Wide Area Network (WAN)

Types and Characteristics of WANs

What is a WAN?

There are two prevailing definitions of a Wide Area Network (WAN). The book definition of a WAN is a network that spans large geographical locations, usually to interconnect multiple Local Area Networks (LANs). The practical definition of a WAN is a network that traverses a public network or commercial carrier, using one of several WAN technologies

What are its Main Components?

The main components for a WAN are routers, switches and modems. These components are described below in the hardware section.

CPE – Devices on the subscriber premises are called customer premises equipment (CPE).

The subscriber owns the CPE or leases the CPE from the service provider. A copper or fiber cable connects the CPE to the service provider’s nearest exchange or central office. This cabling is often called the local loop, or “last-mile”.

DTE/DCE – Devices that put data on the local loop are called data circuit-terminating equipment, or data communications equipment (DCE). The customer devices that pass the data to the DCE are called data terminal equipment (DTE). The DCE primarily provides an interface for the DTE into the communication link on the WAN cloud.

Hardware

In a WAN you will need various types of hardware components for it to function. The typical items of hardware that you will need in a WAN are:

Router – An electronic device that connects a local area network (LAN) to a wide area network (WAN) and handles the task of routing messages between the two networks. Operates at layer 3, and makes decisions using IP addresses.

Switch – A switch is a network device that selects a path or circuit for sending a unit of data to its next destination. Operates at layer 2, and uses MAC addresses to send data to correct destination.

Modem – Short for modulator/demodulator, a modem enables a computer to communicate with other computers over telephone lines. Operates at layer 1, where signals are converted from digital to analogue and vice versa for transmission and receiving.

Wan Standards

WANs operate within the OSI model using layer 1 and layer 2 levels. The data link layer and the physical layer. The physical layer protocols describe how to provide electrical, mechanical and functional connections to the services provided by the ISP. The data link layer defines how data is encapsulated for transmission to remote sites.

Encapsulation

Encapsulation is the wrapping of data in a particular protocol header. Remember that WANs operate at the physical layer and the data link layer of the osi model and that higher layer protocols such as IP are encapsulated when sent across the WAN link. Serial interfaces support a wide range of WAN encapsulation types, which must be manually specified. These types include SDLC, PPP, Frame delay etc. Regardless of WAN encapsulation used it must be identical on both sides of the point to point link.

Packet and Circuit Switching

Circuit switching and packet switching are both used in high-capacity networks.

The majority of switched networks today get data across the network

through packet switching.

Circuit-switching is more reliable than packet-switching. Circuit switching is old and expensive, packet switching is more modern.

General Routing Issues

What is a Routing Protocol?

A routing protocol is a protocol that specifies how routers communicate and exchange information on a network. Each router has prior knowledge of its immediate neighbours and knows the structure of the network topology. The routers know this because the routing protocol shares this information.

Protocol

RIP (Routing Information Protocol) was one of the most commonly uses protocols on internal networks. Routers use RIP to dynamically adapt changes to the network connections and communicate information about which networks routers can reach and the distance between them. RIP is sometimes said to stand for Rest in Pieces in reference to the reputation that RIP has for breaking unexpectedly and rendering a network unable to function.

Routing Algorithms

Distance Vector

This type of routing protocol requires that each router simply inform its neighbours of its routing table. The distance vector protocol is also known as the bellman-ford algorithm.

Link State

This type of routing protocol requires that each router maintain a partial map of the network. The link state algorithm is also know as Dijkstra’s algorithm.

IGRP

IGRP is a type of distance vector routing protocol invented by cisco used to exchange routing data in a autonomous system. Distance vector protocols measure distances and compare routes. Routers that use distance vector must send all or a portion of their routing table in a routing update message at regular intervals to each neighbour router.

Addressing and Routing

What does routing mean?

Routing is the process of deciding how to move packets from one network to another.

The directions also known as routes can be learned by a router using a routing protocol then the information is passed from router to router along the route of the destination.

IP Address’s

Every machine connected to the internet is assigned an IP address. An example of an IP address would be 192.168.0.1. IP addresses are displayed in decimal format to make it easier for humans to understand but computers communicate in binary form. The four numbers that separate an IP address are called Octets. Each position consists of eight bits. When added to together you get 32 bit address. The purpose of each octet in an IP address is to create classes of IP addresses that can be assigned within a network. There are three main classes that we deal with Class A, B and C. The octets of an IP address are split into two parts Network and Host. In a class A address the first octet is the network portion, this determines which network the computer belongs to, the last octets of the address are the hosts that belong to the network.

Sub netting

Sub netting allows you to create multiple networks within a class A, B or C address. The subnet address is the address used by your LAN. In a Class C network address you would have a subnet mask of 255.255.255.0. A subnet mask identifies which portion is network and which is host. For example 192.168.6.15 the first octet three octets are the Network address and the last octet being the host(Workstation). It is important to subnet a network because gateways need to forward packets to other LANS. By giving each NIC on the gateway an IP address and a Subnet mask it allows the gateways to route packets from LAN to LAN. Once the packet arrives at its destination, the gateway then uses the bits of the subnet portion of the IP address to decide which LAN to send the packets.

Circuit Switched Leased Lines

A circuit switched network is one that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Here are some terminologies associated with a Circuit switched network.

Frame relay is a telecommunication service designed for cost-efficient data transmission between local area networks (LANs)

Basic rate interference is a service used by small business for internet connectivity. An ISDN BRI provides two 64 Kbps digital channels to the user.

Primary rate interface (PRI) is a telecommunications standard for carrying voice and data transmissions between two locations

All data and voice channels are ISDN and operate at 64kbit/s

Packet Switching

http://www.raduniversity.com/networks/2004/PacketSwitching/main.htm – _Toc80455261

Packet switching refers to protocols in which messages are broken up into small packets before they are sent. Each packet is then transmitted over the Internet. At the destination the packets are reassembled into the original message. Packet switching main difference from Circuit Switching is that that the communication lines are not dedicated to passing messages from the source to the destination. In Packet Switching, different messages can use the same network resources within the same time period.

http://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode

Asynchronous Transfer Mode (ATM) is a cell relay, packet switching network and protocolwhich encodes data into small fixed-sized cells.

ISDN is used to carry voice, data, video and images across a telephone network. ISDN stands for integrated services Digital Network. Isdn also provides users with a 128kbps bandwidth. This is done through frame relay. Frame relay complements and provides a service between ISDN, which offers bandwidth at 128 Kbps and Asynchronous Transfer Mode which operates in somewhat similar fashion to frame relay but at speeds from 155.520 Mbps or 622.080 Mbps. Frame relay is based on the older X.25 packet switching technology and is used to transmit analogue signals such as telephone conversations.

PSDN stands for packet switched data network and is a data communication network. Packet switched networks do not establish a physical communication signal like the public telephone does (circuit switched network) Packets are sent on a fixed length basis and assigned with a source and a destination address. The packets then rely on the routers to read the address and route the packets through the network.

Mobile and Broadband Services

Digital Subscriber line(DSL) is mainly used to bring high bandwidth connections to homes and small business’s over a copper wire telephone line. This is can only be achieved if you stay within the range of the telephone exchange. DSL offers download rates of up to 6mbps allowing continuous transmission of video, audio and 3D effects. DSL is set to replace ISDN and compete with the cable modem in providing multimedia to homes. DSL works by connecting your telephone line to the telephone office over copper wires that are twisted together.

Asymmetric Digital Subscribers Line is most commonly used for home users. It provides a high download speed but a lower upload speed. Using ADSL, up to 6.1 megabits per second of data can be sent downstream and up to 640 Kbps upstream.

http://en.wikipedia.org/wiki/Symmetric_Digital_Subscriber_Line

Symmetric Digital Subscriber Line is a digital subcriber line which runs over one pair of copper wires. The main difference between ADSL and SDSL is the difference in upload and download speeds. SDSL allows the same upstream data rate and downstream data rate as ADSL upstream can be very slow.

[http://searchnetworking.techtarget.com/sDefinition/0],,sid7_gci558545,00.html

HDSL High bit-rate Digital Subscriber Line, one of the earliest forms of DSL, is used for wideband digital transmission within a corporate site and between the telephone company and a customer. The main characteristic of HDSL is that provides equal bandwidth in both directions.

IDSL is a system in which data is transmitted at 128 Kbps on a regular copper telephone line from a user to a destination using digital transmission.

The Local Loop enables operators to connect directly to the consumer via copper local loops and then add their own equipment to offer broadband and other services. This process involves operators accessing local exchange buildings to connect to a network of copper lines which connect them to homes and businesses. BT is an Example of a Local Exchange. The local loop connecting the telephone exchange to most subscribers is capable of carrying frequencies well beyond the 3.4 kHz upper limit.

Benefits of using DSL

DSL can provide virtually instantaneous transmission of voice, data and video over ordinary copper phone lines. A DSL connection can eliminate delays when waiting to download information and graphics from the Internet. It provides users with a cost effective high speed Internet connection. Another benefit is that a DSL connection is always on-line (like a LAN connection) with no waiting time for dialling or connecting.

There are now more than 10 million broadband connections in the UK. By December 2005 there were 9.792 million broadband connections in the UK and the average broadband take up rate during the three months to December was more than 70,000 per week.

Dog Health Concerns and Common Diseases

Dogs are truly man’s best friend. These loyal, loving, protective and playful creatures have served beside man for thousands of years with an undying and relentless devotion. It’s hard to repay such a service of love, commitment and duty. When put to the basics, we provide our dogs with shelter, healthy nutrition, exercise and friendship. However, a dog’s health and well-being sometimes goes beyond the basics, requiring an owner with an eye for disease risks and proper veterinary care.

If you’re a dog owner, you should make sure your animal sees a qualified veterinarian on a regular basis. The range of diseases, parasites and genetic conditions that dogs can succumb to is vast, so it’s important to keep up your pet’s vaccines, stick to regular check-ups and also know what to look for.

Keep reading to learn about some of the most dangerous and fatal diseases that can afflict your beloved pet along with effective prevention methods.

1. Canine Distemper Virus (CDV)

CDV attacks the respiratory, gastrointestinal and central nervous systems. The disease is contracted through contact with other infected dogs and can be fatal to both young and old dogs. Symptoms include vomiting, diarrhea, fever, shivering, redness around the eyes, loss of appetite, weight loss, seizures, thickened footpads, cough and a discharge from the nose. There is no specific treatment, but sometimes antibiotics can be effective. However, a vaccine exists and should always be administered.

2. Canine Adenovirus or Infectious Canine Hepatitis (ICH)

Infectious Canine Hepatitis (ICH) is an acute liver disease, and highly contagious. The virus is transmitted through bodily fluids like urine, eye or nose secretions. Young and old dogs can be affected by ICH, but puppies are at a higher risk. Symptoms include fever, loss of appetite, vomiting, jaundice and corneal edema, though a blood test is needed to make a final diagnosis. Many dogs recover, but it’s best to prevent ICH through a simple vaccination.

3. Para Influenza or Tracheobronchitis (aka Kennel Cough)

The common name for Tracheobronchitis is Kennel Cough because of its propensity for spreading in close quarters, such as in a boarding kennel. It’s highly contagious and attacks the dog’s upper respiratory system. Like bronchitis in humans, the symptoms are coughing, snorting, hacking and sometimes fever. Kennel Cough can be treated with antibiotics or prevented through vaccination.

4. Rabies

Rabies is not just a dog disease; it will affect all mammals that are not vaccinated against the disease. Rabies directly attacks the brain and the prognosis is often deadly. This common disease can be easily prevented through vaccination. In many states, vaccination for domestic pets is absolutely mandatory.

In short, keep your dog healthy by making sure it gets regular vaccinations. Almost all diseases are preventable.

What You Really Need to Know About a MPLS Network

MPLS… or Multi-Protocol Label Switching…. seems to be the buzzword for connecting company data networks these days. But MPLS is really nothing new. It’s been around awhile actually. Maybe now it’s just gaining more popularity and thus noticeable public acceptance and notoriety. Rightfully so too. MPLS offers lots of advantages over traditional T1 point-to-point WAN architectures.

But….. to decide if MPLS is really a good fit for your network requirements….. there’s some things you need to understand first.

There’s no one “MPLS Service”. A lot of what you get will depend how the service provider has Engineered and built their core network. Bear in mind that many carriers don’t own the whole network, but will piece together a service from other carriers networks, or will interconnect with other carriers to extend their reach.

Cell-mode MPLS was mentioned: basically this is ATM which has been retro-fitted with MPLS. Be careful with this for VoIP applications because it can use bandwidth very inefficiently.

MPLS can support QoS, but many services aren’t engineered with this, or only with very basic prioritization. Also the services are very often structured to reduce the potential complexity and to ensure the network can cope. Bear in mind a typical MPLS router can only carry a percentage of “high-priority, real time” traffic. If everyone sends all their data as high priority then the benefit is lost, and the network may suffer. Usually QoS is provided as a small number of service classes, typically 3 or 4.

The biggest bottleneck in any such service is normally the tail circuit to each of your premises. If you move from a T1 mesh to a MPLS service then you will likely find that some sites need more bandwidth than others. Tracking the requirement for this bandwidth is usually your problem, although the service provides may give you some reporting tools to assist with this. I would avoid service providers who cannot offer this as it will make it very difficult for you to manage your bandwidths.

If you factor in multiple service classes then your management of these tail circuits gets more complex as you no only have to work out how much bandwidth is required for each tail circuit, but how much of it should be reserved for each service class.

Regarding resilience, within the service providers core, the service is normally highly resilient to failures. However, when failures do occur, very often (depending on how the service is engineered) the rerouting can take a second or two. During this network re-convergence you will lose packets. Depending on the protocol your traffic uses this can be unimportant or devastating. For instance, some VPN and VoIP services don’t survive this well.

Normally resilience is not automatically provided all the way to the customer. Typically you will have one tail circuit and one router at each site. If either fails (or if the Service provider’s PE router has problems) you will lose service to the site, totally.

If this is an issue, you need to factor in dual connections. There’s multiple ways of doing this, and different service providers will offer different options. Make sure you get your Network Engineer involved as the devil is in the detail here, and some options which sound like they provide a fantastic level of resilience may not be as good as they sound, depending on how your internal network is configured.

And, of course, the key to all of this is SLAs: what do they offer? What happens if they break them? How do they report them to you?

Generally speaking, MPLS services are a great way to run a multi-site data network including VoIP services. I have seen many carriers and their customers doing this successfully for years.

Strictly speaking MPLS does not provide QoS. QoS is done by prioritizing traffic, and most IP routers, even those on the backbone of the Internet, can do this. The difference is whether they are configured to do this or not. In an MPLS network MPLS is provided by standard router features. MPLS technology (specifically Traffic Engineering) gives the carrier better control over how this traffic is prioritized and routed (and restored in case of network fault). All this does is give them the confidence to support SLAs.

As I mentioned, “QoS” is provided as a set of “service classes”. Typically these are things like “real-time”, “high-priority” and “everything else”. Mapping actual traffic into these classes can be done in a few different ways, but this is largely up to you to control. For instance, you could quite easily put web-browsing traffic into “real time” although this would normally be a dumb thing to do.

I would suggest the case for MPLS in terms of performance, cost and continuity against ‘traditional’ or ‘legacy’ data networks is now pretty robust, i.e. MPLS provides significant advantages in all 3 areas.

The key considerations when migrating include provider selection, access media (e.g. using Ethernet rather than SDH/SONET), the decision on procuring a managed or unmanaged service (often called wires-only) and the providers ability to map their CoS/QoS to the applications you need to support. This is especially important if you are operating any proprietary applications.

There is also an increasing trend to use WAN Optimization/application management solutions either as a value added service from the provider or from an alternative integrator or indeed doing it in house. This is important say for voice or applications such as CITRIX.

MPLS providers also now offer a whole suite of value added services such as integrated internet, managed network based firewalls and remote user support. If these are important to you make sure the providers demonstrate how this is achieved.

In selecting your provider ensure they have good geographic coverage in your areas and experience within your market segment. I always recommend requesting up to 3 references. Equally I think it is wise to understand how important a client you will be to the provider. It’s all well and good using the market leader (say according to Gartner)….. but you’ll often get a better service from a provider who values and really wants your business.

Need help designing the right MPLS configuration for your network? There’s a ton of resources….. free and fee….. listed and discussed at Broadband Nation.

Underground Electric Dog Fence

An underground electric dog fence is a great way to keep your dog safe from the street or roaming into uninvited areas like your neighbor’s yard. They come in a variety of sizes to fit all dogs: underground fences for little dogs of under 12 lbs, average sized dogs and even large dogs as well as extra wire for larger acres of land. The electric fence can be buried underground, stapled above ground or attached along an existing fence. These fences give precise and consistent correction and some are specifically made for the stubborn dog with strong retriever tendencies or low sensitivity and in need of beeps and stronger vibration for them to get the message.

These underground wired fences work on slopes or in hilly areas, treed lots, in water and acres of land. Their precision and consistent correction capabilities allow for good reliability near busy streets. The variety of collars that are interchangeable make them great for small dogs, like a Chihuahua or a large dog like a Great Dane.

A small indentation or groove made in the pavement is big enough for the wire to be brought beyond the driveway to the extended yard making the dog fence very practical, just backfill the driveway with outdoor sealant. If you don’t want to buy wire get the staples and run the wire above ground. Zip ties can help you secure the wire along an existing fence.

Correction depends upon the dog receiving the   transmission . Therefore, you need to make sure that the receiver collar is the right size for your dog. It should not be smaller than the space of your two fingers between the collar and his neck (we don’t want to choke poor “Pooch”!), but the prongs need to touch the skin of your dog in order for the shock to be felt. Remember, it’s a harmless shock that is meant to catch your dog’s attention and change his current behavior. Long or medium haired dogs may need a scissor cut around the neck area so the prongs will contact the skin. If necessary, there are long pronged collars available for the long haired dog as well.

We love our dogs but, let’s face it, nothing is certain with them for dogs are naturally impulsive. Therefore, even with the underground electric dog fence training is imperative if you want a great chance of solid obedience. We highly recommend training the dog before actually using any system. Flags are available for training the dog to learn the boundary. Take 2-3 weeks, depending on your dog, to walk around the boundary with the flags so “Pooch” can see where the boundary is. Then place the collar on him and walk around with him guiding him to retreat when the signal on the collar transmits a warning. Before you know it, your dog will readily stay within the boundary of the underground electric dog fence without your presence because he won’t know that he can run through it!

Have You Ever Heard of Viral Marketing?

Viral Marketing is the spread of a word from one person to many others on a quick basis similar to a virus by an infected patient to other people surrounding him/her. It’s a new form of informal advertising by passing along a message or making other people aware about a product or a service just by talking about it.

The name viral is derived from the image of a person being infected with the marketing message, then spreading it to friends like a virus. The major difference, however, is that the customer voluntarily sends the message to others.

Viral Marketing messages include ads for goods and services, hyperlinked promotions that take someone immediately to a website, online newsletters and various games. Statistics indicate that 81 percent of recipients who receive a viral marketing message pass it along to another person. Almost 50 percent pass it along to two or more people.

The marketing message can be more deliberate such as when an individual recommends something to a friend. It can also be transmitted passively, when the message is simply attached to an email. Viral Marketing allows a firm to gain rapid product awareness at a low cost.

The main advantage of implementing viral marketing technique is getting fast and effective results by using this technique widely on the Internet. This gives a better exposure to the website as well as its owner and make other people aware of its existence. It also helps in conveying the desired message to a larger audience therefore building a good reputation for both the company/website and the owner.

Another benefit is that the more popularity the website gain, the bigger number of webmasters it will attract who will be willing either in exchanging links or just placing inbound links. This will definitely increase the value of the website by having external links which will ultimately result in improving its page rank with search engines.

The number of visitors to the website will also rise on a regular basis as it gains popularity and search engine ranking. The website owner will really benefit from the high volume targeted traffic that is going to blow his or her website fame and shoot up his or her revenue. Therefore, I can not emphasize more on the importance of viral marketing in boosting the Internet Marketing industry these days.

Blue Marble, a viral marketing company, created a program for Scope mouth wash. Consumers were able to send a customized, animated e-mail – kiss – to their friends. The attached marketing message reinforced the brand message that Scope brings people – kissably close. People who received the e-mail kiss could then forward the message to someone else. Scope’s tracking technology indicated most did forward the message.

The term – viral – may connote the negative image of a computer virus. Consequently, More concern should be shown when offering this program to a certain company. Company leaders may want to find some other term to describe the technique to the general public so that no undue suspicion or fear arises.

Marine VHF Radio

Types of VHF sets:

Non-DSC sets

Non-DSC VHF sets on yachts and motorboats will still continue to work, will still be legal to use and certificate holders do not need to do a conversion course until they choose to upgrade. After 2005 Coastguards will cease to monitor Channel 16 in the way that they do now, that is with a dedicated officer on headset watch 24 hours a day, but they will continue to have a loudspeaker watch on channel 16 in the operations room. Increasingly the boat without VHF DSC radio will be at a disadvantage.

A transportable set is an invaluable second radio for use in an emergency when it can be taken into a life raft or used on deck to communicate in a rescue situation. It is useful for safety reasons in a tender when going ashore or in a safety boat when organising dinghy sailing events. A portable set is a good buy for non-boat owners who charter or who go afloat occasionally. They have a limited range but do require licensing and certification. Portable sets with a very limited DSC facility are available. They are intended as an addition to a full VHF DSC set, not as a substitute. Note that the portable set covered by a ship’s radio licence can only be used on the vessel covered by the licence or by its tender(s). It is illegal to use the portable ashore.

VHF DSC radio sets

From 2001 all new non-portable radios sold must be VHF-DSC or be capable of being converted to DSC by the addition of an extra ‘black box’. These are called DSC Controllers. It will provide the digital selective calling (DSC) facility which is the special feature of the new type of set. What this does is to send, on channel 70, a burst of digital signals in a code to ‘call up’ another DSC set. This call can be directed at an individual, using their MMSI, a group of boats or ‘all stations’ in an emergency. Once the link has been established by the digital ‘call’, normal voice   transmission  will be used. The DSC is essentially a new method of establishing communications, more reliably than was possible before. The digital signals are of high radio quality and rapid, the alert taking just 0.5 seconds. It can be used in both routine and distress situations.

There are different classes of controller with varying levels of capability for use in different types of vessel.

The Class D controller is the one designed for use with VHF on yachts and motorboats who make passages within VHF range of the coast. Fitting one of these is not compulsory on private boats. On small boats used at sea commercially, sea school boats for example, it may become a requirement. This will be to the great advantage of their students who will be able to see the sets in use and appreciate their advantages.

Other controllers for VHF DSC are available to meet the requirements of ships. These include Class A and B Controllers, which have enhanced capabilities.

What is the range of the set?

Those sailing across an ocean, or even the Bay of Biscay, need radios that transmit over vast distances. Licensing arrangements are different too.

The range of  transmission  of VHF radio telephones is limited by a number of factors. The height of the aerial is very significant as the propagation of the radio waves is only slightly more than ‘line of sight’. This includes the aerial height of both the transmitting and the receiving station.

When talking from yacht to yacht expect a range of 10 to l5 miles with aerials fitted at the tops of the masts. Those commonly fitted to yachts are known as ‘unity gain’ aerials. They are made of thin wire and often have wind instruments attached. They are recommended because, although the range is not as good as the taller rigid aerials used on motorboats, they cope better with the heeling effect often experienced on yachts! The better range of a ‘high gain’ motor cruiser aerial is only achieved if it is mounted vertically.

It should be possible to talk to a Coastguard station from 30 to 40 miles offshore because of the height of their aerial.

Transmitting range is also affected by the transmitting power of the set. The maximum power allowed is 25 watts. There is also a low power setting, which reduces the transmitting power to 1 watt. This should be used for all short range routine communications. You might think that it is always a good idea to broadcast your signal as far as possible. This it not so. Remember that each channel can only be used for one  transmission  at a time. Powerful signals cause more inference to other radio users. If you are calling another craft nearby or a marina, use low power. Try to use low power for all routine communications. The use of low power does not change the receiving range of the set.

A portable VHF set has yet another type of aerial. This is flexible and will operate at a wider range of angles. The low aerial height and a maximum power output of 5 watts reduces the range of  transmission  of these sets. Between portable radios the range can be up to 5 miles, increasing to 10 miles to a Coastguard station, if there is no land in the way! Remember, with portable radios there is always the risk that the battery will go flat.

The information about ranges of  transmissions  is for average conditions and good circumstances. Ranges can be influenced by:

o Atmospheric conditions, especially high pressure, can increase the range and cause interference from distant stations.

o Land. Boats operating near land may have poor reception with signals being blocked by hills or buildings.

o Incorrect installation of the aerial, or damage to the coaxial cable connecting the aerial to the set, can give poor reception.

o The proximity of other electronic equipment can cause interference.

For these reasons it is best to have the fitting done, or at least checked, by a professional electronics engineer.

A portable radio has a range of 5 miles to another portable, 10 miles to a Coastguard Station.

All distress calls should be transmitted on high power.

Many yachts carry emergency VHF aerials in case of dismasting, which is a very good idea, but failure of the electrical supply is a more frequent problem! The emergency aerial has a plug attached to connect it to the back of the set. For maximum range, situate the aerial as high as possible, but realistically expect a greatly reduced range. When the mast is lost, many people are surprised to hear the radio apparently still working. This is because the co-axial cable is acting as an aerial over a short range, but transmitting without an aerial will damage the set permanently.

A portable radio could be useful under these circumstances!

What is Bluetooth?

Bluetooth technology specifies a two-way, short-range radio link that enables communication between PCs, mobile phones, PDAs, and other computing, electronic, and home theatre equipment. With Bluetooth, you can easily synchronize contact or calendar data between a PDA and laptop, talk on a hands-free phone, or print without cables. It is a cable replacement technology like infrared, but offers many advantages over infrared.

The Bluetooth specification focuses on keeping costs low, power consumption minimal, and the size small. Its low power consumption means it can be used in battery-powered devices. Bluetooth offers faster data rates and greater   transmission  distances compared with infrared and there are no line-of-site restrictions. It operates at the 2.4 GHz radio frequency, ensuring worldwide operability.

History

Bluetooth is named after a 10th century Danish king, Harald Blatand (Harld Bluetooth) who was known for uniting warring groups in current-day Norway, Sweden, and Denmark. It was originally developed by Ericsson, but is now managed by the Bluetooth Special Interest Group (SIG).

The Bluetooth SIG is an industry group with members from the telecommunications, computing, and chip manufacturing industries. To date over 2000 companies are members. The Bluetooth SIG oversees a qualification program to ensure compliance with the standard and interoperability with other Bluetooth devices. Any device bearing the Bluetooth logo has successfully completed interoperability testing.

Technical Details

Speed: The gross data rate supported by Bluetooth is 1 Mbps. Actual data rates are 432 kbps for full-duplex and 721 kbps for asymmetric  transmission .

Frequency: Bluetooth uses the unlicensed ISM (Industrial, Scientific, and Medical) band at 2.4 GHz. In most countries, this band is available. In a few countries it is reserved for military use, but even these countries are moving to make the band available for general use. Because Bluetooth shares the same frequency range as 802.11b WLAN products, these two technologies cannot operate in the same space under some conditions.

Security: Bluetooth is designed to be as secure as wire using authentication and 128-bit encryption. Applications can also build their own security on top of the Bluetooth connection.

 Transmission  distance: Bluetooth’s typical range is up to 10m. The range depends on the radio power class used. A class 2 radio has a typical range of 10m. More powerful classes support longer ranges and have higher output powers. Most devices use a class 2 radio and mobile devices, like mobile phones, where low power consumption is crucial, can only use a class 2 radio.

Architecture: With Bluetooth, up to 8 devices can be connected simultaneously. A piconet is the term for a collection of Bluetooth devices connected in an ad hoc fashion. All devices are peer units, but one device acts as a master and the other slaves for the duration of the piconet connection. Each piconet can support up to 3 full-duplex voice devices. Within a 10m area, there can be up to 10 piconets.

Applications

Bluetooth is becoming the preferred wireless technology in the WPAN (Wireless Personal Area Network). Personal applications include:

– Users can connect PCs to transfer files.

– Workers can collaborate on the same document using Microsoft NetMeeting.

– Users can connect to a printer without cables.

– Users can synchronize data between a handheld PDA and laptop.

– Users can listen to music via a wireless headset.

– Users can talk on their mobile phone with a wireless headset.

– Users can connect their laptops to the internet using their mobile phone’s GPRS or UMTS network.

Top 10 Motorcycles Songs

1. Meatloaf – Bat out of Hell

Released in 1979, and again in 1993 it was written by Jim Steinman with lead vocals from Meatloaf. Steinman was insistent that the song should contain the sound of a motorbike engine being revved, and complained to producer Todd Rundgren in the final recording session when it was not added. Rather than use a recording of a real motorcycle, Rundgren himself played the section on guitar, leading straight into the solo without a break.

2. The Doors – Riders on the storm

Taken from their 1971 album, LA woman this song reached number 22 spot on the UK singles chart. The song was inspired by Ghost Riders in the Sky: A Cowboy Legend.”

3. The Eagles – Life in the Fast Lane

This is the third single from the Album Hotel California which was written by Joe Walsh, Glenn Frey and Don Henley and reached number 11 in the Billboard Hot 100

4. Steppenwolf – Born to Be Wild

Born to be wild was Initially released in 1968 and was used on the soundtrack for the famous motorcycle movie Easy rider, staring Jack Nicholson and Peter Fonda riding Harley Davidson Hydraglide bikes from 1949, 1950 and 1952

5. Bruce Springsteen – Born to Run

Written in Long Branch, New Jersey in 1974 the song is a love letter to a girl called Wendy. Springsteen himself is a celebrated bike fan. He recently auctioned off his Harley Davidson at the NY Comedy Festival Event ‘Stand Up for Heroes: A Benefit for the Bob Woodruff Family Fund‘ for US$ 85,000.

6. Rush – Ghost Rider

This song is based on the motorcycle story Ghost Rider: Travels on the Healing Road. by Rush’s drummer and lyricist Neil Peart. Peart embarked on a 14 month 55,000 mile motorcycle journey across America after losing two of his family members.

7. Manic Street Preachers – Motorcycle Emptiness

This single by Welsh Rock band Manic Street preachers was inspired by a book by SE Hilton called Rumble Fish and is about biker gang culture. The lyrics have been interpreted by some as an attach consumer/capitalist lifestyle and how young people are expected to conform.

8. Shangri-Las – Leader of the Pack

This song became number one on the Billboard Hot 100 in November 1964 and is about a girl called Betty who is seeking her parent’s disapproval by dating Jimmy, the leader of a motorcycle gang. Her parents claim he is from the “the wrong side of town” and will be a bad influence on her.

9. Bob Seger – Roll Me Away

Roll Me Away was written in 1982 by Bob Seger on the album The Distance by Bob Seger and the Silver Bullet Band. Tit reached number 27 on the Billboard Hot 100 char

10. Prince- Purple Rain

The song Purple Rain, taken from the album of the same name reached number 2 in the America charts. The album was thought by many as among the best rock albums ever it was ranked by Rolling Stone Magazine as the second best album of the 1980s.

How Does Telepathy Work? And Can Anyone Use Telepathy?

The question most frequently asked is how does telepathy work. Well firstly telepathy is direct communication which transpires between two minds. Telepathy can also be transmitted through feelings such as “I have a gut feeling” which is very common in all people and animals. Telepathy can also be transmitted via emotions and images which are practiced by many.

One does not need to have a degree of some sort in order to practice telepathy as telepathy is an inbred natural phenomenon we all have and some call it “sixth sense”. Many people also term telepathy as coincidence for instance the phone rings and on the other end of the line is the person you were just thinking about – that is telepathy   transmission  of thought.

There are many classes available that offer courses whereby your mind is trained to transmit words and phrases. The very best way to reopen this 6th sense is through meditation which allows one to calm the mind and when the mind is calm telepathy becomes second nature. And with training one can then intentionally communicate with another person.

Quantum physics states clearly that the human mind interacts with the universe as well as interacts in and around many other universes. The human is a part of not “apart” from the universe and all that is within the universe which is why we are able to telepathically communicate with all other living matter or energy.

Telepathy is a form of energy as we are all energy beings. Here is a simple example when you make a phone call you are passing a message directly to another person via a transmitting receiver and telepathy is no different accept you don’t have a transmitter or receiver in your hand you are transmitting via the brain in the form of energy.

In other words when you send a telepathic message you are extending your energy to the other person and you then drop off that energy with the intended person and immediately you will retract your energy. How does telepathy work it is simple and straight forward method of sending and receiving.

Do I Really Need a Lawyer to Get a Trademark?

As an experienced Trademark Lawyer, I am frequently asked if individuals or small companies need an attorney to register for a federal trademark. The short answer is no — just as one doesn’t technically need a mechanic to change a car transmission or perform a major engine overhaul. Nonetheless, in both cases, hiring a professional is still advisable.

First, it is essential to conduct a thorough search of all available public records to determine if your proposed name and/or logo are confusingly similar to names or logos that are already being used in commerce by others.

The United States Patent and Trademark Office’s website allows one to search public records online for free. However, smart businesses hire a third party research firm to conduct this exhaustive research for them. If you attempt to do such a search yourself, you will probably miss something, and that could create significant problems for you down the line. Further, there are multiple sources of information about unregistered, but still relevant “common law” uses that must be considered.

This voluminous research will undoubtedly reveal third-party uses that are somewhat similar in some way, shape or form to your proposed use. For example, if you are interested in using the mark “COMPUTER” in connection with jeans, there will be other marks with “computer” in them. Are they confusingly similar? That is the key question, and like most nuanced issues in law, it is often a matter of degree and professional opinion.

Once you are comfortable with the knowledge that your proposed brand name and logo are clear of any major, conflicting third party uses, there are a number of questions to still ask: Is the mark “generic”, that is, the name of the class of goods for which you intend to use it?

For example, one cannot trademark the brand name “computer” for use in connection with computers. However, “computer” could theoretically become the brand name of a pair of jeans, because in that context, it is actually “arbitrary” or “fanciful.” Other categories of marks are “merely descriptive,” that is, does it merely describe an attribute of the product you are branding? Is the term “suggestive,” that is, does it not describe but suggest a feature of the goods? A legal professional can evaluate this issue based on how similar cases were handled on the past.

If you are still comfortable with the mark as proposed, you would then file a formal application in the United States Patent and Trademark Office. This application costs a fee of several hundred dollars all the way up to thousands of dollars, based on the number of “classes” of goods or services that you intend to use the trademark in connection with.

Eventually, you would receive a response from an Examiner working at the Trademark Office. That Examiner would probably ask a number of questions about your proposed mark, and often will seek further clarifications about your application. BE CAREFUL. Whatever you say in response to these questions will become public knowledge as part of the government file.

Further, whatever you do in response to these Office Actions can limit or affect your rights later. For example, disclaiming a portion of the mark, or narrowing the classes of goods for which you are seeking a trademark, can come back to haunt you later. It is easy to give away your rights, but much harder (and sometimes impossible) to ever get them back.

So, to answer the recurring question, one does not technically need an attorney to apply for a US Federal Trademark on a new brand name that one intends to use in commerce. However, it is a long and complicated process, especially if you are unfamiliar with it. And like replacing a car transmission, it requires skill and experience.