Skip to main content

Posts

Showing posts with the label WINDOWS MOBILITY

RULES OF LOGIC ---> INTERNET PROTOCOL

 RULES OF LOGIC---->INTERNET PROTOCOL FRIENDS, TODAY I AM GOING TO DISCUSS SOMETHING ABOUT IP ADDRESSING.  IP IS A LOGICAL ADDRESS FULLFORM INTERNET PROTOCOL.  IT PROVIDES LOGICAL ADDRESS TO NETWORKING DEVICES.   THESE ADDRESSES ARE USED TO DEFINE SOURCE AND DESTINATION OF DATA PACKETS IP HAS TWO VERSIONS 1. IP VERSION 4 2. IP VERSION 6 IP VERSION 4 IT IS 32 BIT ADDRESS WRITTEN IN DECIMAL NUMBER  FORMAT  192.168.1.1 THE NUMBERS IN THE DIGITS LIKE 192.68.1.1 HERE EVERY NUMBER BEFORE THE DOT IS AN OCTET. HERE IT IS SHOWN THAT EACH DIGIT IS PRECEDED BY DOT IS AN NUMBER BELONGING TO AN OCTET LIKE FIRST OCTET, SECOND OCTET , THIRD OCTET AND FOURTH OCTET. EACH OCTET IS AN NUMBER IN BINARY FORM WRITTEN IN 2^8=256 BINARY FORM HERE THE DIGIT SHOWS THAT A VARIABLE IS IN THE BY POWER OF 2, HERE I WANT TO SAY THAT AS COMPUTER UNDERSTANDS BINARY DIGIT IN WHICH THE VARIABLES ARE 0 AND 1.  AS THE COMPUTER UNDERSTANDS BINARY DIGIT SO IT HAS ONLY 2 VALUES. HENCE THE POWER IS WRITTEN IN 2. SO THE

RULES OF LOGIC ---> INTERNET PROTOCOL

 RULES OF LOGIC---->INTERNET PROTOCOL FRIENDS, TODAY I AM GOING TO DISCUSS SOMETHING ABOUT IP ADDRESSING.  IP IS A LOGICAL ADDRESS FULLFORM INTERNET PROTOCOL.  IT PROVIDES LOGICAL ADDRESS TO NETWORKING DEVICES.   THESE ADDRESSES ARE USED TO DEFINE SOURCE AND DESTINATION OF DATA PACKETS IP HAS TWO VERSIONS 1. IP VERSION 4 2. IP VERSION 6 IP VERSION 4 IT IS 32 BIT ADDRESS WRITTEN IN DECIMAL NUMBER  FORMAT  192.168.1.1 THE NUMBERS IN THE DIGITS LIKE 192.68.1.1 HERE EVERY NUMBER BEFORE THE DOT IS AN OCTET. HERE IT IS SHOWN THAT EACH DIGIT IS PRECEDED BY DOT IS AN NUMBER BELONGING TO AN OCTET LIKE FIRST OCTET, SECOND OCTET , THIRD OCTET AND FOURTH OCTET. EACH OCTET IS AN NUMBER IN BINARY FORM WRITTEN IN 2^8=256 BINARY FORM HERE THE DIGIT SHOWS THAT A VARIABLE IS IN THE BY POWER OF 2, HERE I WANT TO SAY THAT AS COMPUTER UNDERSTANDS BINARY DIGIT IN WHICH THE VARIABLES ARE 0 AND 1.  AS THE COMPUTER UNDERSTANDS BINARY DIGIT SO IT HAS ONLY 2 VALUES. HENCE THE POWER IS WRITTEN IN 2. SO THE

ANOTHER TYPE OF WINDOWS INSTALLATION.

ANOTHER TYPE OF WINDOWS INSTALLATION: MIGRATION INSTALLATION There are total three types of installation of windows 8.1.  Namely clean installation, upgrade installation and migration.  All of the three are important to learn.  But in this post i am going to tell you something about migration which is a most important type of installation.  So let us begin A clean installation of windows 8.1 is required before installation windows 8.1 by using migration scenario, followed by the migration of the user setting data from the older version of windows operating system to windows 8.1.   Depending upon your business environments, use two migration scenarios : side by side migration and inplace migration also known as refresh computer scenario. Both migration scenario require a clean installation of windows 8.1.   Migrating previous configuration from an old operating system requires to moving files and settings to clean installation of a windows 8.1 operating system.

WINDOWS 8.1 MOBILITY AND SECURITY IMPROVEMENTS

WINDOWS 8.1 MOBILITY AND SECURITY IMPROVEMENTS Friends i am going to say something about improvements and security improvements of windows 8.1 over windows 8.   So let’s get started. So let’s get started with mobility improvements Mobility improvements Virtual private network:   a number of vpn clients and the microsoft vpn clients are supported by the windows 8.1.   So let’s understand what vpn is.   vpn is a technology to or to say a type of connection method to provide security and privacy to the user of private as well as public networks.   Many organization as well as user want their data should be protected and this is when vpn provides. Mobile broadband: the embedded wireless radio is supported by the windows 8.1which helps to improve power efficiency and reduces the size of some devices. Broadband tethering:   windows 8.1 devices can be changed into wifi hotspot. Auto triggered virtual private network:   when an application requires the comp