single time.

I'm sure everyone has heard the 8-bit, 16-bit and 32-bit data bus. Well. For example, 8-bit data bus means, transfers 8 bits of data at a time, and a 16-bit data bus means, transfers 16 bits at a time. As a result of increased number of data bus, the processor can receive 4,8,16, and 32 bits respectively. This number known as Bit Size or Word Length of a computer; a computer's bus can be divided into two different types, Internal and External.

The Internal Bus: It connects the different components inside the case: The CPU, system memory, and all other components on the motherboard. It's also referred to as the System Bus.

The External Bus: It connects the different external devices, peripherals, expansion slots, I/O ports and drive connections to the rest of the computer.

In other words, the External Bus allows various devices to be added to the computer. It allows for the expansion of the computer's capabilities. It is generally slower than the system bus. Another name for the External Bus is the Expansion Bus.

We know the bus is just a bunch of tiny wires. One bunch carries info around to the different components on the motherboard, and another bunch of wires connects these components to the various devices attached to the computer. You know that computer takes data from user. Is it true? Yes, well. Data has to be exchanged between devices. Some of the electronic pathways or wires of the Internal Bus or the External Bus are dedicated to moving data. These dedicated pathways are called the Data Bus.

You must note points that the expansion bus, or external bus, is made up of the electronic pathways that connect the different external devices to the rest of your computer. These external devices (monitor, printer, etc.) connect to ports on the back of the computer. Those ports are actually part of a small circuit board or 'card' that fits into a connector on your motherboard inside the case. The connector is called an expansion slot.

Bus width is measured in bits and Bus speed is measured in megahertz (MHz). Now you can ask a question is what is MHz? The megahertz (MHz) is a measurement of how fast some Computer Hardware operates. The different types of buses available, such as following:

Peripheral Component Interconnect (PCI) Local Bus
Accelerated Graphics Port (AGP) Bus
Industrial Standard Architecture (ISA) Bus
VESA Local Bus (VLB)
MCA (Micro Channel Architecture)
EISA (Extended Industry Standard Architecture) Bus
AMR (Audio/Modem Riser) Bus
USB (Universal Serial Bus)
PCMCIA

Friday, September 16, 2011

MOTHEBOARD

In the previous post you learnt that the little bit about computer hardware and their components. Well, In this post I will focus on Motherboard in detail. No doubt, motherboard is main component of computer because everything connected to your computer system. For example plugs and it connect either directly or indirectly into the motherboard. Motherboard is also known as a main board, baseboard, system board, and planar board.

It is a large circuit board and the olive green or brown circuit board that lines the bottom of the computer. In previous post we will discuss about that the CPU or Central Processing Unit is referred to as the 'brain' of your computer. Well, the CPU sits on the motherboard, and if it can be called the brain of your computer then we can say ‘motherboard is truly the central nervous system’. Following are will discuss in this post:

Types of Motherboards
Components of Motherboard
Bus Architecture
Choosing the Right Size (Form factor)

TYPES OF MOTHERBOARDS
Today different types of motherboard uses for different types of PC, The capacity and efficiency of motherboards differ based on the system type. We can classify motherboards on the basis of system types such as Desktop motherboards, Server motherboards, and Laptop motherboards.

The desktop motherboard is used in desktops computers. It is used for applications at home and in office. The Server motherboards are more advanced than desktop motherboards. These motherboards support expansion and future upgrades and can handle major applications. Server motherboards also offer improved graphics and can usually support different types of memory technology.

The Laptop motherboards generally have very advanced features as compared to the desktop motherboards. The primary differences between a laptop motherboard and a desktop motherboard are the lack of standards and the much smaller form factor.

COMPONENTS OF MOTHERBOARD
The typical motherboard consists of a large printed circuit board. You will find that almost all components are attached to motherboard in one way or another. Now, we will discuss motherboard components and their locations, show in figure. The following components found on a typical motherboard:

PCI Slot
AGP Slot
Processor Socket or Slot
Chipset
RAM Slot
Drive connectors
Power Supply Connector
CMOS battery
BIOS chip
Mouse & keyboard Port
Jumpers

Thursday, September 15, 2011

COMPUTER SECURITY

We already learn that Computers are an important part of our day to day life. Every computer user may face security related issues at least one time. The general technical areas of the computer security are integrity, availability, authentication, performance and confidentiality. Improving the security of the business is of the great concern of every business personnel.

Your home computer can be the easiest target for the hackers if no security mechanisms have been implemented. Computer security is required for every home computer or business computer for preventing it from the attacks of viruses, hackers, spyware, intruders and software vulnerabilities. For protecting the home computer it is important to use strong passwords, run up-to-dated antivirus and anti spyware programs, apply security patches and backup your important data regularly.

Windows based operating systems contain certain security vulnerabilities and by implementing the in this post I give some security aspects you can secure your personal as well as network computer from the known security threats.

Data Security: Data security helps to ensure the privacy of the individuals and the organizations. Data security is a method of protecting the data from unauthorized use and it has become an important part of the computer related business around the world. Data security is very important for the smooth operations in any organization.

One way to avoid the loss of data due to hard disk crash, accidental removal or due to virus attack is to take regular backup of your data on the CD-ROM, hard drives, USB drive or any other medium. If you have lost your critical data then there are many ways to recover it you just need to find a data recovery specialist in your area.

Computer Security: Every computer is susceptible to different attacks and it’s the responsibility of the computer user or the person who manages the security of the computer it to protect it from these attacks. Every computer system must have a predefined security measures to protect it from the viruses, spyware, adware, Trojan horses, web worms, internet security threats and hackers’ attacks.

The key areas that are involved in the computer security are integrity, confidentiality, privacy and authentication. Computer security deals with the development of the security measures that are required for a computer. Firewall software provides a security mechanism that protects your computer from the unauthorized access and hackers’ attacks.

Network Security: Network security means the protecting your network from unauthorized use, viruses, spyware and internet threats. Protecting a computer network is the most important responsibility of the persons who manages the security of the network.

There are different security mechanisms that can be applied to protect the network such as install up-to-dated antivirus program, make regular backup of the critical data, use a strong firewall program, keep your system patched, use strong passwords, install and configure file encryption program, place your network server at very secure place and only authorized users should be allowed to enter in the server room.

Internet Security Threats: There are many known internet threats that can invade any computer that is connected to the internet. If you have not installed and configured any internet security suite then your computer can host many viruses, spyware and adware. The best safeguard against the internet security threats is to install a internet security software, install firewall software or hardware, monitor incoming emails, disable scripting features in the email programs, disable Java and ActiveX and monitor the activities of the users’ on the internet.

Windows Security: Windows XP Professional and Windows 2000 Professional provides the excellent security features such as EFS, strong authentication password and firewall but due to the weak default settings Windows XP Professional has security holes. The following tips provide the basic security measures in Windows XP Professional and Windows 2000 Professional operating systems.

Install up-to-dated antivirus program.
Use strong passwords.
Don’t leave your computer unattended.
Enable default firewall settings in Windows XP.
Keep your operating system up-to-dated.
Encrypt your critical files.
Take regular backup of your data.
Limit the access of users.
Increase the security settings in the browsers.
Disable annoying startup programs.
Install the latest service packs.
Regularly scan your computer for the vulnerabilities and security holes.
Adjust event viewer settings.

Install Antivirus Program: Install an up-to-date antivirus software program on your computer and get rid of the viruses’ attacks. The well known antivirus programs are Norton Antivirus, Trend Micro, McAfee and Panda Antivirus etc.

Install Anti spyware Program: Spyware is a piece of software program that is intentionally designed for stealing the personal information of the computer user and monitoring the user’s activity on the internet. Install up-to-dated antivirus program and get rid of spyware, Trojan horses, Adware and Malware.

Keep Your Passwords Strong: Always use the combination of alphanumeric, spaces and special characters in the passwords. Most of the systems rely on the password authentication and weaker passwords can provide the great havoc to the computer systems. Additionally, passwords cracking software can crack the weaker password so best practice is to use a strong password for your computer.

Don’t Open Email Attachments: Never try to open the email attachments that came from the suspicious sources because it may contain viruses and it can harm your computer immensely.

Don’t leave your computer unattended: Leaving your computer unattended even for few minutes can comprise your system it may results in the permanent lost of your precious data. Operating Systems such as Windows 2000 Professional, Windows XP Professional and Windows 20003 Server provides the passwords enabled screen savers. Use strong passwords on the screen savers and set the timer to minimum time.

Update your Operating system regularly: By regularly updating your operating system you make it secure from the latest security threats on the internet. You can go to the Microsoft’s website and update your operating system on the regular basis.

Use Firewall Program: Firewall is a software program or hardware and it provides an additional layer of security to your computer from the network users, unauthorized access, intruders and hackers from the internet. Windows XP Professional provides the built-in firewall utility.

Apply Security Policies: Implement strong security policies and encryption methods to protect your precious data on your computer.

Regular backup: Take regular backup of your data on the CD, DVD or another hard drive and in case of any emergency such as data lost, your backup copy would be your precious asset.

PC IT CERTIFICATE

In the preface of this blog, I say that the this blog help your Comptia Exam also. Yes well. In this post I focus on Network Certification overview Comptia a+ exam, cissp, Cisco exams, and Microsoft certifications. Here I gave the general overview of the computer networking certifications.

Network+: Network+ exam by Comptia is designed specifically for the IT professional who have more than nine months experience in the computer network administration. The code of the Network+ exam is N10-003 and it was first introduced in 1997. Till the mid of May 2005, according to Comptia’s announcement, more than 150,000 were Network+ exam certified.

Network+ is an entry level exam and it paves the way for the IT professionals in their quest for the more advance certifications like MCSE, CCNA, CCNP etc. There are not prerequisites for this certification. Comptia recommends that you must have the A+ certifications.

Network+ certification is well suited and designed for the network administrators. The topics covered in this exam are media and topologies, standards, protocols, network support and implementations. The Network+ certification shows the candidate’s knowledge of the basic networking fundamentals. Like other Comptia’s certifications, the Network+ certification will not be expired once it is achieved.

SECURTY+: Security+ certification is designed for the IT professionals who have 2 years of experience in the network or systems administration and having the main focus on the security. The code of this exam is SY0101 and it was introduced by Comptia in 2002. Security+ is an entry level test for the most advanced tests like ISC2, CISSP and the SANS. As well as it can also be used as the basis for the some Microsoft certifications. Security+ certification is well suited for the network and security administrators and professionals.

The common topics included in this exam are designing security for a network, security infrastructure, cryptography, authentication, access control, internal and external network attacks and the dealing with the company’s security.

Security+ certifications shows the candidates knowledge of these things and it prepares the candidate to such level that he/she competes with the security breaches and finds some good alternative ways that are helpful in reducing the cost of a security breach. Once this certification is achieved it will never expire just like the other certifications of Comptia.

MCSE: Microsoft Certified Systems Engineer (MCSE) is designed for the professionals who are some requirements of analyzing the business, designing, making infrastructure, and implementing the securities at certain levels. MCSE is based on the Microsoft Windows 2000 platform and Windows NT platform (though many of the NT exams have been obsolete now). The Windows 2003 server has been merged into the MCSE exam.

MCSE certification does not retire but the newer versions are released by the Microsoft after few years. So the candidate has to be upgraded himself/herself with these latest exams. There are no specific requirements for the MCSE certifications. Those candidates who have one year experience in managing a computer network, network or desktop operating systems, will be considered suitable for this exam. Job descriptions and roles including after achieving the MCSE are Systems engineer, Network Engineer, Network Consultant, and Systems Analyst.

There is a 7 exams pass requirement for this certification and the candidates how are holding the MCSE 2000, are required to give 2-upgrade exams. By passing these exams you can achieve Windows Server 2000 MCSE exam.

CCNA: Cisco CCNA certification (Cisco Certified Network Associates) is an introductory level exam. The CCNA exam by Cisco systems was designed for the candidates who can install, configure and do administrator of the LAN or WAN networks. CCNA is a prerequisite for the some higher level certifications like CCNP and CCDP. The CCNA exam is valid for the three years. In 2003, Cisco has introduced the two paths of the CCNA exam (INTRO and ICND). Job role for the individuals who are CCNA certified are network administration, system administration and network consultant etc.

CCNP: CCNP (Cisco Certified Network Professional) exam is designed for the candidates who can install, configure and troubleshoot a LAN/WAN network of 100 to 500 computers. The CCNP certification has its prerequisites such as CCNP certification. The topics included in this certification are converged networks, security, VPN, quality of service and broadband technologies like VOIP, DSL, Cable net etc. There is a four, three and two exams path to the CCNP. The CCNP exam is valid for the three years. The job role for a CCNP certified is Network administration, LAN administration, and WAN administrator and Network consultant.

CISSP: CISSP (Certified Information Systems Security Professional) is introduced by ISC2. The ISC2 is a not profit organization and it manages the CISSP exams. A CISSP exam is designed for the candidates who are having minimum four years of experience in the field of Information systems. A bachelor and a Master degree separately, can be a substitute of the one required years for this exam. Also, some lower level certifications like SSCP (Systems Security Certified Practitioner) are also recommended before the CISSP exam.

The CISSP exam is aimed for the IT professionals who want to be Information security professionals, systems security professionals and network security professionals.

Wednesday, September 14, 2011


COMPUTER IN YOUR CARRIER
Computer science is the systematic study of the information and the computing systems and their implementation. There are different subjects and departments in computer science such as software development, object oriented programming, computer networking, web development, computer hardware, operating systems, databases, software engineering, artificial intelligence, applied mathematics, computer graphics, data structures and data communication systems etc.

Computer science is a widely readable subject in all over the world. There are literally a large number of the categories in the computer science field. In this post I can give some general overview of the main categories of computer technology.

Computer Hardware: There are two main types of components in a computer i.e. computer hardware and computer software. The physical component in a computer is known as computer hardware. Computer hardware devices perform computation, logical functions, communication, control and storage.

Computer Networking: Computer networking is the process of sharing information and resources between two or more computers in Local Area Network, Metropolitan Area Network or Wide Area Network. Computer networking is very important subject and is essential for the smooth and flexible working of every business in the world.

Operating Systems: The operating system in a computer is software that acts as a platform for the other software and applications to perform their functions. Operating system controls every task of the computer. The most famous operating systems are Microsoft Windows XP Professional, Windows 2000 Professional, Windows 2003 Server, UNIX, Linux, Sun Solaris and Apple Talk etc.

Programming: Computer programming is the process of creating, writing, testing and maintaining the instructions in the form of codes that computers understand and execute

Web Development: Web development is a broad term that covers analyzing, implementing and creating web pages that are accessible on the World Wide Web. This covers the web design, graphic design, programming, serve administration, database management, content management, testing and deployment.

Artificial Intelligence: Artificial Intelligence involves science and engineering to make intelligent machines and robots. It also makes the computer to work with the capabilities of human intelligence.

Database Management: Database Management System is the process of storing, modifying and retrieving the information for analysis, reports and record transactions.

Cryptography: Cryptography is a field of computer science that deals with methods of the transformation of data for preventing it from the unauthorized use.

Software Engineering: Software engineering is process in which systematic methods of engineering and computer science, applications and procedures are used to design computer software.

Computer Graphics: Computer graphics is the field of computer science that deals with the graphical representations of the data in the various forms such as pie, charts, histograms, bars and 3D-modelling etc.

Data Communication: Data communication is the process of transmission of the digital data in a network.

Securities: Computer security is the protection of the computer data and information from viruses, spyware, web worms, unauthorized access and hackers.

Digital Rights Management: Digital Rights Management is the process of controlling the access to copyrighted material.

E-Marketing: E-Marketing is process of creating, distributing, promoting and pricing the services and goods to a targeted market around the world through internet and digital technologies.

IT Management: IT management system is a discipline of managing the information technology systems in an organization.