Wednesday, 14 May 2014

Understanding Networks

Problem

You want to know how the infrastructure of networks.

Solution

Follow information below:

The success of TCP/IP as the network protocol of the Internet is largely because of its ability to connect together networks of different sizes and systems of different types. These networks are arbitrarily defined into three main classes (along with a few others) that have predefined sizes, each of which can be divided into smaller subnetworks by system administrators. A subnet mask is used to divide an IP address into two parts. One part identifies the host (computer), the other part identifies the network to which it belongs. To better understand how IP addresses and subnet masks work, look at an IP (Internet Protocol) address and see how it is organized.

IP addresses: Networks and hosts

An IP address is a 32-bit number that uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.

IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.

For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32 bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.

These eight bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation.

For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks do not know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.

For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example 192.168.123.132 and divide it into these two parts you get the following:
   192.168.123.    Network
              .132 Host
    
-or-
   192.168.123.0 - network address.
   0.0.0.132     - host address.
    

Subnet mask

The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the network and host addresses above cannot be determined unless you have more information. This information is supplied in another 32-bit number called a subnet mask. In this example, the subnet mask is 255.255.255.0. It is not obvious what this number means unless you know that 255 in binary notation equals 11111111; so, the subnet mask is:
   11111111.11111111.11111111.0000000
    
Lining up the IP address and the subnet mask together, the network and host portions of the address can be separated:
   11000000.10101000.01111011.10000100 -- IP address (192.168.123.132)
   11111111.11111111.11111111.00000000 -- Subnet mask (255.255.255.0)
    
The first 24 bits (the number of ones in the subnet mask) are identified as the network address, with the last 8 bits (the number of remaining zeros in the subnet mask) identified as the host address. This gives you the following:
   11000000.10101000.01111011.00000000 -- Network address (192.168.123.0)
   00000000.00000000.00000000.10000100 -- Host address (000.000.000.132)
    
So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and process it.

Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other common subnet masks are:
   Decimal                 Binary
   255.255.255.192         1111111.11111111.1111111.11000000
   255.255.255.224         1111111.11111111.1111111.11100000
    
Internet RFC 1878 (available from http://www.internic.net ) describes the valid subnets and subnet masks that can be used on TCP/IP networks.

Network classes

Internet addresses are allocated by the InterNIC (http://www.internic.net ), the organization that administers the Internet. These IP addresses are divided into classes. The most common of these are classes A, B, and C. Classes D and E exist, but are not generally used by end users. Each of the address classes has a different default subnet mask. You can identify the class of an IP address by looking at its first octet. Following are the ranges of Class A, B, and C Internet addresses, each with an example address:
  • Class A networks use a default subnet mask of 255.0.0.0 and have 0-127 as their first octet. The address 10.52.36.11 is a class A address. Its first octet is 10, which is between 1 and 126, inclusive.
  • Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their first octet. The address 172.16.52.63 is a class B address. Its first octet is 172, which is between 128 and 191, inclusive.
  • Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first octet. The address 192.168.123.132 is a class C address. Its first octet is 192, which is between 192 and 223, inclusive.
In some scenarios, the default subnet mask values do not fit the needs of the organization, because of the physical topology of the network, or because the numbers of networks (or hosts) do not fit within the default subnet mask restrictions. The next section explains how networks can be divided using subnet masks.

Subnetting

A Class A, B, or C TCP/IP network can be further divided, or subnetted, by a system administrator. This becomes necessary as you reconcile the logical address scheme of the Internet (the abstract world of IP addresses and subnets) with the physical networks in use by the real world.

A system administrator who is allocated a block of IP addresses may be administering networks that are not organized in a way that easily fits these addresses. For example, you have a wide area network with 150 hosts on three networks (in different cities) that are connected by a TCP/IP router. Each of these three networks has 50 hosts. You are allocated the class C network 192.168.123.0. (For illustration, this address is actually from a range that is not allocated on the Internet.) This means that you can use the addresses 192.168.123.1 to 192.168.123.254 for your 150 hosts.

Two addresses that cannot be used in your example are 192.168.123.0 and 192.168.123.255 because binary addresses with a host portion of all ones and all zeros are invalid. The zero address is invalid because it is used to specify a network without specifying a host. The 255 address (in binary notation, a host address of all ones) is used to broadcast a message to every host on a network. Just remember that the first and last address in any network or subnet cannot be assigned to any individual host.

You should now be able to give IP addresses to 254 hosts. This works fine if all 150 computers are on a single network. However, your 150 computers are on three separate physical networks. Instead of requesting more address blocks for each network, you divide your network into subnets that enable you to use one block of addresses on multiple physical networks.

In this case, you divide your network into four subnets by using a subnet mask that makes the network address larger and the possible range of host addresses smaller. In other words, you are 'borrowing' some of the bits usually used for the host address, and using them for the network portion of the address. The subnet mask 255.255.255.192 gives you four networks of 62 hosts each. This works because in binary notation, 255.255.255.192 is the same as 1111111.11111111.1111111.11000000. The first two digits of the last octet become network addresses, so you get the additional networks 00000000 (0), 01000000 (64), 10000000 (128) and 11000000 (192). (Some administrators will only use two of the subnetworks using 255.255.255.192 as a subnet mask. For more information on this topic, see RFC 1878.) In these four networks, the last 6 binary digits can be used for host addresses.

Using a subnet mask of 255.255.255.192, your 192.168.123.0 network then becomes the four networks 192.168.123.0, 192.168.123.64, 192.168.123.128 and 192.168.123.192. These four networks would have as valid host addresses:
   192.168.123.1-62
   192.168.123.65-126
   192.168.123.129-190
   192.168.123.193-254
    
Remember, again, that binary host addresses with all ones or all zeros are invalid, so you cannot use addresses with the last octet of 0, 63, 64, 127, 128, 191, 192, or 255.

You can see how this works by looking at two host addresses, 192.168.123.71 and 192.168.123.133. If you used the default Class C subnet mask of 255.255.255.0, both addresses are on the 192.168.123.0 network. However, if you use the subnet mask of 255.255.255.192, they are on different networks; 192.168.123.71 is on the 192.168.123.64 network, 192.168.123.133 is on the 192.168.123.128 network.

Default gateways

If a TCP/IP computer needs to communicate with a host on another network, it will usually communicate through a device called a router. In TCP/IP terms, a router that is specified on a host, which links the host's subnet to other networks, is called a default gateway. This section explains how TCP/IP determines whether or not to send packets to its default gateway to reach another computer or device on the network.

When a host attempts to communicate with another device using TCP/IP, it performs a comparison process using the defined subnet mask and the destination IP address versus the subnet mask and its own IP address. The result of this comparison tells the computer whether the destination is a local host or a remote host.

If the result of this process determines the destination to be a local host, then the computer will simply send the packet on the local subnet. If the result of the comparison determines the destination to be a remote host, then the computer will forward the packet to the default gateway defined in its TCP/IP properties. It is then the responsibility of the router to forward the packet to the correct subnet.

Troubleshooting

TCP/IP network problems are often caused by incorrect configuration of the three main entries in a computer's TCP/IP properties. By understanding how errors in TCP/IP configuration affect network operations, you can solve many common TCP/IP problems.

Incorrect Subnet Mask: If a network uses a subnet mask other than the default mask for its address class, and a client is still configured with the default subnet mask for the address class, communication will fail to some nearby networks but not to distant ones. As an example, if you create four subnets (such as in the subnetting example) but use the incorrect subnet mask of 255.255.255.0 in your TCP/IP configuration, hosts will not be able to determine that some computers are on different subnets than their own. When this happens, packets destined for hosts on different physical networks that are part of the same Class C address will not be sent to a default gateway for delivery. A common symptom of this is when a computer can communicate with hosts that are on its local network and can talk to all remote networks except those that are nearby and have the same class A, B, or C address. To fix this problem, just enter the correct subnet mask in the TCP/IP configuration for that host.

Incorrect IP Address: If you put computers with IP addresses that should be on separate subnets on a local network with each other, they will not be able to communicate. They will try to send packets to each other through a router that will not be able to forward them correctly. A symptom of this problem is a computer that can talk to hosts on remote networks, but cannot communicate with some or all computers on their local network. To correct this problem, make sure all computers on the same physical network have IP addresses on the same IP subnet. If you run out of IP addresses on a single network segment, there are solutions that go beyond the scope of this article.

Incorrect Default Gateway: A computer configured with an incorrect default gateway will be able to communicate with hosts on its own network segment, but will fail to communicate with hosts on some or all remote networks. If a single physical network has more than one router, and the wrong router is configured as a default gateway, a host will be able to communicate with some remote networks, but not others. This problem is common if an organization has a router to an internal TCP/IP network and another router connected to the Internet.

Sunday, 11 May 2014

How Cold Fusion Works


Problem 

You want to know the basics of how low power nuclear fusion reactions occur creating a cold fusion generator .

Solution 
Basics of how cold fusion works



Cold Fusion Machine 

The picture above shows a cold fusion machine which has 4 platinum anodes and inside the tubes are coils of platinum (around the sides of the device); and one main Palladium cathode (within the middle).

Stage 1 - Setup and materials 

A voltage is applied to two electrodes which are immersed within an electrolytic solution. This solution contains: 

Heavy Water

Deuterium oxide, is a form of water that contains a larger than normal amount of the hydrogen-isotope deuterium, (also known as heavy hydrogen) rather than the common hydrogen-1 isotope (called protium) that makes up most of the hydrogen in normal water.


Lithium salts

Lithium carbonate is an inorganic compound. This white salt is widely used in the processing of metal oxides and has received attention for the treatment of bipolar disorder. It exists as the rare mineral zabuyelite.

The two electrodes are:

·         Palladium – Cathode (negatively charged)
·         Platinum – Annode (positively charged)

Having these electrodes immersed within the solution and a voltage added to both, establishes a flow of current within strip of Palladium (acting as the cathode) to the platinum coils (acting as the anode) using electromagnetic induction these are going to separate the deuterium oxide.

Temperature sensors can be used to measure the heat to understand the power output of this process and for safety procedures. These sensors would be located upon the inside of the solution and the surrounding water coolant.

Stage 2 - How this works     

Due to the voltage being supplied to the electrodes this creates a electromotive field. The Deuterium oxide molecule ( 1 oxygen + 2 Deuterium = ODD = Deuterium oxide ) begins to dissociate themselves from each other breaking apart within the field, leaving OD- (1 oxygen + 1 deuterium negative ion) and D+ ( 1 deuterium positive ion).


This is then leaves the OD-  ions to be attracted to the positively charged platinum anodes, here they lose an electron and combine with other OD- ions to reform back into Deuterium oxide . However when they reform back into this they can leave an oxygen molecule behind as the two OD- ions can only hold one oxygen molecule to make ODD, these oxygen molecules will then combine to form 02 which will rise to the top of the tank and escape.

Meanwhile while this is happening the D+ ions are attracted to the negative charged Palladium, to neutralize their charge.

It’s the structure of the Palladium that makes this all happen, as it’s a face centre cubic lattice structure, shown in picture of this is below the D+ can move into it :


When the D+ ions get to this point they can either do two thing’s:

·         They can make their way into the lattice structure moving into the interatomic space within the Palladium lattice structure.

·         Bump into each other along the surface of the Palladium cathode and form into D2 molecule that’s too big to enter the interatomic space within the Palladium. They will then rise up as bubbles within the electrolyte solution.

At the same time all this is happening this process continues on the outside, (repeating) with the continued dissociation of the deuterium oxide ions as long as this voltage is applied.

SuperWave Principle    

SuperWaves are multiple fractal nested waves of varying amplitudes and frequencies of current, which look something like this:


Varying the amplitude of AC oscillations applied to the electrodes this dramatically increases the loading rate of D+ ions to the Palladium cathode as well as the OD- ions to the anodes.

Initiation of Cold Fusion

Due to the speed up of this process using the SuperWave principle the D+ ions moving into the interatomic space within Palladium cathode lattice increases. With the D+ moving deeper into the lattice structure until the Palladium reaches a saturation point, this point is when every D+ ion accompanies all  interatomic space within the Palladium lattice structure.

Once the Palladium cathode is at saturation, the material will expand mechanically due to the increase in D+ ions, it’s at this critical point of the material where it causes mechanical stress and a high resistance upon the D+ ions, as the Palladium stretches to accompany all of the D+ now within it.  

At this point they will begin to move in synchronous movements, starting off with only one or two D+ ions moving to the collective of all the D+ ions over time. This high resistance of the now saturated lattice of the Palladium and resistance of returning to its original size pushing the D+ ions together; forcing them to fuse with one another creating the now new element helium 4 isotope. A massive amount of heat is produced when fusion occurs, as the breaking down of the valence shells of the old D+ to make a complete new substance.
 
This then creates more room inside of the Palladium lattice forcing more D+ ions inside and forcing the Palladium to begin to expand and contract forcing further fusion of D+ which in turn will heat the Palladium to very high temperatures due to the energy released during fusion which is absorbed into the Palladium lattuice structure. An endothermic system can then be applied, to capture the thermal radiation given and convert it to usable power. 

This is where the power would be harvested from this method.

If I have anything wrong here please let me know as I have used information from a reliable sources (textbooks).

Links to books:

by Edmund Storms · World Scientific · Hardback · 312 pages · ISBN 9812706208

Thanks for reading 

Andrew Twigg 







How to turn your Now TV box into a Media Center

How to turn your Now TV box into a Media Center

 


Problem
You want to view all your media on your now TV and constantly sync new media you have.

Solution
Plugin your Now TV and press the following buttons quickly to access developer mode:
Home x2
Up x2
Right
Left
Right
Left
Right

This should access the developers section of the Now TV system.
Press enter – this will take you to a licence agreement
Agree to the new terms
The Now TV box should restart
Go to this link and download a ZIP file:
Once you have the file go back to your Now TV box
Access developer mode again (above sequence)
You will now see an http://***.***.***  (copy this address and add it to your pc)
You will see a grey screen with a tab saying “choose file”: press this tab
Add the “plex” file you downloaded earlier (still zipped)
Then press the button “install”
This will install plex to your Now TV box

Next you will need to create and account on plex
Download plex here: https://plex.tv/downloads
Once you have installed it, run it and it will open a page on your web browser
Use the web interface on plex to add your files by creating folder using the (+) sign on the left bar
Point it to the files you want and create as many as you want
Don’t choose TV Shows for pics. Choose the relevant category for your files
Tip: if VLC media player can play the files so can plex

Next you need to go back to your Now TV system
Here you need to go to the configuration settings
The title should say “set plex channel preferences”

There are now two ways to continue:

1.
Next you can go to “ plex media servers”
Click on “discover servers”
This should find your home PC
Click on it and its done!
You now have access to the files you added to the plex site
(don’t change the file name plex is linked to as it wont update when you add more items to it)

2
Click on “connect to myPlex account”
Add your details
Done

You should now be able to view all the files you add to your plex account, this creates your home media center; you can link as many Now TV systems as you want to this.

A video to help you if you get stuck or don’t understand instructions:
  










How to configure hpux iLoms on rx2620 & rx 4640 systems


Date: 15/04/2014
HPUX iLOm MANAGEMENT FOR SYSTEMS RX 2620 + RX 4640
Problem

iLOm credentials of a HPUX machines RX 2620 + RX 4640 configuration

Brief description of problem

Configuration of the HPUX iLOm’s user accounts needed doing.

Problems encountered during repair breakdown

·         Terminal type interface –
While interfacing the iLOms of the required machines a problem arouse with the type of terminal which was being used; due to this I could not issue the required commands needed for configuration of iLOm account. (via “CM”)

This then led us to our next problem (mentioned below)

·         ILom reset
After removing the possibility of a terminal problem I decided to reset the iLOm; this fixed the problem strait away, details of how to reset a HPUX RX 2620 + RX 4640 system iLOm is located below.

Reset a HPUX iLOm

How to reset RX 2620 iLOm

RX 2620 back panel (below)


Highlighted in red is the back panel of  is the reset switch of an RX2620 you will need a small object to access it, press this in once for 2 seconds then let go, this will reset the MP, if you are connected to a terminal then you should see a pause in the screen, then (depending on your iLOm firmware) you should see the system ask you to press the key “P” to reset all settings within the iLOm; leave this and it will continue to reset as normal.  


How to reset RX 4640 iLOm



The iLOm reset button is located inside of the back panel and can be accessed with a small object, here when the button is pushed a amber light will appear for around 3-5 seconds; it will then go out as the MP resets itself. You should see the system ask you to press the key “P” to reset all settings within the iLOm; leave this and it will continue to reset as normal.  

See user manuals for total reset as the systems will default to a new IP and DNS.

How to change the password of an iLOm account

Login to the iLom and follow the instructions below:
  • Ø  CM
  • Ø  UC
  • Ø  C
  • Ø  (Number of account)
  • Ø  P
  • Ø  Enter your desired password
  • Ø  Y – Save changes


This concludes your basic HPUX iLOm tutorial.

I hope it helped.

Andrew Twigg