STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

Similar documents
STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

STAR Watch. Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc.

Computer Overview. A computer item you can physically see or touch. A computer program that tells computer hardware how to operate.

What You Need to Know When Buying a New Computer JackaboutComputers.com

Within Kodi you can add additional programs called addons. Each of these addons provides access to lots of different types of video content.

Best practices to achieve optimal memory allocation and remote desktop user experience

Unit 4 Part A Evaluating & Purchasing a Computer. Computer Applications

INTRODUCTION. What You Need to Read. What this LANbook Covers

Cache introduction. April 16, Howard Huang 1

COMP 273 Winter physical vs. virtual mem Mar. 15, 2012

Contents Slide Set 9. Final Notes on Textbook Chapter 7. Outline of Slide Set 9. More about skipped sections in Chapter 7. Outline of Slide Set 9

Installing and Configuring the Voice UPB Bridge updated 1-Jan-2019

o MAC (6/18 or 33%) o WIN (17/18 or 94%) o Unix (0/18 or 0%)

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

PC I/O. May 7, Howard Huang 1

Program Update Clarification: (As a rule, uncheck all options when installing updates other than Windows updates) Windows Updates

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay!

Welcome to Part 3: Memory Systems and I/O

Slide Set 8. for ENCM 369 Winter 2018 Section 01. Steve Norman, PhD, PEng

Latency of Remote Access

NETWORK SET UP GUIDE FOR

Full file at

NOTE: In this chapter universal key commands are used unless JAWS key commands are specified.

The personal computer system uses the following hardware device types -

IC Memory Card : How to make it work with your FM-Towns computer or console (V /12/20)

Upload Your Site. & Update. How to

Lesson 1: Preparing for Installation

HCA Tech Note. Port Forwarding

How to set up your wireless network

Not long ago, home local area networks were proof of their owner s geekhood. They were very

The personal computer system uses the following hardware device types -

So computers can't think in the same way that people do. But what they do, they do excellently well and very, very fast.

Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software

(Refer Slide Time 00:01:09)

Lab Determining Data Storage Capacity

Computer Performance

Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018

XP: Backup Your Important Files for Safety

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Multi-Screen Computer Buyers Guide. // //

How do you connect to the Internet (WWW)? Internet connection alternatives:

Sahalsoftware college. Welcome To understanding Basic Computer Concept

Intel Core i7 Processor

Overview. Memory Classification Read-Only Memory (ROM) Random Access Memory (RAM) Functional Behavior of RAM. Implementing Static RAM

Computer Concepts for Beginners

Computer Technology Flash Card 2

Internet and Intranet Calling with PVX

Introduction to computers

High Speed. Internet BroadBand Router. User Guide

Memory and multiprogramming

Media-Ready Network Transcript

CSC 121 Computers and Scientific Thinking

An Introduction to Business Disaster Recovery

Components of a Computer System

CDs & DVDs: Different Types of Disk Explained

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

Table of Contents. Cisco Buffer Tuning for all Cisco Routers

What is Data Storage?

By Jeff Walker ProductLaunchFormula.com BLACKOUT.

Is Intel s Hyper-Threading Technology Worth the Extra Money to the Average User?

Memory Hierarchies &

Web Host. Choosing a. for Your WordPress Site. What is web hosting, and why do you need it?

On following pages I explain the steps to be performed, for having this Web Filtering product installed.

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;

2

Networking Jamie Tees

Minimum System Requirements for Horizon s new Windows Product

Multi-Homing Broadband Router. User Manual

CONTENTS. Getting connected. Ethernet Setup. Connecting a Router. Logging on. Configuring DHCP in Windows. Configuring DHCP on a Mac.

Chapter 2. Prepared By: Humeyra Saracoglu

CS 101, Mock Computer Architecture

Neighborhood HiSpeed Quick Start Guide

Craigslist Quick Tricks Manual helping you get your ads on Craigslist and getting people to click through to your site or product offer

Computer Basics PC-100

Contents. 2 NB750 Load Balancing Router User Guide YML817 Rev1

Understanding Routers, Switches, and Network Hardware

Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0090 (PDF)

Part 1: Understanding Windows XP Basics

Network Processors and their memory

Homeschool Enrichment. The System Unit: Processing & Memory

Broadband Router DC-202. User's Guide

COMPUTING FUNDAMENTALS I

The Total Network Volume chart shows the total traffic volume for the group of elements in the report.

A NETWORK PRIMER. An introduction to some fundamental networking concepts and the benefits of using LANtastic.

goals review some basic concepts and terminology

Introduction. A Look Inside a Laptop Computer. What is inside a laptop computer? What is Inside a Laptop Computer?

7/28/ Prentice-Hall, Inc Prentice-Hall, Inc Prentice-Hall, Inc Prentice-Hall, Inc Prentice-Hall, Inc.

System Unit Components Chapter2

1 GSW Bridging and Switching

June 2004 Now let s find out exactly what we ve bought, how to shop a new system and how to speed up an existing PC!

What to Look for When Buying a Computer

Topic :- COMPUTER BASICS Subject :- COMPUTER BASICS Class :- I Semester BCA

PDF created with pdffactory Pro trial version How Computer Memory Works by Jeff Tyson. Introduction to How Computer Memory Works

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Chapter 6 Objectives

LevelOne Broadband Routers

Memory Management. Kevin Webb Swarthmore College February 27, 2018

Transcription:

STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc. Volume 8 Issue 4 September 2004 Double the Capacity: Twin WAN Routers Become Affordable In a standard hookup, the DSL or cable line connects to a modem, which connects to the WAN port of the router, which connects into the local area network via a hub or switch. In a twin WAN router system, two DSL or cable modem lines, each connected to a separate modem, are connected to the WAN1 and WAN2 ports of the router. The router has only a single connection to the local area network. When users fire up their favorite web browser, the router decides which DSL line to use to connect them to the Internet. Advantages Twin WAN routers offer organizations options without pillaging the budget: If a failure occurs on one line, the router automatically shifts all traffic to the other line. Things might be a little slower, but they don t stop. The router can balance the traffic loads between the two lines. These routers allow administrators to specify the percentage of traffic to be handled by each of the lines. Because of this feature, the bandwidth of the two lines do not have to be identical to achieve load balancing. If your organization has its web server inhouse, it is not necessary to have a separate network connection on the server for every public IP address. The twin WAN router looks like a single router to the web server. Sometimes, ISPs price their services such that buying multiple lower-speed lines is cheaper than buying a single line that equals the combined bandwidth of the lower speed lines. It might actually reduce the cost of Internet service. In this issue Double the Capacity: Twin WAN Routers Become Affordable Simpler, But More Confusing: Intel Renames It s Processors Latest Big Hard Drives Cause Problems WNYLC Web Statistics

STAR Watch - 2 September 2004 Even though each of these routers only has two ports, an organization is not limited to a maximum of two lines. Through the use of multiple twin WAN routers, an organization could combine the bandwidths of any number of DSL or cable services. For example, if an organization wanted to combine the bandwidths of four data lines, lines 1 and 2 would connect to twin router A and lines 3 and 4 would connect to twin router B. Routers A and B would be plugged into the WAN ports of twin router C. Router C is connected to the local network. The usable bandwidth of a DSL line decreases as the distance from the ISP increases (The maximum line distance for DSL is approx. 18,000 feet). Depending on the distance from the ISP, it may not be possible to get a single data line with enough bandwidth to meet an organization s needs. Combining the bandwidth of multiple slower lines might be a solution. Other Features Like single line routers, Twin WAN routers offer a multitude of options. Depending on the make/model of router, not all features listed below will be present on any specific router: NAT/Firewall Virtual Server for setup local web, email, FTP servers Block users' access of specific web sites Control users' internet access days & times URL blocking by address or keywords DMZ re-direct all packets from WAN port to specific local IP Intrusion Detection QoS Bandwidth Control DHCP Services Remote Management VPN Support UpnP Multiple LAN Ports Manufacturers, Models and Prices New twin WAN routers are coming to market every day. The products listed below are representative of what is available today in a variety of features and prices. The prices shown are the lowest prices we found for the product at www.pricegrabber.com and other sources on the Internet. As with all purchases, you must do your own investigation to determine if a specific product will meet your needs. Hawking H2BR4 $57 Xincom XC-DPG402 $99 BroDigit NFR3024 $100 Edimax 6524 $144 Xterasys XR-4106 $150 Xincom XC-DPG502 $187 HotBrick HB-LB2 $189 Linksys-Cisco RV082 $268 Xincom XC-DPG503 $309 HotBrick 600/2 $489 Xincom XC-DPG602 $629 Xincom XC-DPG603 $849 ZyXel ZyWall 35 $872

STAR Watch - 3 - September 2004 Simpler, But More Confusing: Intel Renames It s Processors After years of using processor speed as the primary naming scheme, Intel has decided to simplify its naming of processors. Anyone who owns a BMW automobile will easily understand this new system: any processor number starting with 3 is considered entry level (like the BMW 3-Series automobiles), those that start with 5 are considered mid-range, and those starting with 7 are high-ticket and high performance. So far, it seems pretty good (3 = cheap; 5=not-so-cheap; 7=expensive). Supposedly, Intel determined the new names by considering the CPU s architecture, cache size, clock speed, bus speed and other unnamed factors. Unfortunately, this newer, kinder naming system provides absolutely no guidance to users trying to determine which processor will meet their needs. The new naming scheme seems to imply some relationship between processor number and level of performance (Intel wants everyone to remember that higher numbers mean better processors). However, they don t even begin to answer any questions about what better means (Better for Intel because they make more money?). The end-result of all of this processor naming hype is more confusion among consumers. While the technology geeks will quibble about processor architecture and manufacturing processes and how they affect processor performance, for the consumer, it s really very simple: 1. If your current computer runs your favorite applications fast enough to please you and you are not planning to add any new applications, probably everything is fine. 2. If you are planning to purchase a new computer application, check out the minimum and recommended hardware to run the application (It s printed on the box). Consider that the minimum requirement is the vendor s best guess about what computer hardware would allow that application to operate at some minimum level of performance-- to them. Maybe they are more impatient than you are. Maybe the thought of shelling out a lot of money for new computer hardware will allow you to be more patient. Consider that the recommended hardware configuration is probably at a level where any additional performance improvement would not be noticed. Here are the new processor names along with some useful information about each processor. Processor Processor Clock L2 Hyper- SSE3 Number Family 1 Speed 2 Cache 3 Thread 4 Instr. 5 320 Celeron D 2.40 256 KB No Yes 325 Celeron D 2.53 256 KB No Yes 330 Celeron D 2.66 256 KB No Yes 335 Celeron D 2.80 256 KB No Yes 520 Pentium 4 2.80 1 MB Yes Yes 530 Pentium 4 3.00 1 MB Yes Yes 540 Pentium 4 3.20 1 MB Yes Yes 550 Pentium 4 3.40 1 MB Yes Yes

STAR Watch - 4 - September 2004 Processor Processor Clock L2 Hyper- SSE3 Number Family 1 Speed 2 Cache 3 Thread 4 Instr. 5 560 Pentium 4 3.60 1 MB Yes Yes 310 Celeron M 1.20 512 KB No No 320 Celeron M 1.30 512 KB No No 330 Celeron M 1.40 512 K No No 340 Celeron M 1.50 512 B No No 518 Mobile Pentium 4 2.80 1 MB Yes Yes 532 Mobile Pentium 4 3.06 1 MB Yes Yes 538 Mobile Pentium 4 3.20 1 MB Yes Yes 715 Pentium M 1.50 2 MB No No 725 Pentium M 1.60 2 MB No No 735 Pentium M 1.70 2 MB No No 745 Pentium M 1.80 2 MB No No 755 Pentium M 2.00 2 MB No No Notes 1 Processor Family generally describes the internal architecture of the processor. Celeron D and Pentium 4 processors are designed for use in desktop computers or network file servers. Celeron M, Mobile Pentium 4, and Pentium M are designed for laptop computers. 2 Clock Speed describes the operating frequency of the system processor chip. While it is generally true that increased clock speed means increased performance, it is only true when comparing processors that are in the same processor family. Comparing clock speeds of processors from different families gives no information about relative performance. 3 More cache memory usually improves the performance of the processor, since the computer instruction or data can be accessed more quickly from cache than from RAM or disk. 4 If an application was written to take advantage of hyperthreading AND the operating system supports hyperthreading AND the processor is able to hyperthread, the application performance is 10 15% better than an equal processor without hyperthreading capability. So far, the only operating system that supports hyperthreading is Windows XP. 5 SS3 instruction set was recently announced as an improvement to the Pentium 4 processors. Without getting into a lot of technical detail, it improves the performance of the processor when processing multimedia data (audio, video, games, etc.) and hyperthteading. Until application developers begin to include SS3 processor instructions in their application code, these new instructions will not be executed. Unless the application specifically states that it can use this processor feature (read the box), it probably doesn t. It will probably take 3 5 years before these instructions are integrated into the majority of computer applications.

STAR Watch - 5 - September 2004 Latest Big Hard Drives Cause Problems With the latest round of hard drive price cuts combined with huge increases in storage capacity, many computer users have opted to replace the hard drive on their computer with one of these new monsters with capacities up to 400 Gigabytes. Everything proceeds according to plan until it is suddenly realized that something is missing. No matter what the user does, the capacity never manages to exceed 137.4 Gigabytes. So what happened? Well, there s good news and there s bad news. The good news is all of the capacity is really there. The bad news is the computer doesn t know how to use it yet. This problem occurred twice before in the history of personal computers. It reared its ugly head first when hard drive capacities exceeded 512 Megabytes, and then again when the capacities jumped above 8.4 Gigabytes. The problem: The data field that contains the addressing information for the hard drive is too small again. There are two ways to solve this problem. The simplest, and least demanding way to regain the missing space is to create a second partition on the drive. The best news about this method is the fact that the data already on the disk can remain there. It will not need to be reloaded. The second partition would be treated as if it were a completely different drive and would have its own unique drive letter associated with it. In most situations, this is probably a reasonable solution. There is little if any performance degradation by using this method. But sometimes, a single large partition must be present. In that situation, more work is required that is not for the faint of heart. For most computers, the information contained in the BIOS must be updated. BIOS (Basis Input/Output System) contains very basic information that is used by the operating system to tell it about the computer hardware that it is running on. One of those pieces of information is the data field that contains the size of the hard drive partition, among other things. Unlike operating system updates, one size does not fit all. You must find the BIOS update that was written for the specific make and model of computer that you are using. When in doubt, pay someone to do this who has the expertise. Now that the computer has the ability to store the actual size of the complete hard drive, you must remove the current partition from the disk. When you do this, you will lose all of the data that was contained in the 137 Gigabyte partition (Alternative #1 is sounding better, right?). After all partitions have been removed from the disk, a single partition equal in size to the drive s capacity can be defined. After this is complete, the drive must be formatted and all of the data, programs, etc. can be reloaded. Now you have one big monster hard drive. If hard drives continue to get larger and larger, could this happen again? The sad answer is yes. But don t be too sad. It won t happen again until hard drive capacities exceed 144 Petabytes. Since 1 Petabyte = 1 Million Gigabytes, it should not be happening in the near future. Enjoy yourself until then.

STAR Watch - 6 - September 2004 WNYLC Web Statistics For August 2004 Total Hits.326,287 Total User Sessions 42,632 Average Hits/Day (Monday Friday)...13,701 Average user Sessions/Weekday...1,671 Number of Pages Viewed.105,708 Average Number of Pages Viewed Per Day....3,303 Number of Documents Viewed..72,622 Accessed Using Internet Explorer...89% Accessed Using Netscape... 4% Operating Systems Used: Windows 98.....28% Windows 2000... 20% Windows XP.....36% Windows 95... <1% Windows ME....2% Windows NT. <1% Macintosh.. <1% Linux/Unix. <1% Star Watch is made possible through a grant by the IOLA Fund of New York State. WHO WE ARE Joe Kelemen - Attorney Kathleen Lynch - Attorney Tom Karkau - Programmer Carly Bouchard - Administrative Assistant Wnylc@wnylc.com 716-855-0203 www.wnylc.net Western New York Law Center, Inc. 237 Main Street, Suite 1030 Buffalo, New York 14203